c302473468e798054dfba7aeebbbcb7957cbb266584e711e6f9ca85d4a67ae59edc3f896a804e7be577c226e218bf19c932eafde2461ff3597f3ae7fa5ae73de8031d84d0520674c8414edd6d11171c75fbeab8f8f2b01121a22ea851f7934b70ebf0bec72d3ea31fad80a794587da4330c31c3285c5", 0xcb}, {&(0x7f0000001f80)="ff496e685e58ea0e7279985997164cfa84b01e3b", 0x14}, {&(0x7f0000004580)="fe5d92efef30f7d687f41b35db4d147c77aa2b580a14ff35455e867755ec5f31041887aa3c63d74db6a0650c75d99ce0d06338b02a7a8343fb710b57f3c40f85d0d4453ba3777ef8f5988e84a16d2ac6ab3b8104f417b621da33b9cf562ac83a72aa0e607a99ef6889720017b0461ff4a9a889572e67f2c17f015dec73c1db9dd67acb9081e4b782aef8ab00534865bcb9d45e4add1975256352c00eb5a3fcc31a6162788371f684ed14fe6efd1a4ad77f65d8ec3cbfa42806f41e7fd4b834d135901648fdc50d38ed98dbaac37ae75784b8c834ebcc4e", 0xd7}], 0x6, &(0x7f0000004700)=[@assoc={0x18, 0x117, 0x4, 0xffffffff}, @assoc={0x18, 0x117, 0x4, 0x3e67}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}, @assoc={0x18, 0x117, 0x4, 0x6}, @op={0x18, 0x117, 0x3, 0x1}], 0x90, 0x11}, {0x0, 0x0, &(0x7f0000004840)=[{&(0x7f00000047c0)="5c7605e16d66b23ae617b6ff495ed861f726bc1bf0cae4ec5696e1708cfbc51445ffdfba1ff4efe3df2ce2998568ed42ea0aefa454014e2c5dc96b8fd6a550873037ee2f92a04911d1fcc34565abd224ba20c53b2f4cd659e4ad3de65ac5ec6ba93fd110e97c35fdb84c21a5a0", 0x6d}], 0x1, &(0x7f0000004880)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2}], 0x30, 0x40004}, {0x0, 0x0, &(0x7f0000004980)=[{&(0x7f00000048c0)="4078ec136a37ccb731c504381ca81629aea929e270b71d04360bbb7682d73a4143eba3dedd3944db429dbe0534994437ad9011c676f65341c950056374791ca85180f8d37dc47f2f95cb5a349446c6658ef33e22371e20835ceabea0ce45f7ed5b7c81de20c8743e673df032a071871e1a54a14aa2e6479c71ed89133b02da160d79bde33636", 0x86}], 0x1, &(0x7f00000049c0)=ANY=[@ANYBLOB="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"], 0x260, 0x1}], 0x6, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000080)={@mcast1, 0x0}, &(0x7f0000001280)=0x14) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r1}, 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 311.199028] audit: type=1800 audit(1539434011.870:90): pid=9364 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16527 res=0 [ 311.360587] overlayfs: filesystem on './file0' not supported as upperdir [ 311.387627] EXT4-fs (sda1): Cannot specify journal on remount [ 311.439344] FAULT_INJECTION: forcing a failure. [ 311.439344] name failslab, interval 1, probability 0, space 0, times 0 [ 311.457895] CPU: 0 PID: 9364 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #58 [ 311.465140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.474517] Call Trace: [ 311.477148] dump_stack+0x1c4/0x2b4 [ 311.480823] ? dump_stack_print_info.cold.2+0x52/0x52 [ 311.486063] should_fail.cold.4+0xa/0x17 [ 311.490170] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 311.495291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.500848] ? wake_up_klogd+0x11a/0x180 [ 311.504925] ? console_device+0xc0/0xc0 [ 311.508932] ? vprintk_emit+0x322/0x930 [ 311.512922] ? graph_lock+0x170/0x170 [ 311.516737] ? __down_trylock_console_sem+0x155/0x200 [ 311.521948] ? graph_lock+0x170/0x170 [ 311.525781] ? find_held_lock+0x36/0x1c0 [ 311.529865] ? __lock_is_held+0xb5/0x140 [ 311.533961] ? ___might_sleep+0x1ed/0x300 [ 311.538134] ? arch_local_save_flags+0x40/0x40 [ 311.542761] ? vprintk_default+0x28/0x30 [ 311.546873] __should_failslab+0x124/0x180 [ 311.551145] should_failslab+0x9/0x14 [ 311.554984] kmem_cache_alloc_trace+0x2d7/0x750 [ 311.559702] kobject_uevent_env+0x2f3/0x101e [ 311.564167] kobject_uevent+0x1f/0x24 [ 311.568006] loop_clr_fd+0x607/0xd00 [ 311.571769] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 311.577360] lo_ioctl+0x875/0x1d80 [ 311.580947] ? lo_rw_aio_complete+0x470/0x470 [ 311.585482] blkdev_ioctl+0x9ac/0x2010 [ 311.589403] ? blkpg_ioctl+0xc10/0xc10 [ 311.593316] ? lock_downgrade+0x900/0x900 [ 311.597491] ? check_preemption_disabled+0x48/0x200 [ 311.602544] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 311.608364] ? kasan_check_read+0x11/0x20 [ 311.612544] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 311.617855] ? rcu_bh_qs+0xc0/0xc0 [ 311.621436] ? __fget+0x4d1/0x740 [ 311.624926] ? ksys_dup3+0x680/0x680 [ 311.628656] ? kasan_slab_free+0xe/0x10 [ 311.632649] ? ksys_mount+0xa3/0x140 [ 311.636385] ? __x64_sys_mount+0xbe/0x150 [ 311.640575] ? do_syscall_64+0x1b9/0x820 [ 311.644658] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.650068] block_ioctl+0xee/0x130 [ 311.653735] ? blkdev_fallocate+0x400/0x400 [ 311.658080] do_vfs_ioctl+0x1de/0x1720 [ 311.661996] ? kasan_check_write+0x14/0x20 [ 311.666263] ? ioctl_preallocate+0x300/0x300 [ 311.670700] ? memset+0x31/0x40 [ 311.674002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.679572] ? smack_file_ioctl+0x210/0x3c0 [ 311.683925] ? fget_raw+0x20/0x20 [ 311.687414] ? smack_file_lock+0x2e0/0x2e0 [ 311.691694] ? do_syscall_64+0x9a/0x820 [ 311.695702] ? do_syscall_64+0x9a/0x820 [ 311.699719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.705293] ? security_file_ioctl+0x94/0xc0 [ 311.709743] ksys_ioctl+0xa9/0xd0 [ 311.713626] __x64_sys_ioctl+0x73/0xb0 [ 311.717550] do_syscall_64+0x1b9/0x820 [ 311.721466] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 311.726870] ? syscall_return_slowpath+0x5e0/0x5e0 [ 311.731833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.736714] ? trace_hardirqs_on_caller+0x310/0x310 [ 311.741762] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 311.746827] ? prepare_exit_to_usermode+0x291/0x3b0 [ 311.751894] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.756785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.762006] RIP: 0033:0x4573d7 [ 311.765221] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:33:32 executing program 4 (fault-call:3 fault-nth:31): open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:32 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x0, @loopback}, 0x10) 12:33:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000080), &(0x7f0000000000)=0xfffffffffffffedb) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x10, &(0x7f0000000180)={&(0x7f0000000200)=""/81, 0x51, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r0, 0x4) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000340)=""/113) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x49131400}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x8000, 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000080)={0xfe08}, 0x351b21c22502589) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) read(r1, &(0x7f00000003c0)=""/131, 0x83) 12:33:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 311.784320] RSP: 002b:00007fc000df5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 311.792060] RAX: ffffffffffffffda RBX: 00007fc000df5b30 RCX: 00000000004573d7 [ 311.799364] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 311.806665] RBP: 0000000020000080 R08: 00007fc000df5b30 R09: 00007fc000df5ad0 [ 311.813964] R10: 0000000000100020 R11: 0000000000000246 R12: 0000000000000005 [ 311.821257] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000004 12:33:32 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000003c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000240)="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") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f00000000c0)=""/8, 0x8, 0x103f00) 12:33:32 executing program 0: 12:33:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 311.962010] audit: type=1800 audit(1539434012.640:91): pid=9391 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16527 res=0 [ 311.996789] EXT4-fs (sda1): Cannot specify journal on remount 12:33:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 312.069449] FAULT_INJECTION: forcing a failure. [ 312.069449] name failslab, interval 1, probability 0, space 0, times 0 [ 312.095844] CPU: 1 PID: 9391 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #58 [ 312.103084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.112465] Call Trace: [ 312.115088] dump_stack+0x1c4/0x2b4 [ 312.118752] ? dump_stack_print_info.cold.2+0x52/0x52 [ 312.123976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.129557] should_fail.cold.4+0xa/0x17 [ 312.133664] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.138802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.144396] ? wake_up_klogd+0x11a/0x180 [ 312.148490] ? console_device+0xc0/0xc0 [ 312.152488] ? vprintk_emit+0x322/0x930 [ 312.156491] ? graph_lock+0x170/0x170 [ 312.160322] ? __down_trylock_console_sem+0x155/0x200 [ 312.165547] ? graph_lock+0x170/0x170 [ 312.169379] ? vprintk_emit+0x268/0x930 [ 312.173389] ? find_held_lock+0x36/0x1c0 [ 312.177481] ? __lock_is_held+0xb5/0x140 [ 312.181579] ? ___might_sleep+0x1ed/0x300 [ 312.181609] ? arch_local_save_flags+0x40/0x40 [ 312.181634] ? vprintk_default+0x28/0x30 [ 312.190406] __should_failslab+0x124/0x180 [ 312.198723] should_failslab+0x9/0x14 [ 312.202560] kmem_cache_alloc_trace+0x2d7/0x750 [ 312.207284] kobject_uevent_env+0x2f3/0x101e [ 312.211739] kobject_uevent+0x1f/0x24 [ 312.215570] loop_clr_fd+0x607/0xd00 [ 312.219327] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 312.224920] lo_ioctl+0x875/0x1d80 [ 312.228504] ? lo_rw_aio_complete+0x470/0x470 [ 312.233029] blkdev_ioctl+0x9ac/0x2010 [ 312.236959] ? blkpg_ioctl+0xc10/0xc10 [ 312.240868] ? lock_downgrade+0x900/0x900 [ 312.245054] ? check_preemption_disabled+0x48/0x200 [ 312.250116] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 312.255951] ? kasan_check_read+0x11/0x20 [ 312.260125] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 312.265436] ? rcu_bh_qs+0xc0/0xc0 [ 312.269015] ? __fget+0x4d1/0x740 [ 312.272506] ? ksys_dup3+0x680/0x680 [ 312.276237] ? kasan_slab_free+0xe/0x10 [ 312.281011] ? ksys_mount+0xa3/0x140 [ 312.284746] ? __x64_sys_mount+0xbe/0x150 [ 312.288918] ? do_syscall_64+0x1b9/0x820 [ 312.292996] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.298400] block_ioctl+0xee/0x130 [ 312.302050] ? blkdev_fallocate+0x400/0x400 [ 312.306394] do_vfs_ioctl+0x1de/0x1720 [ 312.310305] ? kasan_check_write+0x14/0x20 [ 312.314576] ? ioctl_preallocate+0x300/0x300 [ 312.319009] ? memset+0x31/0x40 [ 312.322315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.327880] ? smack_file_ioctl+0x210/0x3c0 [ 312.332216] ? fget_raw+0x20/0x20 [ 312.332238] ? smack_file_lock+0x2e0/0x2e0 [ 312.332269] ? do_syscall_64+0x9a/0x820 [ 312.332290] ? do_syscall_64+0x9a/0x820 [ 312.340001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.340020] ? security_file_ioctl+0x94/0xc0 [ 312.340043] ksys_ioctl+0xa9/0xd0 [ 312.340064] __x64_sys_ioctl+0x73/0xb0 [ 312.340085] do_syscall_64+0x1b9/0x820 [ 312.340102] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 312.340128] ? syscall_return_slowpath+0x5e0/0x5e0 [ 312.379543] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.384418] ? trace_hardirqs_on_caller+0x310/0x310 [ 312.389458] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 312.394504] ? prepare_exit_to_usermode+0x291/0x3b0 [ 312.399552] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.404442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.409658] RIP: 0033:0x4573d7 12:33:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e22, @loopback}]}, &(0x7f0000000080)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000440)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)={r1, 0x6b, "77aa0dd5f2c9f4fc50ebf1dad360822c2b7c459e5f310314250430b971e58cc4b9c3e688655367546736826762e6ea405a0e10190c5912028cf9f8df1b375af144ae9d7f4b3544062281cbe05f28b3967a6e3e8fe3ac5794de806e3754cbae64cb06231dd7e96550c0e41b"}, &(0x7f0000000300)=0x73) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) r2 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x4400, 0x0) pread64(r2, &(0x7f0000000340)=""/150, 0x96, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:33 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x8, 0x103f00) [ 312.412868] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.431787] RSP: 002b:00007fc000df5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 312.439544] RAX: ffffffffffffffda RBX: 00007fc000df5b30 RCX: 00000000004573d7 [ 312.446860] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 312.454159] RBP: 0000000020000080 R08: 00007fc000df5b30 R09: 00007fc000df5ad0 [ 312.461452] R10: 0000000000100020 R11: 0000000000000246 R12: 0000000000000005 [ 312.461462] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000004 12:33:33 executing program 4 (fault-call:3 fault-nth:32): open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:33 executing program 0: 12:33:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") lgetxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000440)=""/149, 0x95) pread64(r0, &(0x7f0000000240)=""/221, 0xdd, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) accept4$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0}, &(0x7f0000000580)=0x14, 0x80800) connect$can_bcm(r1, &(0x7f00000005c0)={0x1d, r2}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d, r3}, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x1, 0x0, 0x0, 0x3, 0x8000, "05d0e7fc2ddd4c226cc2100b1be17ef2a0315a6885affca1e3891637457912bd0e5a919275d241892ba32922160027bce4dceab3d1623e39ab24f8abe7009c", 0x27}, 0x60) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) setsockopt$inet_tcp_int(r0, 0x6, 0x27, &(0x7f0000000600)=0x5, 0x4) connect$bt_rfcomm(r0, &(0x7f0000000500)={0x1f, {0x166b, 0x100000001, 0xffff, 0xdf79, 0x10000}, 0x7fffffff}, 0xa) [ 312.731644] audit: type=1800 audit(1539434013.410:92): pid=9423 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16528 res=0 [ 312.753497] EXT4-fs (sda1): Cannot specify journal on remount 12:33:33 executing program 3: r0 = gettid() perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={&(0x7f0000000380), &(0x7f0000001380)}}, &(0x7f0000000340)) r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00') getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000440), &(0x7f0000000500)=0x2) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000280)) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) tkill(r0, 0x15) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) 12:33:33 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000300)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c992057c5d20d0c7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x840, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000080)=0xff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040)=0xfd, 0x4) ioctl$EXT4_IOC_RESIZE_FS(r3, 0x40086610, &(0x7f0000000140)=0x4) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r3, 0xc05c5340, &(0x7f00000001c0)={0x4, 0xfffffffffffffff8, 0x6, {r4, r5+30000000}, 0xffff, 0xc0f}) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000440)={0x81, 0x0, [0x101, 0x934, 0xc0ea, 0x8]}) 12:33:33 executing program 0: syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$rds(0x15, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:33:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0xc2) accept4(r0, &(0x7f0000000340)=@rc, &(0x7f00000001c0)=0x80, 0x800) msgrcv(r1, &(0x7f0000000100)={0x0, ""/127}, 0x87, 0x3, 0x2000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000000c0)={0x7, 0x101}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', r3}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r4}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x100) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:33 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 312.911153] audit: type=1800 audit(1539434013.590:93): pid=9434 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16531 res=0 [ 312.931332] EXT4-fs (sda1): Cannot specify journal on remount 12:33:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0x19000000, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, {0xa, 0x0, 0x0, @local}, r1}}, 0x48) 12:33:36 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00L\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) write$P9_RSTATFS(r1, &(0x7f0000000000)={0x43, 0x9, 0x1, {0x1, 0x101, 0x0, 0x9993, 0x80, 0x81, 0x9, 0x4, 0x1}}, 0x43) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)={0x0, @speck128, 0x2, "95990e617dc1e6cf"}) mmap(&(0x7f000048d000/0xa000)=nil, 0xa000, 0x0, 0x10, r0, 0x40800) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:36 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x10, &(0x7f0000000180)={&(0x7f0000000200)=""/81, 0x51, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x49130110}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x8000, 0x0) renameat(r3, &(0x7f0000000300)='./file0\x00', r4, &(0x7f00000004c0)='./file0\x00') setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000080)={0xfe08}, 0x351b21c22502589) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) 12:33:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x1004}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xfffffffffffffffb, 0x17, "0895cccec2753c33d7686a023027bf0ddc6bef796a70bf5dae27bb6997329feb0c6c5161419a8af6711383e7d1dbe718c5b354240e156359fceb519af4324127021f75078256f2f46b372f0cf08241b8e977c68e979c3c6e1d5ac8c764c306cd8fedf5887ceaeb571830f7e1ee5f88face52e106884a581ddc7532b5926582b3d2359ad78bc9e143de0e6c76b4468c0618d723cd664ecdab413eb0c8b309d0f501102f0424897495e76dfb71e90c472cc88ac2d1b42ca1fa02e0b05ab866b66b605828862c8af6778610670ce0b694bc7c5db041039985cc5decf8c8a8b95131caf8c0378afe3c7d1f2fe55f76d7573b63c28f0145e25272df49cdf33f7a44f4", 0x19, 0x3ff, 0x9, 0x80000001, 0x4, 0x8, 0xff}, r1}}, 0x120) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000380)) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f00000cc000/0x2000)=nil, 0x2000, 0x0, 0x4d035, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 316.017988] audit: type=1800 audit(1539434016.690:94): pid=9448 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16525 res=0 [ 316.071168] EXT4-fs (sda1): Cannot specify journal on remount 12:33:36 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0300", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:36 executing program 3: 12:33:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/prev\x00') ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000080)={0x100000000, 0x0, 0x0, 0x9, 0x8, 0x7fffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101040, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x200000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:36 executing program 0: 12:33:36 executing program 1: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x4, 0x400000) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000640)={0x0, @dev, @multicast1}, &(0x7f0000000680)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00', r1}) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000580)={0x3ff, {{0xa, 0x4e24, 0x1, @dev={0xfe, 0x80, [], 0x12}, 0x9}}}, 0x88) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)) r5 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000440)={{0x6, 0x6, 0x1, 0xffffffff, 'syz0\x00'}, 0x5, 0x10000230, 0x2d, r5, 0x1, 0x8, 'syz1\x00', &(0x7f0000000380)=['\x00'], 0x1, [], [0x7, 0x8, 0x8, 0x6]}) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000240), &(0x7f0000000100)=0x68) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r4}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, r2, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000400)={r6, 0xa2ba}, 0xfffffffffffffeb8) 12:33:36 executing program 3: [ 316.294104] audit: type=1800 audit(1539434016.970:95): pid=9480 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 [ 316.323641] EXT4-fs (sda1): Cannot specify journal on remount 12:33:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() fcntl$lock(r1, 0x7, &(0x7f00000000c0)={0x0, 0x2, 0x3, 0x100000001, r2}) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r4}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:39 executing program 0: 12:33:39 executing program 3: 12:33:39 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='-\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xfb, "90da29f29853b0e9bdf8dced0aab88a88255c606e3b65550d2bbe3937c977f85b01fee289d7576b6f1749f224eca044d49539598a35f19cbfa157fb3561dc9c80ba9442248868e61e6322b3c9b84a8e5c33bc17088f7e8c0eee9b4d52c516fc9611c65b4a924238d5ff7e77d830332c59888a5d99cf4888ffde4b122d69a1e1b19eed82af6a2aebb2a79ea9b948a39bb50647cabe7e8ab471147cff1fffd80dbc4b7c4742be3a75750d664aeb15116993416edfc397c38e7585a0e7c1642947e602511aff34e8c2da86ba026656661d04d4b1612b18276d9e9abfc76ba20a1c2a47642c2f5bbb3f35343aeb852afd309a04bfe69360f6479ca5c91"}, &(0x7f00000000c0)=0x103) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000380)={r3, @in={{0x2, 0x4e22, @broadcast}}, 0x6, 0xbe000000000, 0x4702, 0x200, 0x8}, 0x98) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x8, 0xd984, 0x6, 0x0, 0x80, 0x6, 0x7ff}, 0x1c) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:39 executing program 3: [ 319.143033] audit: type=1800 audit(1539434019.820:96): pid=9499 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 12:33:39 executing program 0: [ 319.232664] EXT4-fs (sda1): Cannot specify journal on remount 12:33:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000300)={0x363, 0x3, 0x401}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x80000000}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000340)={r3, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x17}}}}, 0x84) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:40 executing program 3: 12:33:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) umount2(&(0x7f0000000000)='./file0\x00', 0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000736000/0x1000)=nil, 0x1000, 0xfffffffffffffffa, 0x13, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x4}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000002c0)={r1, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}}}, 0x84) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 12:33:40 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00@\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 319.455635] audit: type=1800 audit(1539434020.130:97): pid=9517 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16522 res=0 [ 319.475890] EXT4-fs (sda1): Cannot specify journal on remount 12:33:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:42 executing program 0: 12:33:42 executing program 3: 12:33:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r1}, 0x10) getsockopt$packet_int(r0, 0x107, 0x10, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200001, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, &(0x7f0000000080)=0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000340)={0x0, 0x40, "79ff65276bed334b4c7985ff5954ac0e7bd8c27eea8f072a42f126cd46920e3e12da58fcb2c59089bdcd4ece852ff5656c68133cef699baa871ca1421cfd1b4e"}, &(0x7f00000003c0)=0x48) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000400)={r1, 0x1, 0x7, 0x5, 0x8, 0x7, 0x2, 0x64b4, {r2, @in={{0x2, 0x4e21, @multicast1}}, 0x3, 0x5ef, 0x7fff, 0x100000001, 0x6}}, &(0x7f00000004c0)=0xb0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$FUSE_BMAP(r3, &(0x7f0000000000)={0x18, 0xffffffffffffffda, 0x2, {0x9}}, 0x15) fcntl$addseals(r3, 0x409, 0x1) pread64(r3, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:42 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:42 executing program 0: [ 322.266880] audit: type=1800 audit(1539434022.940:98): pid=9527 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 12:33:43 executing program 3: 12:33:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) kexec_load(0x9, 0x2, &(0x7f0000000100)=[{&(0x7f00000000c0)="484f8e580b0b8e5c0d030ec940f1212847f2e2615f8535fbcc20e840cbebd58d16456b1cb5e76c4233c42ceb759167298af19ca13ac4589f9c2a77511e6f4d63", 0x40, 0xffffffff, 0x7fffffff}, {&(0x7f0000000240)="a3e4a9b8f177302ef7502114ff434491f8de185ad5000ccd6b872ce99f5fd171e21f6aeb903af1a3456f8c983bc7516fae6862573ed9308ef25ec81174a8bd96feb55a65ae6d90a19e59448c4cebf58aab705788cdf45d", 0x57, 0x800, 0x7}], 0x3e0000) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 322.338025] EXT4-fs (sda1): Cannot specify journal on remount 12:33:43 executing program 3: 12:33:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:43 executing program 0: 12:33:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:43 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:43 executing program 3: 12:33:43 executing program 0: 12:33:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x80f, 0x8) write$binfmt_elf64(r3, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x74, 0x6, 0x8001, 0x407, 0xcb6, 0x2, 0x3, 0x6, 0x2bb, 0x40, 0x304, 0x8, 0x8, 0x38, 0x2, 0x2, 0x67a9, 0x3}, [{0x7, 0xeb67, 0x2, 0x8, 0x5, 0x0, 0x7e8926a6, 0x8001}, {0x5, 0x6, 0xffff, 0x9, 0xdc3f, 0x71, 0x6, 0x200}], "c3cf47f31a0143b708ad56a8103ff26b2825a20173c6f6683ce22c5d2472cb6619a2630e7b8bc9fe57acc4355bdeaef5636c9eb319ea617381", [[], [], [], [], [], [], [], []]}, 0x8e9) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") getsockname$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d, r1}, 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0x7) accept4$vsock_stream(r0, &(0x7f0000000240)={0x28, 0x0, 0x8, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 322.591828] audit: type=1800 audit(1539434023.270:99): pid=9550 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 12:33:43 executing program 3: 12:33:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:43 executing program 0: [ 322.680796] EXT4-fs (sda1): Cannot specify journal on remount 12:33:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8800}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="26ff6b01e180e947660d3db4f9f3abfc7cdbb24ba7f1e44d34e3494aff83590b99affeb39687e2bc18b1832b87752b899d60c5a8654eb7d7021f033cecb6a75eb2d4cecc9e2c16c36b1c12da7f4ad9a77e915052dbbdf861b02c40d3dde432309de5beeb00960f3c9c591aa52357", @ANYRES16=r1, @ANYBLOB="010127bd7000fcdbdf2501000000080002000a0000000400050008000400010000000800040001000000"], 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x80) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000440)={0x0, 0x9}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000004c0)={r2, 0x6, 0x8a91, 0x396e6b2e}, &(0x7f0000000500)=0x10) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) timer_create(0x5, &(0x7f00000003c0)={0x0, 0x22, 0x0, @tid=r3}, &(0x7f0000000400)) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:43 executing program 3: 12:33:43 executing program 0: 12:33:43 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000000007f", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f00000000c0)=0x3) r1 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000240)={@mcast1, 0x0}, &(0x7f0000000280)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', r2}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:43 executing program 3: 12:33:43 executing program 0: 12:33:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:43 executing program 3: [ 322.963878] audit: type=1800 audit(1539434023.640:100): pid=9574 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 [ 322.997421] EXT4-fs (sda1): Cannot specify journal on remount 12:33:43 executing program 0: 12:33:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x8, 0xfffffffffffffffe, 0x7}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x37eb, 0x4, [0x3a, 0x2, 0x2, 0x4]}, &(0x7f0000000280)=0x10) 12:33:43 executing program 0: 12:33:43 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffdfc00", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000002c0)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000480)="6e732f6367726f7501407d20a2b8a2265ef020d9f5a3d66600") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000240)) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000280)) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f000059b000/0x2000)=nil, 0x2000, 0x2, 0x4d030, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) accept4$vsock_stream(r0, &(0x7f0000000400)={0x28, 0x0, 0xffffffff, @reserved}, 0x10, 0x800) setxattr$security_evm(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.evm\x00', &(0x7f00000003c0)=@md5={0x1, "d2ba1009b38cac6ffa1c23ff0a649e85"}, 0x11, 0x1) 12:33:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000001c0)) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f00000003c0)) ioctl$FS_IOC_SETFLAGS(r2, 0x40046602, &(0x7f0000000380)=0x3) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) r4 = socket$inet(0x2, 0x5, 0x401) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f00000002c0)=0xe8) r5 = getegid() fchown(r4, 0x0, r5) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000300)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, &(0x7f0000000140)={0x0, 0x70, 0x0, 0x6, 0x0, 0x97, 0x0, 0x3, 0x10200, 0xd, 0x2, 0x799, 0x2, 0x7fffffff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6d6, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3, 0x8000, 0x4f20fb6f, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x9}, 0x80a8, 0x3, 0x0, 0x3, 0x0, 0x800, 0x1ff}) 12:33:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = fcntl$getown(r0, 0x9) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r3, 0x80045301, &(0x7f00000004c0)) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000500)=""/185) ptrace$cont(0x7, r1, 0xd11, 0x6) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) fanotify_init(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000009c0)={'ip6tnl0\x00'}) sendmsg$nl_route(r5, &(0x7f000001bfc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000000000000000008001b000000000008002b0004000200"], 0x1}}, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x414102, 0x0) ioctl$RTC_PIE_ON(r3, 0x7005) ioctl$FICLONERANGE(r4, 0x4020940d, &(0x7f000000a500)={r6, 0x0, 0x3e21, 0x528, 0x9aa}) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000005c0)) mmap$binder(&(0x7f000022b000/0x3000)=nil, 0x3000, 0x0, 0x10, r6, 0x40000001) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00000000c0), 0x1, 0x2000000000002) recvmmsg(r0, &(0x7f000000a340)=[{{&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000000100)=""/200, 0xc8}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000240)=""/49, 0x31}, {&(0x7f0000002480)=""/4096, 0x1000}], 0x5, &(0x7f0000003480)=""/4096, 0x1000, 0x3ff}, 0xffffffffbdb5b92d}, {{&(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000340)=""/4, 0x4}], 0x1, &(0x7f0000004480)=""/80, 0x50, 0xad3e}, 0x80}, {{&(0x7f0000004500)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000006880)=[{&(0x7f0000004580)=""/235, 0xeb}, {&(0x7f0000004680)=""/89, 0x59}, {&(0x7f0000004700)=""/166, 0xa6}, {&(0x7f00000047c0)=""/4096, 0x1000}, {&(0x7f00000057c0)=""/4096, 0x1000}, {&(0x7f00000067c0)=""/173, 0xad}], 0x6, &(0x7f00000068c0)=""/35, 0x23, 0x1}, 0x2}, {{&(0x7f0000006900)=@xdp, 0x80, &(0x7f0000007cc0)=[{&(0x7f0000006980)=""/195, 0xc3}, {&(0x7f0000006a80)=""/233, 0xe9}, {&(0x7f0000006b80)=""/61, 0x3d}, {&(0x7f0000006bc0)=""/223, 0xdf}, {&(0x7f0000006cc0)=""/4096, 0x1000}], 0x5, &(0x7f0000007d00)=""/222, 0xde, 0xfffffffffffffff8}, 0x3ff}, {{0x0, 0x0, &(0x7f0000008040)=[{&(0x7f0000007e00)=""/211, 0xd3}, {&(0x7f0000007f00)=""/104, 0x68}, {&(0x7f0000007f80)=""/175, 0xaf}], 0x3, &(0x7f0000008080)=""/90, 0x5a, 0x9}, 0x5}, {{&(0x7f0000008100), 0x80, &(0x7f0000008300)=[{&(0x7f0000008180)=""/132, 0x84}, {&(0x7f0000008240)=""/158, 0x9e}], 0x2, &(0x7f0000008340)=""/135, 0x87, 0x7}, 0x666}, {{&(0x7f0000008400)=@generic, 0x80, &(0x7f00000084c0)=[{&(0x7f0000008480)=""/33, 0x21}], 0x1, &(0x7f0000008500)=""/38, 0x26, 0x2}, 0x7ff}, {{&(0x7f0000008540)=@l2, 0x80, &(0x7f0000009940)=[{&(0x7f00000085c0)=""/153, 0x99}, {&(0x7f0000008680)=""/71, 0x47}, {&(0x7f0000008700)=""/162, 0xa2}, {&(0x7f00000087c0)=""/18, 0x12}, {&(0x7f0000008800)=""/123, 0x7b}, {&(0x7f0000008880)=""/157, 0x9d}, {&(0x7f0000008940)=""/4096, 0x1000}], 0x7, &(0x7f0000009980)=""/104, 0x68, 0x2}, 0xc6f}, {{0x0, 0x0, &(0x7f0000009b80)=[{&(0x7f0000009a00)=""/116, 0x74}, {&(0x7f0000009a80)=""/51, 0x33}, {&(0x7f0000009ac0)=""/138, 0x8a}], 0x3, &(0x7f0000009bc0)=""/147, 0x93, 0x400}, 0x6}, {{&(0x7f0000009c80)=@l2, 0x80, &(0x7f000000a240)=[{&(0x7f0000009d00)=""/70, 0x46}, {&(0x7f0000009d80)=""/190, 0xbe}, {&(0x7f0000009e40)=""/153, 0x99}, {&(0x7f0000009f00)=""/179, 0xb3}, {&(0x7f0000009fc0)=""/64, 0x40}, {&(0x7f000000a000)=""/140, 0x8c}, {&(0x7f000000a0c0)=""/188, 0xbc}, {&(0x7f000000a180)=""/191, 0xbf}], 0x8, &(0x7f000000a280)=""/185, 0xb9, 0x40}, 0x7fffffff}], 0xa, 0x1, &(0x7f000000a480)={0x77359400}) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000400)=@generic={0x3, "dfb643ef1bdf412da010d4c6963f2a772df25c6bb650a3c4421cc6a60f1403e4e25201ae6e7db85f113e67301c1c6591c1a4d0c8b70ca25500b26f28153080c8be2fd86e088390e0dae11248b427016c0d2dc3e0b6498eb11b213f5dfcae56d640a94000f4615e71f4e65f818bd6ab07f64c7a953ee0e707d919e3e7326b"}, 0x80, &(0x7f0000000300), 0x4, &(0x7f0000000340), 0x7c, 0x20000810}, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f000000a4c0)={0x5}, 0x4) getrandom(&(0x7f000000c040)=""/4096, 0x16fc32765183a523, 0x3) fcntl$setown(r5, 0x8, r1) 12:33:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r1 = getpgrp(0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000f, 0x800000000008031, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) process_vm_readv(r1, &(0x7f0000002380)=[{&(0x7f0000000100)=""/81, 0x51}], 0x1, &(0x7f0000002480)=[{&(0x7f0000002400)=""/70, 0x46}], 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 323.274493] audit: type=1800 audit(1539434023.950:101): pid=9599 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 12:33:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x800, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0xaa}}], [{@smackfshat={'smackfshat', 0x3d, "706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 323.347699] EXT4-fs (sda1): Cannot specify journal on remount 12:33:44 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\a\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000198000/0x3000)=nil, 0x3000, 0x20, 0x4d031, 0xffffffffffffffff, 0x2) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x1, 0x2, 0x1, "23b6666888"}, 0x15) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 323.604029] audit: type=1800 audit(1539434024.280:102): pid=9613 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 12:33:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 323.655245] EXT4-fs (sda1): Cannot specify journal on remount 12:33:44 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="008000a0ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x4001) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 324.079704] audit: type=1800 audit(1539434024.760:103): pid=9625 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16529 res=0 12:33:44 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) dup(r0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xd, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff69a4f09a4a8cff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b700000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) exit(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000001000), 0x1000) r2 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f0000000280)={0x0, r2}) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000180)={0x0, 0x0, {0x1e, 0x23, 0xa, 0x19, 0x6, 0x1ff, 0x1, 0xd4}}) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50}, 0x50) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r1, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) r3 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x81, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) ioctl$NBD_SET_SIZE_BLOCKS(r3, 0xab07, 0x100000000) write$FUSE_ENTRY(r1, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) [ 324.167343] EXT4-fs (sda1): Cannot specify journal on remount 12:33:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000001c0)) ioctl$FS_IOC_SETFLAGS(r2, 0x40046602, &(0x7f0000000380)=0x3) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) r4 = socket$inet(0x2, 0x0, 0x401) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@multicast1, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f00000002c0)=0xe8) r5 = getegid() fchown(r4, 0x0, r5) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000300)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, &(0x7f0000000140)={0x0, 0x70, 0x0, 0x6, 0x0, 0x97, 0x0, 0x3, 0x10200, 0xd, 0x2, 0x799, 0x2, 0x7fffffff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6d6, 0x0, 0x1, 0x9, 0x0, 0x0, 0x3, 0x8000, 0x4f20fb6f, 0x1, 0x3, 0x0, 0x0, 0x6, 0x0, 0x0, 0x7, 0x4, 0x10000, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x9}, 0x80a8, 0x3, 0x0, 0x3, 0x0, 0x800, 0x1ff}) 12:33:46 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\a\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x7, 0x3}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000280)={r1, 0x0, 0xaf, "bb03c497ae118c7cddc7d78a5b63629cd2d99b30c6412f8da451819a77b6d723cbca4c1f37c994180bb5af1051e080e436bdcf961aa6d2dd5a665f9aae479454eb5a7b460f56957cb5e023496436f9741deaebc0ec6d54de46564f9b79eb81085db0d9a726a491fc02ce00ab4d11942831fcbeee028bbfcbe24bccab79ed2795800a0313f16eb42169fdef6a5a8d931f074b8bb90b2190056e6802ef160778b7c85f24a320f19e6c25b0a65b7710f2"}, 0xb7) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) dup3(r0, r1, 0x80000) 12:33:46 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) dup(r0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xd, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff69a4f09a4a8cff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b700000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) exit(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000001000), 0x1000) r2 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f0000000280)={0x0, r2}) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000180)={0x0, 0x0, {0x1e, 0x23, 0xa, 0x19, 0x6, 0x1ff, 0x1, 0xd4}}) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50}, 0x50) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r1, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) r3 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x81, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) ioctl$NBD_SET_SIZE_BLOCKS(r3, 0xab07, 0x100000000) write$FUSE_ENTRY(r1, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) [ 326.155497] audit: type=1800 audit(1539434026.830:104): pid=9655 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16525 res=0 [ 326.240525] EXT4-fs (sda1): Cannot specify journal on remount 12:33:47 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0200", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000080)) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000000)={0x7, 0x6, 0x2, 0x0, 0x11}) 12:33:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x6) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, r1, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x850}, 0x40000) flock(r0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 326.464135] audit: type=1800 audit(1539434027.140:105): pid=9678 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 [ 326.503316] EXT4-fs (sda1): Cannot specify journal on remount 12:33:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:47 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, r0, 0x0, 0x8, &(0x7f0000000440)=':md5sum\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_procfs(r1, &(0x7f00000004c0)="6f295a4dba77") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x1004000000016) [ 326.790284] audit: type=1800 audit(1539434027.470:106): pid=9705 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16527 res=0 [ 326.825289] EXT4-fs (sda1): Cannot specify journal on remount 12:33:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0xfffffffffffffff9, 0x3f, 0xffa1}, 0x14) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:47 executing program 1: sysinfo(&(0x7f00000003c0)=""/4096) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x1f) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x4e22, @rand_addr=0x5}}, 0x100000000, 0x40, 0x100000000, "7b7f9aacc737828d14be78a47b75f5a72903be7ed591229401bdf04538f070eacfc4db4741bc792f3e8f52933d9645ca155f5f470cd6b3c517e66237a1ccab8d6482b486b759dddd9ec381a0f6a166e9"}, 0xd8) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) fcntl$addseals(r2, 0x409, 0x1) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000100)=0x13, 0x4) 12:33:47 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00l\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 327.040712] audit: type=1800 audit(1539434027.720:107): pid=9717 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16529 res=0 [ 327.078317] EXT4-fs (sda1): Cannot specify journal on remount 12:33:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r1}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") getsockname$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d, r1}, 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0x7) accept4$vsock_stream(r0, &(0x7f0000000240)={0x28, 0x0, 0x8, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") setsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f00000002c0)="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", 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000001ff0)={0x1d, r2}, 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x2) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240), 0x1aa, 0x0) pread64(r0, &(0x7f0000000000)=""/8, 0x8, 0x31) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000012c0)={0x0, @in6={{0xa, 0x4e21, 0x548, @local, 0x1}}, [0x911, 0x8, 0x5, 0xffff, 0x81, 0xff, 0x8, 0x3, 0x7, 0x5, 0x4, 0x2, 0xdfca, 0x3, 0x8]}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000013c0)=@assoc_value={r4, 0x401}, &(0x7f0000001400)=0x8) getsockopt$inet6_buf(r3, 0x29, 0xff, &(0x7f0000000000), &(0x7f0000000040)) 12:33:47 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ebffffff00", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e22, @loopback}]}, &(0x7f0000000080)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000440)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)={r1, 0x6b, "77aa0dd5f2c9f4fc50ebf1dad360822c2b7c459e5f310314250430b971e58cc4b9c3e688655367546736826762e6ea405a0e10190c5912028cf9f8df1b375af144ae9d7f4b3544062281cbe05f28b3967a6e3e8fe3ac5794de806e3754cbae64cb06231dd7e96550c0e41b"}, &(0x7f0000000300)=0x73) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) r2 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x4400, 0x0) pread64(r2, &(0x7f0000000340)=""/150, 0x96, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 327.308047] audit: type=1800 audit(1539434027.980:108): pid=9734 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16531 res=0 [ 327.344712] EXT4-fs (sda1): Cannot specify journal on remount 12:33:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x1004000000016) 12:33:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) connect$pppoe(r0, &(0x7f0000000280)={0x18, 0x0, {0x2, @random="558438b9dc5f", 'yam0\x00'}}, 0x1e) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000080)={@empty, r1}, 0x14) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") getsockname$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d, r1}, 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0x7) accept4$vsock_stream(r0, &(0x7f0000000240)={0x28, 0x0, 0x8, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f00000000c0)) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) remap_file_pages(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000000, 0x7, 0x100) 12:33:48 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='`\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 327.691268] audit: type=1800 audit(1539434028.370:109): pid=9753 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16537 res=0 [ 327.726373] EXT4-fs (sda1): Cannot specify journal on remount 12:33:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="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") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)={{0x108, 0x4, 0x100000000, 0x260, 0x210, 0x800, 0x3aa, 0xffffffffffff7673}, "31003d9429df3be231c6801052fe07696ecb94df40a232af3ba1b63392ae47d7602e56f4269bece9f90fba2a911254e780e9aff02cea7327cc3fe0ecbc33cc3d6c107b4be66a9e5263159a43f1812adddf7097e6871815070a8a221828def1b29de298c3ce6aaebd6c2c1f9303dbf4d548b2e2eb4476a4596f06b0ce8b3c", [[], []]}, 0x29e) pread64(r1, &(0x7f0000e3e000)=""/8, 0x8, 0x0) 12:33:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x1004000000016) 12:33:48 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001000", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:48 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0xfff, 0x272400) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000280)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a220f725067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43b4908000000000000e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000080)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x40000000006) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r3, 0xc0305302, &(0x7f0000000040)={0x3, 0x8000, 0x7f, 0xb3, 0x71b, 0x10000}) r4 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f00000002c0)=0x1) ptrace$getregset(0x4204, r2, 0x203, &(0x7f0000001300)={&(0x7f0000000300)=""/4096, 0x1000}) pread64(r4, &(0x7f0000001340)=""/8, 0x8, 0x103f00) 12:33:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") write$P9_RSTATFS(r0, &(0x7f0000000280)={0x43, 0x9, 0x1, {0x5, 0xfff, 0x2c1e, 0x7f, 0x8, 0x1, 0x6, 0x26, 0x20}}, 0x43) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000340)={r3, 0x9, 0xea, "85ad461abd193689f683890c84bc17285764a474b2683f6a6c61ec463a5f8b5cd3c9d49572d2cfcd17bf7902846a80b9f1e19e4033c8097f0284f6dd8287374adfc8974fc9a9db07bb7e3319877eb97bf1c79e14838667bae039f1880f9735641b0ba16dfb7043f8dd986b617c1216366858fc7ebfeaa648e70f7fd4627f489afdecf4f7417890f819149e4b29f260e41c272cd4008ec17f5d90478f59b96a74acbf6a97f1c5a62a8844246b7d1cbdeee2994c043cad53ce9a24c4479b9a208567281f37d94d36f351c8bfac8d159f9e3653928bcbef1f6c64b848f1cce6b44554ae7a092d246f2560ed"}, 0xf2) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) readv(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)=""/34, 0x22}], 0x2) [ 327.974321] audit: type=1800 audit(1539434028.650:110): pid=9771 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16520 res=0 [ 328.009413] EXT4-fs (sda1): Cannot specify journal on remount 12:33:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x1004000000016) 12:33:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x300000b, 0x10, r0, 0x4) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:49 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='z\f\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 328.544884] audit: type=1800 audit(1539434029.220:111): pid=9782 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 12:33:49 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000240)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000935000/0x3000)=nil, 0x3000, 0x0, 0x45031, r0, 0xfffffffffffffffd) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000280)=""/254) alarm(0x0) 12:33:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r0, 0x1f, 0xffffffffd69c2ff5, r0}) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 328.591799] EXT4-fs (sda1): Cannot specify journal on remount 12:33:49 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fdfdffff00", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pipe2(&(0x7f0000000000), 0x80800) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) socketpair(0x4, 0xe, 0x7, &(0x7f0000000040)) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xa9, "b592590d81801d4c759771db802d2b962414ab8995f4fead43601eb3600779010b7eb085db6e75faaaccc7c495a03d84a225f37e6abc79e0cce95995da01e0eb9d22d2296565fb6a2c2c391566725a389610729d7e4735bdce337c0684cc359fac890a190ad48552a0403f8a9a981889092e4cedbbb851a797a87204aad147bbc2bde4b7fe87efc28a17aa27a9e89c960b8fd090872b3d2bc92ac341f166a6443940f828e714529015"}, &(0x7f0000000280)=0xb1) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r2, 0x4}, &(0x7f0000000300)=0x8) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @hyper}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 328.822591] audit: type=1800 audit(1539434029.500:112): pid=9804 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16523 res=0 [ 328.853779] EXT4-fs (sda1): Cannot specify journal on remount 12:33:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x0) 12:33:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100)=0x3, 0x8) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000000c0)={r0}) fchdir(r0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pipe2(&(0x7f0000000000), 0x80800) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) socketpair(0x4, 0xe, 0x7, &(0x7f0000000040)) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:50 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="1000", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d610700c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf062003000000000000cf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494537174e6178b18a28a40ac24ab5a27651a5d9809a93e4ebdac48616b0c68122b0ffc88bb7f717213698fb7f278d1cf22688a5084fc9bbf7a2193f68f37f75cf1ba6c28af44ce222eef4dc6475bc1c25399ddfc117a382de124e8a32f52de62d3cf9ee2dbd7f196f58e316fdcc02e0dfffb1e2b49ae3666574fa3a35686bfd08be48cdac5082e46e96ca7234fe3d7ac6fdd6171000000000000000000") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xa9, "b592590d81801d4c759771db802d2b962414ab8995f4fead43601eb3600779010b7eb085db6e75faaaccc7c495a03d84a225f37e6abc79e0cce95995da01e0eb9d22d2296565fb6a2c2c391566725a389610729d7e4735bdce337c0684cc359fac890a190ad48552a0403f8a9a981889092e4cedbbb851a797a87204aad147bbc2bde4b7fe87efc28a17aa27a9e89c960b8fd090872b3d2bc92ac341f166a6443940f828e714529015"}, &(0x7f0000000280)=0xb1) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r2, 0x4}, &(0x7f0000000300)=0x8) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 329.463830] audit: type=1800 audit(1539434030.140:113): pid=9820 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16532 res=0 12:33:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000000c0)={0x4000000e}) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000240)) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xfffffffffffffedd, 0x0) [ 329.509254] EXT4-fs (sda1): Cannot specify journal on remount 12:33:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pipe2(&(0x7f0000000000), 0x80800) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) socketpair(0x4, 0xe, 0x7, &(0x7f0000000040)) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xa9, "b592590d81801d4c759771db802d2b962414ab8995f4fead43601eb3600779010b7eb085db6e75faaaccc7c495a03d84a225f37e6abc79e0cce95995da01e0eb9d22d2296565fb6a2c2c391566725a389610729d7e4735bdce337c0684cc359fac890a190ad48552a0403f8a9a981889092e4cedbbb851a797a87204aad147bbc2bde4b7fe87efc28a17aa27a9e89c960b8fd090872b3d2bc92ac341f166a6443940f828e714529015"}, &(0x7f0000000280)=0xb1) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r2, 0x4}, &(0x7f0000000300)=0x8) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:50 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\a\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f00000005c0)={0x1d, r2}, 0x10) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000280)=@req3={0x1, 0x100000000, 0x9, 0x2, 0xde, 0xff, 0x800}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)={0x0, 0x0}) syz_open_procfs(r3, &(0x7f0000000300)='net/if_inet6\x00') ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000080)=0x9) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@sha1={0x1, "26e513538908512b72364e27adf5418a50fd6265"}, 0x15, 0x1) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pipe2(&(0x7f0000000000), 0x80800) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 329.745771] audit: type=1800 audit(1539434030.420:114): pid=9840 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16530 res=0 12:33:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x0) 12:33:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xa9, "b592590d81801d4c759771db802d2b962414ab8995f4fead43601eb3600779010b7eb085db6e75faaaccc7c495a03d84a225f37e6abc79e0cce95995da01e0eb9d22d2296565fb6a2c2c391566725a389610729d7e4735bdce337c0684cc359fac890a190ad48552a0403f8a9a981889092e4cedbbb851a797a87204aad147bbc2bde4b7fe87efc28a17aa27a9e89c960b8fd090872b3d2bc92ac341f166a6443940f828e714529015"}, &(0x7f0000000280)=0xb1) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r2, 0x4}, &(0x7f0000000300)=0x8) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:51 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x2000, 0x0) connect$vsock_stream(r0, &(0x7f00000003c0)={0x28, 0x0, 0x2710, @hyper}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000240)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000000c0)="6a2f68e221762df59367d84140893b63", 0x10) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) getsockname$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) ioctl$FICLONE(r2, 0x40049409, r1) 12:33:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pipe2(&(0x7f0000000000), 0x80800) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000000040)=""/8, 0xfeeb, 0x103f00) 12:33:51 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffff8c00", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 330.386310] audit: type=1800 audit(1539434031.060:115): pid=9853 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16532 res=0 12:33:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xa9, "b592590d81801d4c759771db802d2b962414ab8995f4fead43601eb3600779010b7eb085db6e75faaaccc7c495a03d84a225f37e6abc79e0cce95995da01e0eb9d22d2296565fb6a2c2c391566725a389610729d7e4735bdce337c0684cc359fac890a190ad48552a0403f8a9a981889092e4cedbbb851a797a87204aad147bbc2bde4b7fe87efc28a17aa27a9e89c960b8fd090872b3d2bc92ac341f166a6443940f828e714529015"}, &(0x7f0000000280)=0xb1) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r2, 0x4}, &(0x7f0000000300)=0x8) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:51 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00H\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:51 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)=0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x4, 0x100) fcntl$addseals(r2, 0x409, 0xa) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) write$P9_RLERROR(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="018000000701000d002f6465762f646d6d6964692300f43ad6b9ce9322514ce81a76"], 0x16) ptrace$setsig(0x4203, 0x0, 0x3, &(0x7f0000000040)={0x3c, 0xd6b6, 0x6, 0x401}) fsetxattr(r1, &(0x7f0000000280)=@known='trusted.overlay.origin\x00', &(0x7f0000000300)='[$-selinux.tnodev\x00', 0x12, 0x3) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) fgetxattr(r2, &(0x7f0000000380)=@random={'btrfs.', '\x00'}, &(0x7f00000003c0)=""/115, 0x73) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x80, 0x8100) 12:33:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pipe2(&(0x7f0000000000), 0x80800) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xa9, "b592590d81801d4c759771db802d2b962414ab8995f4fead43601eb3600779010b7eb085db6e75faaaccc7c495a03d84a225f37e6abc79e0cce95995da01e0eb9d22d2296565fb6a2c2c391566725a389610729d7e4735bdce337c0684cc359fac890a190ad48552a0403f8a9a981889092e4cedbbb851a797a87204aad147bbc2bde4b7fe87efc28a17aa27a9e89c960b8fd090872b3d2bc92ac341f166a6443940f828e714529015"}, &(0x7f0000000280)=0xb1) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r2, 0x4}, &(0x7f0000000300)=0x8) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="e100000043fc716e626ce2371d04fdab0c6bf5ef13ab9fb441b7d56341b4bf6bbfbf784914a008b0ae7c9df29aab4d5c8ed94882cd2ec511065d70ff4fe78cbbfb6784a0c67f0d7e4b5e94b7aaca679622bb84cbabb9556db8bafb606a83e53849529e7811096220806752da93c4dda47e90899b15c1fd24a1a32d16a92fc972d3efbf74bcac6f365253466548ef1cbacf478e726a732dc96088f7771f04f6eeba013edbf6ad708d38a0d5425f2de92e74863d39362fd3f960f9a2722ed74bd1f2c48816669e2cdbab71c6cd6ff83a412bc8f32477dbea17ff6bee64ab078345228b1f7177"], &(0x7f0000000000)=0xe9) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={r1, 0x3f}, 0xc) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 330.664438] audit: type=1800 audit(1539434031.340:116): pid=9874 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16531 res=0 12:33:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x0) 12:33:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) getsockname$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0xffffffe9) r3 = socket(0xd, 0xb, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000280)={'vcan0\x00', r2}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000240)={0x40000000}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r4}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) write$nbd(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="674466980100000004000300020000008b26b64198eb1fbad14b242e51d32bce3e8754fe694e2c6022c58cea34a44385129169a8f017567a9602835b08cc5c5ce230d470865ac21bad990135ca29d5196877af5754f9496c"], 0x58) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f00000002c0)={0x2, 0x200}) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pipe2(&(0x7f0000000000), 0x80800) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:52 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xa9, "b592590d81801d4c759771db802d2b962414ab8995f4fead43601eb3600779010b7eb085db6e75faaaccc7c495a03d84a225f37e6abc79e0cce95995da01e0eb9d22d2296565fb6a2c2c391566725a389610729d7e4735bdce337c0684cc359fac890a190ad48552a0403f8a9a981889092e4cedbbb851a797a87204aad147bbc2bde4b7fe87efc28a17aa27a9e89c960b8fd090872b3d2bc92ac341f166a6443940f828e714529015"}, &(0x7f0000000280)=0xb1) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r2, 0x4}, &(0x7f0000000300)=0x8) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x2, 0x70, 0x2, 0x9, 0x3, 0x5, 0x0, 0xfff, 0x66810, 0x1, 0x60ec, 0x4, 0x17, 0x3f, 0x9, 0x4, 0x0, 0x3, 0xfc00000000000000, 0xd9ef, 0xff, 0x5, 0xfffffffffffffffc, 0x87, 0x20, 0x6, 0x6, 0x5, 0x81, 0x8, 0xff, 0x8, 0x614f, 0x5, 0x1, 0x3, 0x1, 0xe9, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000000), 0x5}, 0x4, 0x200, 0x5, 0x1, 0x1d, 0x7, 0x7e5}) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xfffffffffffffe11, 0x0) 12:33:52 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00 \x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 331.366581] audit: type=1800 audit(1539434032.040:117): pid=9889 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16519 res=0 [ 331.406864] EXT4-fs: 3 callbacks suppressed [ 331.406875] EXT4-fs (sda1): Cannot specify journal on remount 12:33:52 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xa9, "b592590d81801d4c759771db802d2b962414ab8995f4fead43601eb3600779010b7eb085db6e75faaaccc7c495a03d84a225f37e6abc79e0cce95995da01e0eb9d22d2296565fb6a2c2c391566725a389610729d7e4735bdce337c0684cc359fac890a190ad48552a0403f8a9a981889092e4cedbbb851a797a87204aad147bbc2bde4b7fe87efc28a17aa27a9e89c960b8fd090872b3d2bc92ac341f166a6443940f828e714529015"}, &(0x7f0000000280)=0xb1) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r2, 0x4}, &(0x7f0000000300)=0x8) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pipe2(&(0x7f0000000000), 0x80800) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000000)={'vlan0\x00', @ifru_ivalue=0x5}) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:52 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0500", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x200, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x640b) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl(r1, 0x6, &(0x7f0000000240)="a5492117a132bc9c15e1e4fb1e936d1bd10ecafd2ae33e1b8e1814f8c86ce63227a3a199a6727ac8918b67e36f3debb20361eb4c1b5f5d633bd6ef731e87a9e91b89f02db40b12ed69699c94242e6011d24857a602ae5ebba1146cb1cd8024f662b692b3ff72f47245c3bca70601f3b39b2c3cb8448ff0c6757f309cb4c754e11f4c3d9c43cf0c023a2b525292aaabb000a243fbaa0da129ce13e7bdd54d9aeedfe8f3e67e80487a172890469d3c999f2164237808acbc731a3a954d6c79e7ea26bc23fa5c477aeda033cc78e7fd9bcff0c3") write$P9_RMKNOD(r0, &(0x7f0000000100)={0x14, 0x13, 0x2, {0x12, 0x1, 0x5}}, 0x14) pread64(r1, &(0x7f00000000c0)=""/8, 0x8, 0x103f00) 12:33:52 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xa9, "b592590d81801d4c759771db802d2b962414ab8995f4fead43601eb3600779010b7eb085db6e75faaaccc7c495a03d84a225f37e6abc79e0cce95995da01e0eb9d22d2296565fb6a2c2c391566725a389610729d7e4735bdce337c0684cc359fac890a190ad48552a0403f8a9a981889092e4cedbbb851a797a87204aad147bbc2bde4b7fe87efc28a17aa27a9e89c960b8fd090872b3d2bc92ac341f166a6443940f828e714529015"}, &(0x7f0000000280)=0xb1) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r2, 0x4}, &(0x7f0000000300)=0x8) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 331.718472] EXT4-fs (sda1): Cannot specify journal on remount 12:33:52 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x3, 0x2) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pipe2(&(0x7f0000000000), 0x80800) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xa9, "b592590d81801d4c759771db802d2b962414ab8995f4fead43601eb3600779010b7eb085db6e75faaaccc7c495a03d84a225f37e6abc79e0cce95995da01e0eb9d22d2296565fb6a2c2c391566725a389610729d7e4735bdce337c0684cc359fac890a190ad48552a0403f8a9a981889092e4cedbbb851a797a87204aad147bbc2bde4b7fe87efc28a17aa27a9e89c960b8fd090872b3d2bc92ac341f166a6443940f828e714529015"}, &(0x7f0000000280)=0xb1) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x3000, 0x54000010, &(0x7f000020d000/0x3000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000240)='bpf\x00', 0x800000, &(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRESDEC=r3, @ANYBLOB="79cc"]) shmat(r2, &(0x7f00007d6000/0x4000)=nil, 0x1000) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r6, 0x40045564, 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000480)='syz1\x00', r0}, 0x10) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f00000006c0), &(0x7f0000000740)=0x60) ioctl$TIOCGLCKTRMIOS(r6, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000002c0)) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000001c0)=0x4) creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$UI_SET_LEDBIT(r6, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(r6, 0x40045569, 0x9) ioctl$UI_DEV_SETUP(r6, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r0) ioctl$UI_DEV_DESTROY(r6, 0x5502) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r5}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0x8, 0x103f00) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="a5e80539b08b50d1053955bc02e06a1e", 0x10) 12:33:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x0) [ 332.277999] EXT4-fs (sda1): Cannot specify journal on remount [ 332.306347] input:  as /devices/virtual/input/input5 12:33:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pipe2(&(0x7f0000000000), 0x80800) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xa9, "b592590d81801d4c759771db802d2b962414ab8995f4fead43601eb3600779010b7eb085db6e75faaaccc7c495a03d84a225f37e6abc79e0cce95995da01e0eb9d22d2296565fb6a2c2c391566725a389610729d7e4735bdce337c0684cc359fac890a190ad48552a0403f8a9a981889092e4cedbbb851a797a87204aad147bbc2bde4b7fe87efc28a17aa27a9e89c960b8fd090872b3d2bc92ac341f166a6443940f828e714529015"}, &(0x7f0000000280)=0xb1) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:53 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000010", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip6_flowlabel\x00') connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(r0, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000000)={0x0, 0x360d}) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', r1}) 12:33:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pipe2(&(0x7f0000000000), 0x80800) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 332.540099] kauditd_printk_skb: 2 callbacks suppressed [ 332.540113] audit: type=1800 audit(1539434033.220:120): pid=9942 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16523 res=0 12:33:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000240)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)={r1, 0x80000, r0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sched_setattr(r4, &(0x7f0000000100)={0x30, 0x2, 0x1, 0x0, 0x2, 0xffffffffffff8000, 0x3}, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 332.588243] EXT4-fs (sda1): Cannot specify journal on remount 12:33:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4000, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:53 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r1}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) 12:33:53 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 332.777195] audit: type=1800 audit(1539434033.450:121): pid=9964 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16531 res=0 [ 332.810321] EXT4-fs (sda1): Cannot specify journal on remount 12:33:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x3000, 0x54000010, &(0x7f000020d000/0x3000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000240)='bpf\x00', 0x800000, &(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRESDEC=r3, @ANYBLOB="79cc"]) shmat(r2, &(0x7f00007d6000/0x4000)=nil, 0x1000) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r6, 0x40045564, 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000480)='syz1\x00', r0}, 0x10) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f00000006c0), &(0x7f0000000740)=0x60) ioctl$TIOCGLCKTRMIOS(r6, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000002c0)) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000001c0)=0x4) creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$UI_SET_LEDBIT(r6, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(r6, 0x40045569, 0x9) ioctl$UI_DEV_SETUP(r6, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r0) ioctl$UI_DEV_DESTROY(r6, 0x5502) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r5}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0x8, 0x103f00) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="a5e80539b08b50d1053955bc02e06a1e", 0x10) 12:33:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pipe2(&(0x7f0000000000), 0x80800) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000240)) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:53 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 333.117533] audit: type=1800 audit(1539434033.790:122): pid=9971 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16525 res=0 12:33:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 333.164211] EXT4-fs (sda1): Cannot specify journal on remount 12:33:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pipe2(&(0x7f0000000000), 0x80800) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x91, 0x2a, &(0x7f0000000240)="c7f5c4c62208ede7ef0cd37f87298cb5e8b2cfec025e3d16c2d619447b6ffc42674eca034cc068f2b3f310124b7818d7c67644b2f26d3064d9fa7349cd78116e93092d6c42575438c5da44228b3b113b146a956248e759bff2100e597269c483eeb93e9ad24a1b8a3d953aa58e993a81f77dde4c81208830cad2d0e4140b33b6ff72af99cc0bbaa7127c5e12610503c424", &(0x7f00000000c0)=""/42, 0x2}, 0x28) 12:33:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:53 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="008000a000", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 333.254806] input:  as /devices/virtual/input/input7 12:33:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pipe2(&(0x7f0000000000), 0x80800) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 333.398619] audit: type=1800 audit(1539434034.070:123): pid=9995 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 [ 333.425425] EXT4-fs (sda1): Cannot specify journal on remount 12:33:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000935000/0x3000)=nil, 0x3000, 0x0, 0x45031, r0, 0xfffffffffffffffd) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000280)=""/254) alarm(0x0) 12:33:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x3000, 0x54000010, &(0x7f000020d000/0x3000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000240)='bpf\x00', 0x800000, &(0x7f0000000780)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303030352c66f36e616d653d776c616e313a2b6d643573756d2c646f6e745f61707072616973652c6f626a5f726f6c653d706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71c010041fb2e79e41f574eebe115e17dd84617cbe41bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e4576c7e59495e6fd857b6b2460c89298b2c4b9a1ae24942c7569643d74fcffda12d6b791ce1c6d9285fb90a7428a83e02e103b3fcba452ea7e31e6a16e32bc80a19882eed413974990c07022b0fa381583d3de6178d6ec48fba9f75407ef3df3505306abd656428ea3b3b3fb8b3a32a065e51d3c7b55408c8da007c3419dcf260648a000d94da711edcc7f779fc5651a33038c7949158507af5cbcaa548ea85924efc899baff4762e67922944bd0b62dcfa6c1aada91e3e098591b04ffc0498377045866c669a31a0006a6eca0d2dcdc62e181c4986e74d931ce198e0d4a5b21b4ad83b5d1b56fbe1fd32201061e62", @ANYRESDEC=r3, @ANYBLOB="79cc"]) shmat(r2, &(0x7f00007d6000/0x4000)=nil, 0x1000) r4 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r6, 0x40045564, 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000480)='syz1\x00', r0}, 0x10) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f00000006c0), &(0x7f0000000740)=0x60) ioctl$TIOCGLCKTRMIOS(r6, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000002c0)) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000001c0)=0x4) creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$UI_SET_LEDBIT(r6, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(r6, 0x40045569, 0x9) ioctl$UI_DEV_SETUP(r6, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r0) ioctl$UI_DEV_DESTROY(r6, 0x5502) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r5}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0x8, 0x103f00) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="a5e80539b08b50d1053955bc02e06a1e", 0x10) 12:33:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0xa240, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000240)={{0x2, 0x4e24, @broadcast}, {0x7, @remote}, 0x0, {0x2, 0x4e21, @rand_addr=0x5}, 'bond_slave_1\x00'}) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:54 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000200", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 333.597924] input:  as /devices/virtual/input/input8 [ 333.617139] audit: type=1800 audit(1539434034.290:124): pid=10011 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 12:33:54 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 333.655711] EXT4-fs (sda1): Cannot specify journal on remount 12:33:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r3) 12:33:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000240)={{0x2, 0x4, 0x0, 0x1, 'syz0\x00', 0x9}, 0x1, [0x3, 0x9, 0x100000001, 0x7, 0x7, 0x429, 0x6, 0x6, 0x5, 0x3f, 0x401, 0x9, 0xffffffffffffffff, 0x3f, 0x4, 0xbe, 0xffffffffffffffc0, 0x0, 0x4a0d, 0x8001, 0x0, 0x1ff, 0x9, 0x81, 0x1000, 0x8, 0xa1, 0x2, 0x3, 0xfff, 0x81, 0x0, 0x10001, 0x5, 0x40, 0xf1, 0x1f, 0xdf, 0x1, 0x9, 0x1, 0x200, 0x3, 0x5, 0x9, 0x5, 0x63, 0x4, 0x81, 0x1, 0x9, 0x5, 0x8, 0x4, 0x2, 0x40, 0x2, 0x3, 0x81, 0x0, 0x40, 0x5, 0x2, 0x3, 0x1, 0x80000000, 0x400, 0xb5, 0x80, 0x5, 0x7, 0x800, 0xfffffffffffffff9, 0x1, 0x81, 0x100000001, 0x40, 0xbbd1, 0x18, 0x7, 0x9, 0x9, 0x25, 0x10001, 0x6, 0x1, 0x400, 0x2, 0x4, 0x1, 0x7561, 0x5, 0x8, 0x6, 0x8afd, 0x9, 0x7, 0x400, 0x1, 0x7fff, 0x7, 0xba, 0x5, 0x3, 0x3ff, 0x6, 0x5, 0x7, 0x3, 0x4, 0x0, 0x8, 0x9, 0xf9, 0x95, 0x4, 0x5, 0x80000000, 0x3, 0x0, 0x400, 0xffffffffffffffe0, 0x4, 0x7, 0x87f600, 0x2, 0x0, 0x400], {0x0, 0x989680}}) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:54 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='t\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x1004000000016) 12:33:54 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x9) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 333.836160] audit: type=1800 audit(1539434034.510:125): pid=10027 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16527 res=0 [ 333.875156] EXT4-fs (sda1): Cannot specify journal on remount 12:33:54 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x5) pread64(r0, &(0x7f0000e3e000)=""/8, 0x8, 0x200000103f00) 12:33:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:54 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:54 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x9) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:54 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x10b000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000380)=0x8, 0x1d6cb504) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x400800, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = semget$private(0x0, 0x1, 0x200) semctl$SEM_INFO(r2, 0x5, 0x13, &(0x7f0000000280)=""/9) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000240)={0x1d, r4}, 0x8) mmap(&(0x7f0000184000/0x3000)=nil, 0x3000, 0x0, 0x4d031, r3, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 334.113081] audit: type=1800 audit(1539434034.790:126): pid=10046 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16526 res=0 [ 334.140116] EXT4-fs (sda1): Cannot specify journal on remount 12:33:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x9) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000500)={0x14}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, 0x0, &(0x7f0000000680)=""/57, 0x39) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000002900)='/dev/audio\x00', 0x10000000000801, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000380)=""/40, &(0x7f00000003c0)=0x28) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000540)={0x14}, 0x14) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001400)=ANY=[], 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000001440)={0x0, 0x1}, &(0x7f0000001480)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000014c0)=@sack_info={0x0, 0x19}, &(0x7f00000001c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000100)=[{0x1f, 0x0, 0x0, 0x1ff}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000001540)={0x0, &(0x7f0000001500)}) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x109040) socket$bt_rfcomm(0x1f, 0x0, 0x3) preadv(0xffffffffffffffff, &(0x7f0000002880), 0x0, 0x0) connect$can_bcm(r0, &(0x7f0000000000), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) 12:33:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:55 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffffffa0", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x0, {0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1e}, 0x1000}, r4}}, 0x38) 12:33:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(r1, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x1fffffffffffe, 0x8070, r0, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 334.688442] audit: type=1800 audit(1539434035.350:127): pid=10068 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16537 res=0 12:33:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:55 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffffeb00", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f00000000c0)=0x2, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f00002e9000/0x200000)=nil, 0x200000, 0x0, 0x4000000004d031, r1, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 335.006562] audit: type=1800 audit(1539434035.680:128): pid=10092 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 12:33:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$llc(r0, 0x0, &(0x7f00000000c0), 0x800) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:55 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00-\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:55 executing program 5: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@ipv4={[], [], @loopback}, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f00000006c0)=0xe8) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) r3 = shmat(0x0, &(0x7f00009bd000/0x7000)=nil, 0x7000) shmdt(r3) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r4}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) semget(0x2, 0x2, 0x80) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000340)={0x0, 0x6, 0x4, 0x0, 0x2, 0x9, 0x4, 0x80000000, {0x0, @in6={{0xa, 0x4e24, 0x6, @mcast2, 0x40}}, 0x1, 0x10001, 0x8, 0x9, 0x3}}, &(0x7f0000000400)=0xb0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000440)={0xc330, 0x200, 0x40, 0x9, r5}, 0x10) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x22100001}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="04002cbd7000fcdbdf25050000002400070008000100", @ANYRES32=r1, @ANYBLOB='\b\x00$\x00', @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="0c0003000000000001000000"], 0x44}, 0x1, 0x0, 0x0, 0x4000050}, 0x80) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000480)={0x200, 0x814}) 12:33:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 335.271292] audit: type=1800 audit(1539434035.950:129): pid=10112 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16519 res=0 12:33:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000500", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x401, 0x101000) r2 = socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000100)=0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$llc(r0, 0x0, &(0x7f00000000c0), 0x800) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0), 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) signalfd4(r0, &(0x7f0000000000)={0x2}, 0x8, 0x80800) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0xa4011, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000240)={0xb, 'syz0\x00', 'syz1\x00', 'syz0\x00', 0xf8, 0x0, 0x43, 0x6, 0x1000000000, 0x8, "8699b9d787faa2951dc14a333f57c192ea7481c73a5144a16c734f9f7912ead55619f5b134e90b10bad26d0f31aa99c380e000a4798ed55d7bbb2cb3eeaf8ae6c663380ad395f2582b5c8c23f8b4246a57050664a910a28e3646a0fca63f051b0c51c2fb2b983c2d601c419321f0bac1b0528e0d0809901fb41a619cb3d9693a63275c8a01bea63636efb100a6f9329f14189c0ab858aeb7d2406d91df63360c31a0107daebb2a8b935c0b74a2781df3539d2399146f018354e298fd81f53cc5c2db999f681681c8cb3e76cdd154082c66224def4994df9f2d48d4e18cd98fe2cbab1e26d5620d4cd5666b2ca672a57d5b3a1906bd236c6f"}, 0x210) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="001f00", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000000)) connect$can_bcm(r1, &(0x7f0000001ff0), 0x3e6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="00001000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={r2, 0x6}, 0x8) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x6) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x210001, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x3d, &(0x7f0000000280)=""/245, &(0x7f0000000040)=0xf5) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000080), 0x279) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000400)={0x0, 0x9, 0x800, 0x7, 0x4, 0x9, 0x703, 0xff, {0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x7ff, 0x7, 0x0, 0x7, 0x1ff}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000380)=@assoc_value={r4, 0x1}, 0x8) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 12:33:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) accept4$packet(r0, &(0x7f0000000100), &(0x7f0000000240)=0x14, 0x80000) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000340)={@multicast2, @broadcast, 0x0}, &(0x7f0000000380)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000300)={'vcan0\x00', r2}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000000)) connect$can_bcm(r1, &(0x7f0000001ff0), 0x3e6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="00001000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={r2, 0x6}, 0x8) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x78, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e22}, @in6={0xa, 0x4e23, 0x7, @remote, 0x100000001}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e23, @rand_addr=0x1}, @in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}, 0xfff}]}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0)={r1, 0x400, 0x80000000, 0x8}, &(0x7f0000000300)=0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) getsockname$unix(r0, &(0x7f0000000340)=@abs, &(0x7f00000003c0)=0x6e) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 335.837350] Dead loop on virtual device ip6_vti0, fix it urgently! 12:33:56 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000300", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 335.918705] Dead loop on virtual device ip6_vti0, fix it urgently! [ 335.956162] Dead loop on virtual device ip6_vti0, fix it urgently! [ 335.989422] Dead loop on virtual device ip6_vti0, fix it urgently! [ 336.016956] Dead loop on virtual device ip6_vti0, fix it urgently! 12:33:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000000)) connect$can_bcm(r1, &(0x7f0000001ff0), 0x3e6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="00001000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={r2, 0x6}, 0x8) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x0, @my}, 0x10, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 336.058644] Dead loop on virtual device ip6_vti0, fix it urgently! 12:33:56 executing program 1: syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r1}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x1ec, 0x0) 12:33:57 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x6) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x210001, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x3d, &(0x7f0000000280)=""/245, &(0x7f0000000040)=0xf5) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000080), 0x279) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000400)={0x0, 0x9, 0x800, 0x7, 0x4, 0x9, 0x703, 0xff, {0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x7ff, 0x7, 0x0, 0x7, 0x1ff}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000380)=@assoc_value={r4, 0x1}, 0x8) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 12:33:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x0) 12:33:57 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='L\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) openat$userio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/userio\x00', 0x102, 0x0) mq_timedsend(r0, &(0x7f0000000100)="cce8cb054e4b207e65556beaa66f1ee596", 0x11, 0x1, &(0x7f0000000240)) connect$can_bcm(r0, &(0x7f0000001ff0), 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f00000002c0)=""/8, 0x8, 0x0) [ 336.608664] EXT4-fs: 6 callbacks suppressed [ 336.608674] EXT4-fs (sda1): Cannot specify journal on remount 12:33:57 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='z\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x0) 12:33:57 executing program 5 (fault-call:6 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f000047b000/0x1000)=nil, 0x1000}, 0x2}) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) r3 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x10, 0x10080) ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x1, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e21, @remote}, 0x66, 0x4, 0xff, 0x1, 0x6, &(0x7f0000000240)='gre0\x00', 0x1000, 0x200, 0x9}) 12:33:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 336.847655] Dead loop on virtual device ip6_vti0, fix it urgently! [ 336.934383] EXT4-fs (sda1): Cannot specify journal on remount [ 336.977449] FAULT_INJECTION: forcing a failure. [ 336.977449] name failslab, interval 1, probability 0, space 0, times 0 [ 337.086918] CPU: 0 PID: 10210 Comm: syz-executor5 Not tainted 4.19.0-rc7+ #58 [ 337.094238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.103606] Call Trace: [ 337.106222] dump_stack+0x1c4/0x2b4 [ 337.109911] ? dump_stack_print_info.cold.2+0x52/0x52 [ 337.115129] ? print_usage_bug+0xc0/0xc0 [ 337.119208] ? __lock_acquire+0x7ec/0x4ec0 [ 337.123467] ? finish_task_switch+0x1f5/0x900 [ 337.127996] should_fail.cold.4+0xa/0x17 [ 337.132074] ? print_usage_bug+0xc0/0xc0 [ 337.136161] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 337.141282] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 337.146096] ? mark_held_locks+0xc7/0x130 [ 337.150260] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 337.155035] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 337.159809] ? lockdep_hardirqs_on+0x421/0x5c0 [ 337.164405] ? retint_kernel+0x2d/0x2d [ 337.168307] ? trace_hardirqs_on_caller+0xc0/0x310 [ 337.173255] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 337.178028] ? trace_hardirqs_off+0x310/0x310 [ 337.182561] ? find_held_lock+0x36/0x1c0 [ 337.186650] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 337.191435] ? retint_kernel+0x2d/0x2d [ 337.195357] __should_failslab+0x124/0x180 [ 337.199620] should_failslab+0x9/0x14 [ 337.203467] kmem_cache_alloc_trace+0x2d7/0x750 [ 337.208150] ? trace_hardirqs_off+0x310/0x310 [ 337.212667] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 337.217452] virtio_transport_alloc_pkt+0xd1/0xa90 [ 337.222418] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 337.227197] ? virtio_transport_do_socket_init+0x560/0x560 [ 337.232857] ? retint_kernel+0x2d/0x2d [ 337.236778] virtio_transport_send_pkt_info+0x200/0x460 [ 337.242169] virtio_transport_connect+0x17c/0x220 [ 337.247030] ? virtio_transport_send_pkt_info+0x460/0x460 [ 337.252651] ? vsock_auto_bind+0xa9/0xe0 [ 337.256758] vsock_stream_connect+0x4ed/0xe40 [ 337.261279] ? vsock_dgram_connect+0x500/0x500 [ 337.265877] ? lock_downgrade+0x900/0x900 [ 337.270048] ? lock_release+0x970/0x970 [ 337.274042] ? arch_local_save_flags+0x40/0x40 [ 337.278643] ? finish_wait+0x430/0x430 [ 337.282561] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 337.287774] ? smack_socket_connect+0x13f/0x1c0 [ 337.292466] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 337.298076] ? security_socket_connect+0x94/0xc0 [ 337.302912] __sys_connect+0x37d/0x4c0 [ 337.306825] ? __ia32_sys_accept+0xb0/0xb0 [ 337.311054] ? __sb_end_write+0xd9/0x110 [ 337.315122] ? fput+0x130/0x1a0 [ 337.318404] ? do_syscall_64+0x9a/0x820 [ 337.322380] ? do_syscall_64+0x9a/0x820 [ 337.326377] ? lockdep_hardirqs_on+0x421/0x5c0 [ 337.330951] ? trace_hardirqs_on+0xbd/0x310 [ 337.335281] ? __ia32_sys_read+0xb0/0xb0 [ 337.339336] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.344693] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 337.350162] __x64_sys_connect+0x73/0xb0 [ 337.354217] do_syscall_64+0x1b9/0x820 [ 337.358100] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 337.363475] ? syscall_return_slowpath+0x5e0/0x5e0 [ 337.368413] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 337.373267] ? trace_hardirqs_on_caller+0x310/0x310 [ 337.378294] ? prepare_exit_to_usermode+0x291/0x3b0 [ 337.383348] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 337.388191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.393388] RIP: 0033:0x457569 [ 337.396571] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.415481] RSP: 002b:00007fecbda2ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 337.423188] RAX: ffffffffffffffda RBX: 00007fecbda2ec90 RCX: 0000000000457569 [ 337.430459] RDX: 0000000000000010 RSI: 0000000020000200 RDI: 0000000000000005 [ 337.437748] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 337.445021] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fecbda2f6d4 [ 337.452286] R13: 00000000004bdb06 R14: 00000000004cc658 R15: 0000000000000006 12:33:58 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:33:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x0) 12:33:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000380)="6e65742f736f66748965745f73746107007d1a59c55df81f2d5e027042b6cb3c8ea75dcace6cb6cc7f784942f05fd6eb81c3a2087203858f28f9dc98b24b7e8b00495a8bd95e80b88612923478f2ad8791986a12ab9d2d9275bf422841586fb8b327564bce65cc3e2cca71c659bd7b25c507056c94270a8725db1f2231e3081b178faa998dbbcaf5eaa6b967") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00'}) accept4$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0xa, 0x2080000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', r2}) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000280)={0xb4, 0x8001}) mmap(&(0x7f000055c000/0x1000)=nil, 0x1000, 0x0, 0x80010, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x8, 0x103efc) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000100)={0xc000000000000000, 0x1}) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000140)=0xfffffffffffffff9) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000440)=""/146) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000240)=0xff) 12:33:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x0) 12:33:58 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:58 executing program 5 (fault-call:6 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 337.588523] kauditd_printk_skb: 5 callbacks suppressed [ 337.588547] audit: type=1800 audit(1539434038.260:135): pid=10232 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 [ 337.610402] FAULT_INJECTION: forcing a failure. [ 337.610402] name failslab, interval 1, probability 0, space 0, times 0 12:33:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$TCFLSH(r0, 0x540b, 0x808f) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x0) [ 337.633321] EXT4-fs (sda1): Cannot specify journal on remount [ 337.673035] CPU: 1 PID: 10233 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 337.680336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.689700] Call Trace: [ 337.692308] dump_stack+0x1c4/0x2b4 [ 337.695961] ? dump_stack_print_info.cold.2+0x52/0x52 [ 337.701178] should_fail.cold.4+0xa/0x17 [ 337.705260] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 337.710380] ? rcu_bh_qs+0xc0/0xc0 [ 337.713938] ? __netlink_insert+0xd2c/0x13b0 [ 337.718359] ? __netlink_insert+0xd2c/0x13b0 [ 337.722777] ? graph_lock+0x170/0x170 [ 337.726633] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 337.726650] ? graph_lock+0x170/0x170 [ 337.726668] ? graph_lock+0x170/0x170 [ 337.736013] ? find_held_lock+0x36/0x1c0 [ 337.736052] ? ___might_sleep+0x1ed/0x300 [ 337.748112] ? __local_bh_enable_ip+0x160/0x260 [ 337.752816] ? arch_local_save_flags+0x40/0x40 [ 337.757416] ? trace_hardirqs_on+0xbd/0x310 [ 337.761753] ? _raw_spin_unlock_bh+0x30/0x40 [ 337.766181] __should_failslab+0x124/0x180 [ 337.770432] should_failslab+0x9/0x14 [ 337.774253] kmem_cache_alloc_node+0x26e/0x730 [ 337.778851] ? __local_bh_enable_ip+0x160/0x260 [ 337.783534] ? _raw_spin_unlock_bh+0x30/0x40 [ 337.787964] __alloc_skb+0x119/0x770 [ 337.791699] ? skb_scrub_packet+0x490/0x490 [ 337.796043] ? netlink_insert+0x15a/0x3f0 [ 337.800214] ? __netlink_insert+0x13b0/0x13b0 [ 337.804750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 337.810345] ? netlink_autobind.isra.34+0x232/0x310 [ 337.815423] netlink_sendmsg+0xb29/0xfc0 [ 337.819505] ? netlink_unicast+0x760/0x760 [ 337.823762] ? smack_socket_sendmsg+0xb0/0x190 [ 337.828360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 337.833917] ? security_socket_sendmsg+0x94/0xc0 [ 337.838685] ? netlink_unicast+0x760/0x760 [ 337.842955] sock_sendmsg+0xd5/0x120 [ 337.846687] ___sys_sendmsg+0x7fd/0x930 [ 337.850672] ? find_held_lock+0x36/0x1c0 [ 337.854759] ? copy_msghdr_from_user+0x580/0x580 [ 337.859782] ? lock_downgrade+0x900/0x900 [ 337.863958] ? proc_fail_nth_write+0x9e/0x210 [ 337.868475] ? __fget_light+0x2e9/0x430 [ 337.872480] ? fget_raw+0x20/0x20 [ 337.875958] ? kasan_check_write+0x14/0x20 [ 337.880208] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 337.885160] ? wait_for_completion+0x8a0/0x8a0 [ 337.889770] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 337.895320] ? sockfd_lookup_light+0xc5/0x160 [ 337.899830] __sys_sendmsg+0x11d/0x280 [ 337.903739] ? __ia32_sys_shutdown+0x80/0x80 [ 337.908164] ? __sb_end_write+0xd9/0x110 [ 337.912243] ? fput+0x130/0x1a0 [ 337.915538] ? do_syscall_64+0x9a/0x820 [ 337.919533] ? do_syscall_64+0x9a/0x820 [ 337.923542] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 337.929024] __x64_sys_sendmsg+0x78/0xb0 [ 337.933103] do_syscall_64+0x1b9/0x820 [ 337.937010] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 337.942391] ? syscall_return_slowpath+0x5e0/0x5e0 [ 337.947338] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 337.952196] ? trace_hardirqs_on_caller+0x310/0x310 [ 337.957228] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 337.962264] ? prepare_exit_to_usermode+0x291/0x3b0 [ 337.967791] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 337.972669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.977871] RIP: 0033:0x457569 [ 337.981080] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.999995] RSP: 002b:00007f467fc28c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 338.007767] RAX: ffffffffffffffda RBX: 00007f467fc28c90 RCX: 0000000000457569 [ 338.015050] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 12:33:58 executing program 3 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 338.022327] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 338.029608] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f467fc296d4 [ 338.036888] R13: 00000000004c3522 R14: 00000000004d5328 R15: 0000000000000004 [ 338.096742] FAULT_INJECTION: forcing a failure. [ 338.096742] name failslab, interval 1, probability 0, space 0, times 0 [ 338.113425] CPU: 1 PID: 10245 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #58 [ 338.120728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.130108] Call Trace: [ 338.130138] dump_stack+0x1c4/0x2b4 [ 338.130164] ? dump_stack_print_info.cold.2+0x52/0x52 [ 338.130187] ? __lock_acquire+0x7ec/0x4ec0 [ 338.130218] should_fail.cold.4+0xa/0x17 [ 338.149903] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 338.155023] ? mark_held_locks+0x130/0x130 [ 338.159280] ? graph_lock+0x170/0x170 [ 338.163096] ? mark_held_locks+0x130/0x130 [ 338.167354] ? print_usage_bug+0xc0/0xc0 [ 338.171422] ? __lock_acquire+0x7ec/0x4ec0 [ 338.171439] ? graph_lock+0x170/0x170 [ 338.171460] ? find_held_lock+0x36/0x1c0 [ 338.171500] ? ___might_sleep+0x1ed/0x300 [ 338.187740] ? arch_local_save_flags+0x40/0x40 [ 338.192339] ? _parse_integer+0x134/0x180 [ 338.196510] ? graph_lock+0x170/0x170 [ 338.200331] __should_failslab+0x124/0x180 [ 338.204595] should_failslab+0x9/0x14 [ 338.208413] kmem_cache_alloc_trace+0x2d7/0x750 [ 338.213095] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 338.218650] ? security_capable+0x99/0xc0 [ 338.222836] pagemap_read+0x556/0xb50 [ 338.226668] ? m_start+0x8a0/0x8a0 [ 338.230234] ? __fget+0x4d1/0x740 [ 338.233743] ? ksys_dup3+0x680/0x680 [ 338.237481] ? proc_fail_nth_write+0x9e/0x210 [ 338.241989] ? proc_cwd_link+0x1d0/0x1d0 [ 338.246069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 338.251622] ? fsnotify+0xaae/0x12f0 [ 338.255357] __vfs_read+0x117/0x9b0 [ 338.259003] ? m_start+0x8a0/0x8a0 [ 338.262559] ? vfs_copy_file_range+0xb90/0xb90 [ 338.267165] ? fsnotify+0x12f0/0x12f0 [ 338.271003] ? security_file_permission+0x1ba/0x230 [ 338.276036] ? security_file_permission+0x1c2/0x230 [ 338.281073] ? rw_verify_area+0x118/0x360 [ 338.285240] vfs_read+0x17f/0x3c0 [ 338.288716] ksys_pread64+0x181/0x1b0 [ 338.292534] ? __ia32_sys_write+0xb0/0xb0 [ 338.296700] ? __ia32_sys_read+0xb0/0xb0 [ 338.300783] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.306164] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 338.311640] __x64_sys_pread64+0x97/0xf0 [ 338.315726] do_syscall_64+0x1b9/0x820 [ 338.319634] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 338.325018] ? syscall_return_slowpath+0x5e0/0x5e0 [ 338.329961] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.334821] ? trace_hardirqs_on_caller+0x310/0x310 [ 338.339855] ? prepare_exit_to_usermode+0x3b0/0x3b0 12:33:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x0) 12:33:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:33:59 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:33:59 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 338.344933] ? prepare_exit_to_usermode+0x291/0x3b0 [ 338.349971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.354834] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.360035] RIP: 0033:0x457569 [ 338.363244] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.382156] RSP: 002b:00007fa98364ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 338.382174] RAX: ffffffffffffffda RBX: 00007fa98364ec90 RCX: 0000000000457569 12:33:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)="c24db0e999d0a00567615b88e8e8b534f466eed20265be97e3938b5dda81a72728a6b3b8156042c78d103b8e833ab80b8c9952dd21bbcea8f4a77733aade25abac25de56309c", 0x46}], 0x1, &(0x7f0000000300)=[{0x70, 0x0, 0x1a727f49, "63d20b0560952d713095067bf7c952e2adb8965f5d9710ced79462b0db039f71282f24ea70c23007a41ff46c83a34a996909f9b8472f52136000cc2a8cc7e6e029497218f065fbbabc27aeff90d100c9c438c43eff133a87ce02"}, {0x30, 0x113, 0x400, "94b65c523d9bba9a2faaee682ce9e93d340b4a2073396899d50434721c92"}, {0xe8, 0x102, 0xffffffff, "1d587d2f2105cef87825505bb9da0ec4c82c9dcc841aaf3c00e3b4139781fba95450702b92bb2a9dfab7928e40a36be63b261e8e30d275fa858c99db8d6bfb238fc244361725c423434c9fa0cd874d9958dc417e8a900bf2828bedca7e92113a8ae60b2adedf4fd2910c5f2d0e35a22bcc97f8c3b736c31c8bd33dea36fbd43f513cc9195f8c243a6c816e0af45cfb72f0c729fffbc77a4b1cdc600b67b91d91e3f496c430bae102f3267bec8644aa45f6fc6df5cf451b2aeb3f4c9f5d39e86bfe49b0cef50989ccc4ab34ab2255ada81f3014a124"}, {0x1010, 0x111, 0x7, "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"}], 0x1198, 0x4000000}, 0x1000}, {{&(0x7f00000014c0)=@rc={0x1f, {0x80000000, 0xead8, 0x4, 0x5, 0x81, 0x800}, 0xe5df}, 0x80, &(0x7f0000001880)=[{&(0x7f0000002000)="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", 0x1000}, {&(0x7f0000001540)="c9a4acbe266e5117783fd92a0d0200525ce5ff271646bb3003aeca6f8a5de1641744ef5f254328381ce336b55a39300146d54e9b1dfb014837e06e", 0x3b}, {&(0x7f0000001580)="232908e161bdec740c0816a7e2c4df7589a63b65f45d65ec36a2febc7989ee81b5e276d5579a4fe21bf9812072341599148376d5c4cc03137835dd9e004159dccbd836ca020000a1f64f1e0ceff3174468b3ce4f7aefa73bfc195db9d1664dfd0a1b2598be92", 0x66}, {&(0x7f0000001600)="106163d1115bd156087b3c2ba9aa552e6b99810d2aed6f44aa6417169ef02edefdf2c6b694a62cbafd4ef5dcedd72ea10bad97bcd4f93e0bb19cd02be56cc56672e18fbf4c026f7cb1ec6647305367", 0x4f}, {&(0x7f0000001680)="da2a5db2a531e5649cd0c2101263df1e8cb4f6922e0ecc2b46a3a74b893db00753de7ea67c06fbfa1efc41a4fa5dae82c011fb8d74c759b6d088728f4cd8192776a9006d7ec903740f1a1b26c2cce7854d2ad68fa151d9b71ffec8ccbb48a68415c7e401e27a3e988fa9f2dbf196ae3576d33663c260852884ec7252f4da61f368e6d9c069242755d077db7e53a95603a631603013d8dea2ca6da419ecfd29cd91a2f6af9d302faa559e4f66325f3801403f36107336bffd28a12ba09ef9d490a5d5df4ee61af297c183c689c65d0bf0ec4df1a8242c49964ae34002e9ea3c3d0304b864d75d521922b6807e8313205c9b82e6", 0xf3}, {&(0x7f0000001780)="9f640c9b4c2dcca1d3800c6c815a6ba244ee5a82beadf8bfa761aa66e78a183f7c25560c5d39fe3f643fcd16a22a9048c9f97ef544f3c7e19b7beed23782e0dc0e507f5856192a91d4a5f4d636684d5db5e595dd1cf1b3d9144036f546ea330c5788f260e13da27db80908a3dc1d62dd1a7d63de24371ed2c0e65e40d4e70135d72497b7bf389722995d00e55d94442777c917e412b67a2df744291e4113f06b6afda36c94d7809ce13672addbc6533ce0bf04", 0xb3}, {&(0x7f0000001840)="25f513d0af56826b38446c959eb3033b9dd55ef57aca2db7", 0x18}, {&(0x7f0000003000)="9455c2f00ebb977bf503daea79636a91c85b8d87da01fb3aa9f02ea6ce74fd6313994be4e2f83808482cf61bfccd8a2ca194125ebc7b9d70d92e02cfe3c0dbd938239ede3c7ddc0336521dc853b0731d811a032c14db6359296fd45357cfc3a4933cf5fd8c17fb322af661bdcee48e97bed56ccc7295d28f3238c3cc758d9178de7c65c41c7f9c72636541d8a5e5fe4a1b2dc631836d74ccef6b93a8ec1c1970f459b470f3a1829b44beff360a2c2e0861210a2aae74ced914c4dde751edfc30f520d95bb99645a55a6efb73d25b9edd48528a745e8e94546ded298bbfdcf4e07917bf9356a368222e61483d7d172cf300becd551561cc7a2998935765e677dcfb3e918ff5d14b0ad4c8b12df0184b7d3180c815e5e81c8ae3dcdc9a549d8bc0623f370cda8358fee0db505ebaa6539f2e813d64d1df22059aeb23a6b92dfc34813fe378911cb39eb1196412421a7fd901d94f3e7d36526da80b326caf6ea30bdf05e18cf371e7534576617d7884185aef777cf7e6765339352eaec5942c36a7b97456ea5086b52f2bb41e798c292cf6847ac89390be521c7ed0e69b44482aeda49dec73294215d67655531dc02c983fc601b6ed6f3305c1685b6129c752f528875665fdf190104ac8e7fb5fc72dfb4daf4d77f2854a6aea9930a564c030108473256e7b2837a3d48b633414bfcb347dd2daf9fd36d35c722ad23d66a05a32aa56dfe20473e822b2d8696d7a589abe9b74b2fdca26176ba80aba2645721790159516927e8f12e061b4021def8bbf088864cfd30e8d77658f708eb616b1f68712a3b6dc5689c6f2f3b4f06d8fdefd9991d335421f15667aa8197c471cd798c6132ec3c95dfa15b1477083f6abd019006c666c8cbb8deeac9044731d2ff176e72cf33a5b5ef01e7f9c652c4aab931f58d83bcbd31265eef68f5d2d83023967026419225905116dc1896e9c98394cb766ab08a7ca004f8d9b3e464ba9aaed84d02b7bbbfe42046b652fb7ca18300e55eab3fdf323d892c41f42828cb371ec59a5dac91512947221bcce4fdb094b49bf7a2cb13956f1e99d0492401e0b2130d93c28d6874bed9eb86fa13029094792ce6393cb6009917942c23776b550be6855cab4bc4d0eb6606bbdc517062df8a010f5d867208af10d23674e4fde8eddcc7f9f82a023622ab2f59994f0b9cb342edde988d0700cf2b756401c8c4848d27556da95cf64c438f161704f71caa937342316f893f6d8ae4617a095244c1d4a495bd962ab9d79673fe6ed8d6c94d1d7d5451515ae309e2c3e13231a8788d204d88f54da171f44642e198ca8a9c13fc61cb840033d6860d63c63da6a94a10947a8efc345b1e933bd7236e1e1b4a7c8212e06debfa2f8b3e4b958a49b5e6690ad5c44fca32853dd745e48f44af6a1053f9a194f295592a9a352c43e3b9f36764d9473ad1eca9eac8034ff737be7933ccc4dc81803298d75ba20a379d8fd9253d19a87f6eaea315dfb21898c8a1e721417eb64a27a0234409401cb5657f6bc6aed28b19468fed69bb229b1f8f2b183f24da900fc715c992198fd0e68c4662d1f6b8e60873f67b3757fdada081985fac3a06d34f24e48cd2eeb505d0a7b09970f1c4ec438ab0e267568c126785497413ca80951e33d327fac06dfa4755d1b23ab83cd5d57b9cb8b8728f33106d80af517b1027221280f5a3e5acaa9c2a524f0de175ee2cb6fc707c65bebedab4aed8b4cd961a85b29b23ea4c1ac1fc72555d2d6ba981533d2fafe57a30339f40ac8a81123cdb41d386ffb65436255d851777aa33fa79d7d694cae98ba10134eadd73870c205fb1fb5c5949ffc0dcf3dbac6903e29501ef393be27d0792686d331a216c26126843bf4dd0d09f0c041cb0f17d2e30170913f6c9014c8b2b5bd9aa532ff08b4ada3dd46a154c7854f2d433911bca52327e528d3f8a786bf506db098ee7074b13af1f353a07144eec19c117fced5b92bf538e8af9c56838f570d232182368fb02d449d9fcb9918838c2874c733251e0828a9d3836194a95efc79386517e757d960b6e5282ad77d3e7e344d932053c88d08dc07f18dd49330bc3bf8336fce27123a74db5f66a0b50c728b83cf960bd595343b0a07c72ba6e3a799ac34ba26a9acffad2be102982b95b626537c939aadeab3228e3457b460945deefd8113b741bff7e8a0bbd1ad85d41dea7ee24ee18018b2c840d19ef9521132eeb1f2618eb26d2f2ede968b720c8ad2ca21319833c31ea623276447bb826838b48bc2b01c117e1ac0bb94fe39b81b77f4f939dca84d9c275ac1a7e54ed4fb84c3a82bcc4d88f3eb3fe851606d62a763ca45ad2b41410e3931dbde84fd6c66774e2730f1e3eda59097b3eae3dcea845bad6519deec24b861c2ac9b75674c4134851b254b2573c809241b301d822ca76d643d9f923653e539e8f64cdc9f575819874dd28de3f336c2fa2a50bebbbfe38dc6b701ca7fea76d77220e986db097633ebe01a11d3b4dfe718783c87733285881df6c85765a976095767f76c89c11ec6bdff5e72ab4caf5dd44a9e8f960e2a3d1f942271f1ce9fa2c35768c2980871c2c9346b6e9bbae1c00df2f30f43bbfe30fa1306c438494a836201d894e3150fc3c7d4e9daaa5691d3c35b975fadffe4bd1006033d545cb91b9829074397f3c82fc5a1d1714c6a53974710873c844ae1cbc27e6fbc0b77d811dfd3a77930e7882d36fce8c3eda268937425b9eb8dee2ca7435e3f02d5e45e36cf0444ffac8fa042f5539719e6a0d15b3f084df03ded9c6f77be2ce1f0499bad31f714d8a4417d141dfd2b0f07e88dd72d3b96be218e19f42b061ca8460fe96eaaa9c6a7414b17f0b0e839385a2f18ba7412eb839e5f959fa7b3134030dcdc89ba9cdad130d22efec0820dafaf3f0a2dee8092ceeac8405314511fb13a39548b65c5d77322c6ca66365304f0990408147d23bd0878a47bfc4598cb764330ef1ccb15b91fb6276397dd2ece2d6ee548f8ae440371bf78cc3616446884879509b462f8b24bc0425cd3bb9219ba7e1354a1bc53fbb4c86c11b3ada8f0b2f1641c1bd818ae808e967dd07cb5dffe6f78a707ef755f1986baba534f68941b870c498bbbd86c756df527e133050e5b1454ff1ef164027db7c807953b2e2f406683c82c1de7ed9cc439725f18a38b7a6ae334da968357813a4ba54859cb286c511622beb30bc0942a8706671c5bf80095eb9f8122958da391c6a6c456cac6265c1391da670f8853cfe0931bbacdfe39b4f8e500a4ebb95cfed83f933c601544029579f3243b5c312642e2c8a1e6de03a570fb4eb5b58493330654911d381d83db10db7b3467a99911eed766dd60a99f2b23170795089c2d513caf808ea58634d7e5eea060a5b18d33de3f8a3575b613d036f2defe01884859ea807c67dd030b891db517f9251693bc392edae819168b6dd3252a0ecb28f23c8dc777e4837a1847bafb0a08c80a422f957e812839433f7118e00ce652381a7552b338e7364362b8cd709747f8a79a7180f7cc360da07baaba1a103ca42472e6a60534de875f96f242f514ae3efc8869c279dc45418e160fb9a996e36df74e82572f49c65b5ecee5f3226f8566943a3232099b18ede3adc72e6fd1e2b500c5406b500bd9e7afef824fa616f8b8c35e9e7cec5d9067701c2d906ca72fbbf97ec03f370dcfbe8f25128edfa6f87c5cc5df4af70579567078b3f4cb4f8d20ea48f8a78e7f19f1a1d97b07acd2a36fd9cdff803b70029c543573e113dd20f2749b56733153db5526f14c25c257a4d674aa0f2450b6cf6bce9d0f9232333bb62d8e3738367473b4905abc5cf0f040c7ebde199f25a4a6b2b0e8fd90b3a94e0c39cabbfccc94c690bdcad47bcd4205999df95cd1256eca00f1c1760c6f2dea43ad6f068334a57527bf92e0c7d6f228eb25b308637782eabe86cf0f994ae48a0e5882432416c844da5d16225945646f50e26544aa38624fd4b77222e41213d388e44c0339c745ca482d4a308f5a8cb9d051c4ffb2cb68ae656219d2b72a3c99503afda943c44628b9d4c1334f4e20b3ef4f2406c6a75369c7be2411b210023b861fee8c850f4dd0407dcd8b45ce325f1573ba288cc3494d182b56d2600750bd5dcbd8a53e1377d017e157cbecd537197d249add393cd23ab958cb624773770d286aa7b064b66eeeedefaaadeb0d679ae4503f7d0f9e14d51c53bb7ed36485f9ddf53c1ac81fb4492ce687ceec30144f009a6ca9fa8602097ca38e01c659cc438de2f7e3dc4e8d4cce0c7bdf2c24685201d66aa9345e1cbf8cb22c6505f2e4be51dd6140cfdb5b0564d6cd890aa352ac94518718c1a63e018719ce2f02652cb7a86a58b8f7e21f9892376f40937b5a0c7a2256ccfb06fe526bc4d8044a9f9730dd42376b04e7a9f00efb545bc7cbd97b96d9a4c0231f0a88b6cfe47bdce6328daa3dd27c350f6eafc796a31833219569cfc151219521273ab4ed44fbfa16b1e75fdbb42678979c30fc07aea67876000980bb6a54929ba4de40340ee7379404f213fce4da14460b90c9df6a5a41ee6cf369ee49f1a86a2fc45f65a29e793a9b88852d49e70b8fb80577f6cec22aa608f4d2aaf4bd553822509e625969e1ca5106c39bf0e0da4e6257306df0b3c31efda2b838f21c34921ef81b6b1c0d115f5f1f808f0da2dfa9d1d14fe66e8955f632aca930f7016673820db54dd45e3db4f25fe65f0c84e5566ccebf52ed4afc456bc554a1c62add66ac208a53ae7cb0c0669db9e928d901a07c2511fda49fda3dc88255904b9be286d16876dd0beda6ac55e8d3191cc8d6eb64e4e5ccf23dc04155827010817db5975f42673ab8872b46f41d4d1cc48be9dbeb6f67fe1dd45587cf813924db66f1e145029315da65d1b51050437e65ad18d9c45db302675d365847f3423802aa8268b0d24feef01c6a4429f313587acf01f53b70422cf1e76cab9ab1fb3f56d5aa54dcd030cdc82eca7b6365c0aa5033d1cd093a32f62d463e18e3cf2b5e79291cad891caffccf38273b2b260d60e957d2a2810be8c519071b79f94470bf0c1d40f37eee240a6542eedbef10a1e64bbf211abdaef33c1cc08f5103f2f95308070ae760e9724d53b4a4c889f8a74c85a2786bb27a2d0532daa01812677324935d381e5f08d83e63aa92bffc1960b7d01a773e8b363e44671591f859ea395a32de6e14edecfdb4fcf4a3ecf8feecc8c8795fd430f17ad77b4c0385536e3fa4e9bf92e72d563340036873ecb7adc47090e04d9bd254fee771a131ab30a729e73e88cd22627b2d977d444368e5f23115b437baf0187868f307233dffadf9b4647910f0282fef5d8627ecfe1d93fa8db065ce6d4785d8d7df7440a5ca84e4212afee3cf76ac496f40dd65db420bf7cb10388e70273e52fb1a561126942f9514575191c20267e0718a649242b6017e71baa718acf9f9f5e5f3cd8fe8f6cfc2ba95a4a1f8446b5c104da5fd8be057c68eea33e3556d3e9157620017d2a26b42309a68ba359664cde649134439ff3892f781c6720609efafef46c8b9a0c56ba54a57b9368ef94b418412a2a4ca8457404945df1735dbe3ac3eebfef83a0eb24da0b3f2a6df0bf5ba4528532b0c69220d58687eea600e0d3f54d8e0dea63c6f0d3d100c73661f04483209d5174e879303c046af1574320748481fd53e8699eb5602b39269ce19337fb3217a326a321dfa1579f063ebdb9797ee7b5a7d73cd9fcc1f681657b0b34919eeb14445f5b61bc76387d817bc93d35f4cd69e13bd22364e2fcd", 0x1000}, {&(0x7f0000004000)="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", 0x1000}, {&(0x7f0000005000)="5c397d140d3c61009bad051ce0e62282f3015421071d9a7f329fb0806e250d24e363972350fed37fdb0f691a571a32b9ef3a515e5070ce0d2bf8115969fc02e7d1eb9c56b2baab69792295fe8a5969c7f1f88695b31304097d6e2474b706a36310c4a9be5effc7ff720bacbd28928f40a31746c38c2cfc256fb5e0c73acc384b32eea81fdc02d748b6681fdc212b3aa25ab347d8fa81fbf316862194609a9c3a80227f2d36cdffaa27a445912a70542de77e00d6850573c4efdc3d09d46927721bf1fd88f1b48f8d2307eefad4527e93bc4eb58301fa7d8c70aad047b6835a2d887e8013da823bb6514cea86b77952fc945dad2d3a703deb2b6a72a317d5e4bcfcc2af2722ad67f414f0c72e9ad560745b1a587ef12d3a8177a1ee853bc2daef699548e901ef929222e010dd4c8c7488527c857cab8d2f15c8fec7a2ddb20e898fdfe57bb6c629c34247cd687b55756315757d21f9e5a98ed8d8069c777e5dd1df1e4fd93acbab59f3a967e06b93931f966777fa27272ec478ebd8b27263bbdcc3ea23dc14969cac8571d7f27e3c3e27dd57d678d2012d227623456ed588294944792737cfbe36ccedd9c3928d6e1ceff518dbed7fb05d6355202493be90ddab65d8076a9b011fcb38037505324902c3a480f901ae71b0b68d000245c5c5623a56d3da22db22d1c791e50a737265deb6e37a644110b8733664cedf1b0f8cd89a0887fd684b8b1219e8350f56605cf3c47e04ffb578b0caac9d69652d82712c4636dba3530f4d6a94ba4f22c37e454b930729361d9607a76e28b06e90e2a0c8d369615d83d53c5f57fba3ef8c407db8ad75dfa4a63ff569ad6da22fd2ab69a5d19c93898a5d5ae5443bddf4e682990050d3343f56f6d44bdef9a429d60579b777822e8ac8f9faa70ad4e10630cda41cab161448734de2a4c8a496cb40ef80230f1379ae89337e6ba6440c22cfc83f4f1a41ca0eda4ad3c8b33a114e7a9931d12cb39fd73aed47b0cf6e01de4d254ed180c3ab9c939798268f8118caafd16b9435b14da0d60386ba671facdd2471ff67bdee9dacd4a3d715e74eb37a6a0e0ea05ed862a79a0f10629adaa95f0a8c64babf18085d826ebf4f02f6253ee3c088ce0eb67c8cf069083dedb48b6439800005e894ec5fa54e8cdada3f8a97d947d973d411883d109fd1bef8ba1337260a359d5d30178e97f312288bc16d4607622539b4702507c753a7ea7e9e35d0caa80bdd01ecf5117ab897dc5de52a6330a85d896ae61b1d414689666dbf0a81766279010af308aa3555291070089c84e3e2db2dac8afc8fff3977a6e71072ff469664e33984909aa76edc0c437f4ba89a4d25112f3890a449a6f62dbc5ca2f1b90d2c5068932b9aff621b0c28ba47b450b1e02b946ae688b12a3344ac00580b48ec0f92718c88c573d731a8318b641bb3ac9a48ac3615d47b93d9a302c1114607d82afe9577b450274b6c73b7bbfe3d1e9b690f1f981f73f9838e8a87056b2b712dc24b728eb07e3b621abfcaeeb7d029ffe23b5bbc6e0e3ac71f546cc049fe0a3e2590564e75c94ec9130722c79a2f46b3e2cfa6e42d80da23052c10c0d0c3a76355eab8b970da7f771e5487e80363533cd45114dc904921c8222c96ac07ede275f4f090931d38b349edf78f1e2e9a64162b4d6b6b518b7f71b5800b14f828c5609a89a28c2fa2cff5a32514893f44aaaf3b3680cc0e1af7015420482173312b334e76e46378e79a1df1d527608678f732c5a3d3961df393fa0926e109c17781f4ce8c41a9b359d593cefce943cb99fbc9101fa5ea3a11f8f142d8ed3dae33e3f2fcb48a7745f01f4f5b8dde130f8cdf39a956b1344fee3d6efb3be2b9994c626c6dead3ca35b30a91aa1d0ca0cf1bfcdcc1f7fdc02f8681c11c82de77ccdb4128679f2af96843b212dd06a3203ab40c19de8468b9f610d85e2bade2cb26a5bcab6da2e8af41b0ee9973072236ffb4842f3163a03445604488b40c08124c3ce35341bde5003b3597ada3fd6b2144e134bbe9c80218d12ed88507e6b2a25554a599b4887e82fae97f929a4042795aff8bea9a4ff9c893f6f677df22c349590aedb58d3d2276de89d38fddb1057384a4da89bdb85d0081b92d24845f9431e2fcdb7133d097db405348bc0a7a2f7d8da45a5d227a163e39b2934c3ab60d5b42122f5fad49a33685e180d4fd865738e6488009032ced1a1b8f96167c17ea8005c8990c8a11e9dcce4e50597b23f6296eeafd43970255b953e6de3ed6561e64ac18070c6f33848585a25eb2694d0d42927f88dc7113d63fcee3d68cb5dfc7b566428d371774fc1c091d5c44d2e368e008454125bb8c3b07223a337c24fb0d8d6170e1477ba4f251b280c35f477ffbbfe3753cc68f9d79540f76fcb7020fbeb51f4e1f594b3f1678e11ff7eb8d29ad4cd19c0788695a6dac03d50c85beaa00133d0263e0d5520869a3126d14cb660ac6adac46c207a119b3c0ff52f6bb745e0d60661ace794d4c7a3935021b1c137dc2cc461306be9f3be967c0c5fd3d158e28a65205f5e6c50645e108a737714e3f4ca0ecc16b962e15b2507ce3d5f446a7cb6a127ccf7fe88f6501b6ac88eba37770f9fcfb5faf5da807d062485a7f5c2db7a0efdecbcfd9ab08132879ad3bbf9ae9fda7e2182c141ebe977e93a18a578bbb7576718491fb8b1c2fed32311994f3d741467b368ec8a94b0b468c5780b49d022d6bb1ae108e5770bb2dccde9a309bdda95e4ca33e786421d73442e0e125f6c79b249da365b996e197c188dabea62ff8692c67fedeb4f90d88ba7e22996ff5d4f28d48752a5209af5cf16f808ce0e000c8c132944476874ecae79b2121d378560390008780eca255e858adf5f32795a3ee952203967c651da812ba0901ceb6d31671e0c78f3d2236d2e6535f3e808ee928313da045e08d993cd77f8759359799568ea24ea8b9a4f43c240cc187fab92c6f459b3988dde9111f2fda31e77fd55a6cd46e2f2f4739e85a191e52d5afd9bb5cfb4c0046e617e4bba775b463481bddfb2d078f61d04aa3a017539127e28f7203f68075b07e15a7abc604af490315f9a0db52054878a577995ba0077b76dd0bec2aaf49b16547aa56996ba235b89547f5b06bbbd6c3feeac436e7ac2eee67894623010eb73cf964c56e4d3eba855b963af7637e72dad1022ae4fe50060150fe1933b3030166592cea906e937b9a6e4170a908ad3936c739cf8e46e2a11c935bcb3f569025f941b1cbe50fb005b2ddb5f10def6e43adf4473d9ffe4833ae1b88701efa4a22fce9250bdf6b11093f93cbeb8b1112f24e4a30aca9ec4bed63fb44469d50a9efc26c64f38e1ac735e6071a9289131586d5572346214bf6456542a1a17fdb2cce6b30a0a91f175c6863d7800e62f033c64c2cf9ed63dee702a295bbcabd989dbd77829b2083ed48d7cfadfa847fc6005e40e4175d584eef52c1740ef59b3b0263f07f76dae2b61f64a82e7efacbf67e225c6e5bd3d046a662cfa292efd7c897d0f482956957d77203b9aadd00b8a8920a43582952f7a067d2ad5d9cdcb62df1471b25dc49b73c7e04a3037d69cae2c49159d61559b66e08c4167717a0bd4c47259e589f6e116e270797e32f8069e2bc4abbdbd97254bfcd5634aa47e1580ccd223cba7d01bbc297b829820d16b893249c2cac46167a5ff8f2ea3f5b8d1d205588799c151847cb0d1f65bafed54625d096911754bca0830eefcb89f5afb58caa91ecf3ff36012b4cc5fb39591382476a6af0a10387fc7e55dcf74d00b14c02351353e668d06dea381c9a3bec496c0b4056616bbebf2c45744291fb1c3f20b94edd485103473889366f271be0e363ca6a499cd9da8ff8348bcf3e648a7947cb3c653a412a024984a9ef7dac9dc0f6672a671b9822adbce9ff54932caed3802d59101fea04ef57a6e96ae8a7fd782ebb7669ed93bf37e9bfb7f5e1aef0a819149329d9042daec559a3c0595e6dc80b79230a23881cd555bd9c166f21295381789af84320a147c0927953b1cbe53e44d67ea7f33fe562ff0bc99908279b41cabb958bf65896d6850eda92612cb00595cb598c50b36ca35f2a6c2ab2c1853d2cd74acad743e23acc5189c0cc807a039f23cf578533309f34495efbe184a9770dcc69675315ade2f20e88956fc3398bc25ef4845d849312bdb8d89c17df81899a16fb02c2c65f4dd9f47a5a49ac8ea653353f23346b9724922fce9cb1c9bc60be9099d67a3d83faa6549defa7be72ec6a7b918991332e8ee030874c8438765b589324a1e9b6b8a69a04c1ce018db02d9a808c9af537475c3e46f9abdef69c98b3311f67e9636da1ee0923602460a9bb9e9736ef9834d7fdf56cbb7362ec4d4591a249188cb9f174acc7c156c04c21e2fc1382dd516c7398e7276527b04ea89b6c361d9acdcf889c9e7e0f6c9d869166238e4dee610bb24d448ed2f10a78cc6d52dcf1f7e5ef227e128731040de241ee20e92106a5b1b636f999a7bd6a1461d30f6c460c120334eb62cc01877eef9a610b32699614992c2742eb0072d4cb5057ab18e76e20739cdbddcbd73d5616b5c8ae6aac8d1a178200d1e7e346e33f5c4332fdc72c1634a19950def5cad50add3fa829fb8a777ec47f79fb30943ca76fbeeea08ee56ffa049b79194d21877082e36799ea860da876e4eb0f4652ca1ecdd1e7e85dd4ecf87e80e574b621c6bfd900631e7bbb41c4f266d679d861c5afdaf187dafd7131c23720829f5b381f00ac44acbb0a64b0af66ae5dab1c54826e20a20f5624a1c7555ccb3fd1924dceadc7d757e2a00b2e8c07725c5674f11a8d2eaa7ab6b826f28eba78a6e84f2b507740d7e675e7158001c4773cae9da1253735c367bbe1652647f876c973ec59895052a6a98e14394bf76534f72b650aaf1930641ca1bd60efaa70b1361c7d619e84d1e62205a537228d16fc0549f58affdc54e19ff83584d0fc514e515aa7b0c65e43fb6702554d5f46d3d6e2afdad64e7e82eb0b12914e9f2560b78e0190a0587532321de324ec69030cc25451b5650109f91df9629cad4c6cf54fd9666990ff58c42007270b9240841d10afb41067eb83209891fcf4f5f9c4be98bb73697f1f379c446c19638ea45f50185109ebdf71965c04d7d05df31b695501b21e7a1de2339cba229bf019d90fb19a12397c71446b467a08764a8a6e9c2ef67b7fb79852c448cc42b1a6505bca8cb0e4625bb1179dbcd27a308e73ce7276713ffd045eee461931d7e99833d19adfe09e2f9b9da831ebbeddc729e109d49403b306980290408053f26a901f6ba2f8b440080e87da6bf223c213fd8a27440b2883374e036c41cb75cac1fedb3586334be8f81812c428315267ad0f6850943236a2e43658c5e9df8d1d75a8a5e8cc4da3a28e74656ca9ccde4a0552455f06deea8d2b8f0c7bb6d2a888a6efb6c4cf6cc737bdac4dcf5b9cf71ece5322c6e11d6defa47fe572c8c2c8c18c866c74be443894ec08a5278ef68be5fbfed389a9fbc9319e2b7350f479c39ec2566a9c914d4110f871443baf0483a38070dd125790970fc85b43311e6ca99883328b4e6002047054e17c472cb5cfa73f22d71393eb0e4f409b7ab2c3e2688e84953e223520d31c5b5187cd0fe92987fc8b60882d651fb2317c694b6f0843a17ed2586e1146f05a28f8b290beeafb09aa9183ae261a9f9c8f345eff1b42d999aa287d8cebbc47d720d8733ba2043230ac2625222efdfdbed551a16217cfdbe17ce75a5fb5c9296108eee672f54dfc2fdbd5975058", 0x1000}], 0xa, &(0x7f0000007680)=ANY=[@ANYBLOB="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"], 0x15b8, 0x4044014}, 0xfffffffffffffffd}], 0x2, 0x1) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000019c0)={0x0, 0x0, 0x2, 0x0, 0x0, [{r0, 0x0, 0x9}, {r1, 0x0, 0x100000000}]}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000001a40)={0xa, 0x5, 0x9, 0x40}, 0xa) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 338.382183] RDX: 000000000000ffd8 RSI: 0000000020e3e000 RDI: 0000000000000004 [ 338.382192] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 338.382201] R10: 0000000000103f00 R11: 0000000000000246 R12: 00007fa98364f6d4 [ 338.382210] R13: 00000000004c3080 R14: 00000000004d4a28 R15: 0000000000000005 12:33:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000240)) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000280)="2f39ae", 0x3}, {&(0x7f00000002c0)="8eb8240a8e58669501e758be4ac0bcddc7703f4ea06c245237b47513d489a4a3583128de9c892c574382cb694f619856d47850f560293edec77bea833bbb5372230c4f05afd30e2bba1f1437a2fee3f9d03d60206cefe9e1a6f52c9dac15846f190705ee71", 0x65}, {&(0x7f0000000340)="c913c36830875d186e2c8ec74e78e135b4fd762d7ff9387fc3fbd098080a3598f6f6bee630bcf714b8b2c0a071aeb5c6ddbefc55234cc0dfc872290f7715ac58d224fec40642adfe8f64e69e89c31deb1a987a9c1f653a4cf3c84d93d44f541dca56786c06c00006519021624e", 0x6d}, {&(0x7f00000003c0)="2a3f1bc8d447299038403017093edf9397016dddb645d783d8238e1e580a9538e5b6aeb5b554d9cf785c79416251ac858a7e15d9bbce8ad6e06418123477430a9e5bf57fe4a79e76f9d96025629c198911f5bb7d83ea5ab47763f35c852083110e260d73098c1a3e830d06a30db6ee673dfdfbdd74ba78b31ad98c13a4e81af4a3d51b87ed8ddb910d49a162bd401d71e9584aab2d315aeef2be442ae4a012dd72246737600e11b966549fc11045b5891d9b7aa44db46ebf5091f5cb", 0xbc}], 0x4, 0x0, 0x0, 0x4000}, 0x80) 12:33:59 executing program 0 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:59 executing program 3 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:33:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x2, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 338.523684] audit: type=1800 audit(1539434039.200:136): pid=10256 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16525 res=0 [ 338.555505] EXT4-fs (sda1): Cannot specify journal on remount 12:33:59 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x80, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000100)=0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000240)=0x0) syz_open_procfs(r4, &(0x7f0000000280)='net/softnet_stat\x00') connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 338.600420] FAULT_INJECTION: forcing a failure. [ 338.600420] name failslab, interval 1, probability 0, space 0, times 0 [ 338.633042] FAULT_INJECTION: forcing a failure. [ 338.633042] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 338.662737] FAULT_INJECTION: forcing a failure. [ 338.662737] name failslab, interval 1, probability 0, space 0, times 0 [ 338.675643] CPU: 0 PID: 10262 Comm: syz-executor0 Not tainted 4.19.0-rc7+ #58 [ 338.682950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.692314] Call Trace: [ 338.694925] dump_stack+0x1c4/0x2b4 [ 338.698586] ? dump_stack_print_info.cold.2+0x52/0x52 [ 338.703814] ? __lock_acquire+0x7ec/0x4ec0 [ 338.708094] should_fail.cold.4+0xa/0x17 [ 338.712176] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 338.717299] ? mark_held_locks+0x130/0x130 [ 338.721550] ? graph_lock+0x170/0x170 [ 338.725371] ? mark_held_locks+0x130/0x130 [ 338.729619] ? print_usage_bug+0xc0/0xc0 [ 338.733698] ? lock_downgrade+0x900/0x900 [ 338.737865] ? find_held_lock+0x36/0x1c0 [ 338.741955] ? ___might_sleep+0x1ed/0x300 [ 338.746127] ? arch_local_save_flags+0x40/0x40 [ 338.750719] ? _parse_integer+0x134/0x180 [ 338.754876] ? graph_lock+0x170/0x170 [ 338.758690] __should_failslab+0x124/0x180 [ 338.762937] should_failslab+0x9/0x14 [ 338.766775] kmem_cache_alloc_trace+0x2d7/0x750 [ 338.771464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 338.777014] ? security_capable+0x99/0xc0 [ 338.781183] pagemap_read+0x556/0xb50 [ 338.784993] ? lockdep_hardirqs_on+0x421/0x5c0 [ 338.789590] ? m_start+0x8a0/0x8a0 [ 338.793146] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 338.797916] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 338.802699] ? m_start+0x8a0/0x8a0 [ 338.806253] __vfs_read+0x117/0x9b0 [ 338.809888] ? m_start+0x8a0/0x8a0 [ 338.813436] ? vfs_copy_file_range+0xb90/0xb90 [ 338.818057] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 338.822841] ? retint_kernel+0x2d/0x2d [ 338.826749] ? rw_verify_area+0x118/0x360 [ 338.830908] vfs_read+0x17f/0x3c0 [ 338.834374] ksys_pread64+0x181/0x1b0 [ 338.838187] ? __ia32_sys_write+0xb0/0xb0 [ 338.842339] ? __ia32_sys_read+0xb0/0xb0 [ 338.846406] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.851783] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 338.857244] ? __x64_sys_write+0x11/0xb0 [ 338.861484] __x64_sys_pread64+0x97/0xf0 [ 338.865557] do_syscall_64+0x1b9/0x820 [ 338.869451] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 338.874835] ? syscall_return_slowpath+0x5e0/0x5e0 [ 338.879778] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.884635] ? trace_hardirqs_on_caller+0x310/0x310 [ 338.889750] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 338.894773] ? prepare_exit_to_usermode+0x291/0x3b0 [ 338.899817] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.904680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.909875] RIP: 0033:0x457569 [ 338.913073] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.931995] RSP: 002b:00007f36db835c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 338.939735] RAX: ffffffffffffffda RBX: 00007f36db835c90 RCX: 0000000000457569 [ 338.947012] RDX: 000000000000ffd8 RSI: 0000000020e3e000 RDI: 0000000000000004 [ 338.954291] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 12:33:59 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 338.961565] R10: 0000000000103f00 R11: 0000000000000246 R12: 00007f36db8366d4 [ 338.968987] R13: 00000000004c3080 R14: 00000000004d4a28 R15: 0000000000000005 [ 338.976438] CPU: 1 PID: 10268 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #58 [ 338.983739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.993103] Call Trace: [ 338.993129] dump_stack+0x1c4/0x2b4 [ 338.993152] ? dump_stack_print_info.cold.2+0x52/0x52 [ 338.993183] should_fail.cold.4+0xa/0x17 [ 338.993204] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 338.993223] ? __save_stack_trace+0x8d/0xf0 [ 338.993250] ? graph_lock+0x170/0x170 [ 338.999471] ? save_stack+0xa9/0xd0 [ 338.999488] ? save_stack+0x43/0xd0 [ 338.999501] ? kasan_kmalloc+0xc7/0xe0 [ 338.999523] ? find_held_lock+0x36/0x1c0 [ 338.999560] ? ___might_sleep+0x1ed/0x300 [ 338.999589] ? arch_local_save_flags+0x40/0x40 [ 339.045986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.051554] __should_failslab+0x124/0x180 [ 339.055822] should_failslab+0x9/0x14 [ 339.059644] kmem_cache_alloc_node_trace+0x270/0x740 [ 339.064776] __kmalloc_node_track_caller+0x33/0x70 [ 339.069738] __kmalloc_reserve.isra.39+0x41/0xe0 [ 339.074530] __alloc_skb+0x155/0x770 [ 339.078280] ? skb_scrub_packet+0x490/0x490 [ 339.082629] ? netlink_insert+0x15a/0x3f0 [ 339.086797] ? __netlink_insert+0x13b0/0x13b0 [ 339.091330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.096883] ? netlink_autobind.isra.34+0x232/0x310 [ 339.101931] netlink_sendmsg+0xb29/0xfc0 [ 339.106029] ? netlink_unicast+0x760/0x760 [ 339.110289] ? smack_socket_sendmsg+0xb0/0x190 [ 339.114892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.120448] ? security_socket_sendmsg+0x94/0xc0 [ 339.125221] ? netlink_unicast+0x760/0x760 [ 339.129486] sock_sendmsg+0xd5/0x120 [ 339.133228] ___sys_sendmsg+0x7fd/0x930 [ 339.137219] ? find_held_lock+0x36/0x1c0 [ 339.141301] ? copy_msghdr_from_user+0x580/0x580 [ 339.146086] ? lock_downgrade+0x900/0x900 [ 339.150268] ? proc_fail_nth_write+0x9e/0x210 [ 339.154782] ? __fget_light+0x2e9/0x430 [ 339.158784] ? fget_raw+0x20/0x20 [ 339.162292] ? kasan_check_write+0x14/0x20 [ 339.166543] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 339.171499] ? wait_for_completion+0x8a0/0x8a0 [ 339.176119] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 339.181672] ? sockfd_lookup_light+0xc5/0x160 [ 339.186189] __sys_sendmsg+0x11d/0x280 [ 339.190096] ? __ia32_sys_shutdown+0x80/0x80 [ 339.194526] ? __sb_end_write+0xd9/0x110 [ 339.198615] ? fput+0x130/0x1a0 [ 339.201915] ? do_syscall_64+0x9a/0x820 [ 339.205906] ? do_syscall_64+0x9a/0x820 [ 339.209909] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 339.215385] __x64_sys_sendmsg+0x78/0xb0 [ 339.219465] do_syscall_64+0x1b9/0x820 [ 339.223370] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 339.228754] ? syscall_return_slowpath+0x5e0/0x5e0 [ 339.233692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.238559] ? trace_hardirqs_on_caller+0x310/0x310 [ 339.243627] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 339.248678] ? prepare_exit_to_usermode+0x291/0x3b0 [ 339.253728] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.258601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.263826] RIP: 0033:0x457569 [ 339.267038] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.285963] RSP: 002b:00007f467fc28c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 339.293714] RAX: ffffffffffffffda RBX: 00007f467fc28c90 RCX: 0000000000457569 [ 339.301030] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 339.308311] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 339.315601] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f467fc296d4 [ 339.322891] R13: 00000000004c3522 R14: 00000000004d5328 R15: 0000000000000004 [ 339.330872] CPU: 1 PID: 10265 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #58 [ 339.338175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.347540] Call Trace: [ 339.350177] dump_stack+0x1c4/0x2b4 [ 339.353832] ? dump_stack_print_info.cold.2+0x52/0x52 [ 339.359047] ? is_bpf_text_address+0xac/0x170 [ 339.363591] should_fail.cold.4+0xa/0x17 [ 339.367679] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 339.372818] ? print_usage_bug+0xc0/0xc0 [ 339.376900] ? __lock_acquire+0x7ec/0x4ec0 [ 339.381155] ? graph_lock+0x170/0x170 [ 339.384970] ? print_usage_bug+0xc0/0xc0 [ 339.389057] ? __lock_acquire+0x7ec/0x4ec0 [ 339.393316] ? print_usage_bug+0xc0/0xc0 [ 339.397406] ? mark_held_locks+0x130/0x130 [ 339.401669] ? lock_release+0x970/0x970 [ 339.405665] ? arch_local_save_flags+0x40/0x40 [ 339.410258] ? rcu_bh_qs+0xc0/0xc0 [ 339.413836] __alloc_pages_nodemask+0x34b/0xde0 [ 339.418532] ? __lock_acquire+0x7ec/0x4ec0 [ 339.422780] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 339.427817] ? __mutex_lock+0x85e/0x1700 [ 339.431889] ? print_usage_bug+0xc0/0xc0 [ 339.435955] ? __kernel_text_address+0xd/0x40 [ 339.440458] ? smack_d_instantiate+0x136/0xea0 [ 339.445055] ? mark_held_locks+0x130/0x130 [ 339.449301] ? print_usage_bug+0xc0/0xc0 [ 339.453370] ? print_usage_bug+0xc0/0xc0 [ 339.457434] ? graph_lock+0x170/0x170 [ 339.461242] ? find_held_lock+0x36/0x1c0 [ 339.465441] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 339.470989] alloc_pages_vma+0x3a0/0x540 [ 339.475065] do_huge_pmd_anonymous_page+0x56b/0x17e0 [ 339.480188] ? __thp_get_unmapped_area+0x180/0x180 [ 339.485131] ? mark_held_locks+0x130/0x130 [ 339.489368] ? print_usage_bug+0xc0/0xc0 [ 339.493440] ? __lock_acquire+0x7ec/0x4ec0 [ 339.497706] ? pud_val+0x88/0x100 [ 339.501166] ? __pmd+0x60/0x60 [ 339.504366] ? mark_held_locks+0x130/0x130 [ 339.508617] __handle_mm_fault+0x3880/0x53e0 [ 339.513038] ? print_usage_bug+0xc0/0xc0 [ 339.517129] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 339.522008] ? graph_lock+0x170/0x170 [ 339.525839] ? print_usage_bug+0xc0/0xc0 [ 339.529902] ? graph_lock+0x170/0x170 [ 339.533706] ? graph_lock+0x170/0x170 [ 339.537514] ? graph_lock+0x170/0x170 [ 339.541359] ? handle_mm_fault+0x42a/0xc70 [ 339.545612] ? lock_downgrade+0x900/0x900 [ 339.549767] ? check_preemption_disabled+0x48/0x200 [ 339.554797] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 339.560614] ? kasan_check_read+0x11/0x20 [ 339.564768] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 339.570053] ? rcu_bh_qs+0xc0/0xc0 [ 339.573615] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 339.579096] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 339.584638] ? check_preemption_disabled+0x48/0x200 [ 339.589677] handle_mm_fault+0x54f/0xc70 [ 339.593747] ? __handle_mm_fault+0x53e0/0x53e0 [ 339.598339] ? find_vma+0x34/0x190 [ 339.601915] __do_page_fault+0x67d/0xed0 [ 339.605989] ? mm_fault_error+0x380/0x380 [ 339.610145] ? graph_lock+0x170/0x170 [ 339.613950] ? rbt_memtype_check_insert.cold.8+0x20a/0x20a [ 339.619590] do_page_fault+0xf2/0x7e0 [ 339.623398] ? vmalloc_sync_all+0x30/0x30 [ 339.627554] ? error_entry+0x76/0xd0 [ 339.631278] ? trace_hardirqs_off_caller+0xbb/0x310 [ 339.636305] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.641156] ? trace_hardirqs_on_caller+0x310/0x310 [ 339.646191] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.651051] page_fault+0x1e/0x30 [ 339.654508] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 339.660405] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 339.679318] RSP: 0018:ffff88018743f938 EFLAGS: 00010206 [ 339.684700] RAX: 0000000000000000 RBX: 0000000000000100 RCX: 0000000000000100 [ 339.691967] RDX: 0000000000000100 RSI: ffff880181efc440 RDI: 0000000020e3e000 [ 339.699237] RBP: ffff88018743f970 R08: 0000000000000000 R09: 0000000000000004 [ 339.706507] R10: ffffed00303df8a7 R11: ffff880181efc53f R12: 0000000020e3e100 [ 339.713779] R13: 0000000020e3e000 R14: ffff880181efc440 R15: 00007ffffffff000 [ 339.721082] ? _copy_to_user+0xf6/0x110 [ 339.725069] pagemap_read+0x988/0xb50 [ 339.728899] ? m_start+0x8a0/0x8a0 [ 339.732458] ? __fget+0x4d1/0x740 [ 339.735922] ? smaps_pte_range+0x1cc0/0x1cc0 [ 339.740335] ? m_next+0x110/0x110 [ 339.743789] ? clear_refs_pte_range+0x1730/0x1730 [ 339.748637] ? ksys_dup3+0x680/0x680 [ 339.752358] ? proc_fail_nth_write+0x9e/0x210 [ 339.756859] ? proc_cwd_link+0x1d0/0x1d0 [ 339.760932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.766471] ? fsnotify+0xaae/0x12f0 [ 339.770194] __vfs_read+0x117/0x9b0 [ 339.773828] ? m_start+0x8a0/0x8a0 [ 339.777376] ? vfs_copy_file_range+0xb90/0xb90 [ 339.781967] ? fsnotify+0x12f0/0x12f0 [ 339.785792] ? security_file_permission+0x1ba/0x230 [ 339.790817] ? security_file_permission+0x1c2/0x230 [ 339.795871] ? rw_verify_area+0x118/0x360 [ 339.800028] vfs_read+0x17f/0x3c0 [ 339.803494] ksys_pread64+0x181/0x1b0 [ 339.807301] ? __ia32_sys_write+0xb0/0xb0 [ 339.811455] ? __ia32_sys_read+0xb0/0xb0 [ 339.815522] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.820891] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 339.826376] __x64_sys_pread64+0x97/0xf0 [ 339.830451] do_syscall_64+0x1b9/0x820 [ 339.834343] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 339.839714] ? syscall_return_slowpath+0x5e0/0x5e0 [ 339.844649] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.849500] ? trace_hardirqs_on_caller+0x310/0x310 [ 339.854528] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 339.859718] ? prepare_exit_to_usermode+0x291/0x3b0 [ 339.864745] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.869613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.874817] RIP: 0033:0x457569 [ 339.878026] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.896939] RSP: 002b:00007fa98364ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 339.904670] RAX: ffffffffffffffda RBX: 00007fa98364ec90 RCX: 0000000000457569 12:34:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000240)={0x400, 0x1}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f00005dc000/0x2000)=nil, 0x2000, 0x0, 0x100000004d031, r1, 0xfffffffffffffffc) r4 = fcntl$getown(r2, 0x9) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x732f}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000380)={r5, 0x0, 0x1ff}, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x6, 0x0, 0x400, 0x9, 0x0, 0xec8f, 0x11, 0x2, 0xfffffffffffffffd, 0x2, 0x0, 0x6, 0x8, 0x7, 0x4, 0x0, 0x7, 0x7, 0x7fff, 0x7, 0x2d0, 0x3, 0x6, 0x2, 0x2ec6dd7a, 0x1, 0x80, 0xea, 0xffff, 0xffffff0000000000, 0x1, 0xfffffffffffffffd, 0x7ff, 0x3, 0x400, 0x9, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x80000001}, 0x208c0, 0x20, 0x101, 0x6, 0xffffffffffffff7f, 0x1ff, 0x9}, r4, 0x5, r1, 0x8) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f00000000c0)=""/103) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 339.911953] RDX: 000000000000ffd8 RSI: 0000000020e3e000 RDI: 0000000000000004 [ 339.919227] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 339.926501] R10: 0000000000103f00 R11: 0000000000000246 R12: 00007fa98364f6d4 [ 339.933787] R13: 00000000004c3080 R14: 00000000004d4a28 R15: 0000000000000005 12:34:00 executing program 0 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:00 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 340.018662] audit: type=1800 audit(1539434040.690:137): pid=10276 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16525 res=0 [ 340.050023] EXT4-fs (sda1): Cannot specify journal on remount 12:34:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$KDDISABIO(r0, 0x4b37) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 340.075784] FAULT_INJECTION: forcing a failure. [ 340.075784] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 340.113897] CPU: 0 PID: 10282 Comm: syz-executor0 Not tainted 4.19.0-rc7+ #58 [ 340.121223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.121231] Call Trace: [ 340.121260] dump_stack+0x1c4/0x2b4 [ 340.121291] ? dump_stack_print_info.cold.2+0x52/0x52 [ 340.121317] ? is_bpf_text_address+0xac/0x170 [ 340.121345] should_fail.cold.4+0xa/0x17 [ 340.121375] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 340.121400] ? print_usage_bug+0xc0/0xc0 [ 340.150714] ? __lock_acquire+0x7ec/0x4ec0 [ 340.150730] ? mark_held_locks+0xc7/0x130 [ 340.150746] ? graph_lock+0x170/0x170 [ 340.150764] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 340.150800] ? __lock_acquire+0x7ec/0x4ec0 [ 340.181134] ? print_usage_bug+0xc0/0xc0 [ 340.185221] ? mark_held_locks+0x130/0x130 [ 340.189468] ? lock_release+0x970/0x970 [ 340.193461] ? arch_local_save_flags+0x40/0x40 [ 340.198062] ? rcu_bh_qs+0xc0/0xc0 [ 340.201636] __alloc_pages_nodemask+0x34b/0xde0 [ 340.206323] ? __lock_acquire+0x7ec/0x4ec0 [ 340.210583] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 340.215832] ? __mutex_lock+0x85e/0x1700 [ 340.219911] ? print_usage_bug+0xc0/0xc0 [ 340.223990] ? __kernel_text_address+0xd/0x40 [ 340.228499] ? smack_d_instantiate+0x136/0xea0 [ 340.233110] ? mark_held_locks+0x130/0x130 [ 340.237362] ? print_usage_bug+0xc0/0xc0 [ 340.241446] ? print_usage_bug+0xc0/0xc0 [ 340.245523] ? graph_lock+0x170/0x170 [ 340.249335] ? find_held_lock+0x36/0x1c0 [ 340.253417] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 340.258976] alloc_pages_vma+0x3a0/0x540 [ 340.263065] do_huge_pmd_anonymous_page+0x56b/0x17e0 [ 340.268201] ? __thp_get_unmapped_area+0x180/0x180 [ 340.273150] ? mark_held_locks+0x130/0x130 [ 340.277408] ? __lock_acquire+0x7ec/0x4ec0 [ 340.281671] ? pud_val+0x88/0x100 [ 340.285145] ? __pmd+0x60/0x60 [ 340.288350] ? mark_held_locks+0x130/0x130 [ 340.292611] __handle_mm_fault+0x3880/0x53e0 [ 340.297037] ? print_usage_bug+0xc0/0xc0 [ 340.301125] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 340.305986] ? graph_lock+0x170/0x170 [ 340.309804] ? print_usage_bug+0xc0/0xc0 [ 340.313893] ? graph_lock+0x170/0x170 [ 340.317711] ? graph_lock+0x170/0x170 [ 340.321526] ? graph_lock+0x170/0x170 [ 340.325365] ? handle_mm_fault+0x42a/0xc70 [ 340.329612] ? lock_downgrade+0x900/0x900 [ 340.333774] ? check_preemption_disabled+0x48/0x200 [ 340.338834] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 340.344638] ? kasan_check_read+0x11/0x20 [ 340.348815] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 340.354115] ? rcu_bh_qs+0xc0/0xc0 [ 340.357673] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 340.363142] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 340.368699] ? check_preemption_disabled+0x48/0x200 [ 340.373738] handle_mm_fault+0x54f/0xc70 [ 340.377837] ? __handle_mm_fault+0x53e0/0x53e0 [ 340.382439] ? find_vma+0x34/0x190 [ 340.386000] __do_page_fault+0x67d/0xed0 [ 340.390100] ? mm_fault_error+0x380/0x380 [ 340.394267] ? graph_lock+0x170/0x170 [ 340.394286] ? rbt_memtype_check_insert.cold.8+0x20a/0x20a [ 340.394309] do_page_fault+0xf2/0x7e0 [ 340.394329] ? vmalloc_sync_all+0x30/0x30 [ 340.403755] ? error_entry+0x76/0xd0 [ 340.403776] ? trace_hardirqs_off_caller+0xbb/0x310 [ 340.403795] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 340.403823] ? trace_hardirqs_on_caller+0x310/0x310 [ 340.430346] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 340.435227] page_fault+0x1e/0x30 [ 340.438701] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 340.444601] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 340.463527] RSP: 0018:ffff880182a6f938 EFLAGS: 00010206 [ 340.468911] RAX: 0000000000000000 RBX: 0000000000000100 RCX: 0000000000000100 [ 340.476197] RDX: 0000000000000100 RSI: ffff8801d78ac440 RDI: 0000000020e3e000 [ 340.483478] RBP: ffff880182a6f970 R08: 0000000000000000 R09: 0000000000000004 [ 340.490763] R10: ffffed003af158a7 R11: ffff8801d78ac53f R12: 0000000020e3e100 [ 340.498046] R13: 0000000020e3e000 R14: ffff8801d78ac440 R15: 00007ffffffff000 [ 340.505363] ? _copy_to_user+0xf6/0x110 [ 340.509364] pagemap_read+0x988/0xb50 [ 340.513194] ? m_start+0x8a0/0x8a0 [ 340.516764] ? __fget+0x4d1/0x740 [ 340.520249] ? smaps_pte_range+0x1cc0/0x1cc0 [ 340.520265] ? m_next+0x110/0x110 [ 340.520281] ? clear_refs_pte_range+0x1730/0x1730 [ 340.520299] ? ksys_dup3+0x680/0x680 [ 340.520312] ? proc_fail_nth_write+0x9e/0x210 [ 340.520330] ? proc_cwd_link+0x1d0/0x1d0 [ 340.528203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.528222] ? fsnotify+0xaae/0x12f0 [ 340.528243] __vfs_read+0x117/0x9b0 [ 340.552537] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 340.554593] ? m_start+0x8a0/0x8a0 [ 340.554617] ? vfs_copy_file_range+0xb90/0xb90 [ 340.554638] ? fsnotify+0x12f0/0x12f0 [ 340.577468] ? security_file_permission+0x1ba/0x230 [ 340.582504] ? security_file_permission+0x1c2/0x230 [ 340.587552] ? rw_verify_area+0x118/0x360 [ 340.591733] vfs_read+0x17f/0x3c0 [ 340.595224] ksys_pread64+0x181/0x1b0 [ 340.599049] ? __ia32_sys_write+0xb0/0xb0 [ 340.603215] ? __ia32_sys_read+0xb0/0xb0 [ 340.607297] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.612681] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 340.618153] __x64_sys_pread64+0x97/0xf0 [ 340.622243] do_syscall_64+0x1b9/0x820 [ 340.626147] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 340.631531] ? syscall_return_slowpath+0x5e0/0x5e0 [ 340.636479] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 340.641344] ? trace_hardirqs_on_caller+0x310/0x310 [ 340.646380] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 340.651423] ? prepare_exit_to_usermode+0x291/0x3b0 [ 340.656467] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 340.661332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.666530] RIP: 0033:0x457569 [ 340.669739] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 340.688652] RSP: 002b:00007f36db835c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 340.696406] RAX: ffffffffffffffda RBX: 00007f36db835c90 RCX: 0000000000457569 [ 340.703691] RDX: 000000000000ffd8 RSI: 0000000020e3e000 RDI: 0000000000000004 [ 340.710967] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 340.718243] R10: 0000000000103f00 R11: 0000000000000246 R12: 00007f36db8366d4 12:34:00 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000400", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x100000000000000, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0xffffffff00000000, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:01 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffff9e, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r3}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r1, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 340.725518] R13: 00000000004c3080 R14: 00000000004d4a28 R15: 0000000000000005 [ 340.789275] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:01 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf0ffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:01 executing program 0 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 340.861269] audit: type=1800 audit(1539434041.540:138): pid=10305 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16525 res=0 [ 340.916466] EXT4-fs (sda1): Cannot specify journal on remount [ 340.939194] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:01 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000100", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x3f00000000000000, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:01 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x500, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 341.090159] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 341.119915] audit: type=1800 audit(1539434041.800:139): pid=10322 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16528 res=0 [ 341.149890] EXT4-fs (sda1): Cannot specify journal on remount [ 341.162503] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 341.217870] FAULT_INJECTION: forcing a failure. [ 341.217870] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 341.275312] CPU: 1 PID: 10327 Comm: syz-executor0 Not tainted 4.19.0-rc7+ #58 [ 341.282641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.292018] Call Trace: [ 341.294639] dump_stack+0x1c4/0x2b4 [ 341.298293] ? dump_stack_print_info.cold.2+0x52/0x52 [ 341.303521] should_fail.cold.4+0xa/0x17 [ 341.307612] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 341.312748] ? graph_lock+0x170/0x170 [ 341.316569] ? graph_lock+0x170/0x170 [ 341.320394] ? find_held_lock+0x36/0x1c0 [ 341.324497] ? __lock_is_held+0xb5/0x140 [ 341.328595] ? ___might_sleep+0x1ed/0x300 [ 341.332755] ? lock_release+0x970/0x970 [ 341.336750] ? arch_local_save_flags+0x40/0x40 [ 341.341366] ? __might_sleep+0x95/0x190 [ 341.345364] __alloc_pages_nodemask+0x34b/0xde0 [ 341.350114] ? mem_cgroup_throttle_swaprate+0x270/0x884 [ 341.355518] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 341.360565] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 341.366412] ? kasan_check_read+0x11/0x20 [ 341.370596] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 341.375903] ? rcu_bh_qs+0xc0/0xc0 [ 341.379475] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 341.385038] ? mem_cgroup_throttle_swaprate+0x2eb/0x884 [ 341.390434] ? swap_duplicate+0x80/0x80 [ 341.394437] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 341.400004] alloc_pages_current+0x10c/0x210 [ 341.404436] pte_alloc_one+0x1b/0x1a0 [ 341.408256] do_huge_pmd_anonymous_page+0x813/0x17e0 [ 341.413393] ? __thp_get_unmapped_area+0x180/0x180 [ 341.418349] ? mark_held_locks+0x130/0x130 [ 341.422610] ? print_usage_bug+0xc0/0xc0 [ 341.426709] ? __lock_acquire+0x7ec/0x4ec0 [ 341.430980] ? pud_val+0x88/0x100 [ 341.434451] ? __pmd+0x60/0x60 [ 341.437663] ? mark_held_locks+0x130/0x130 [ 341.441926] __handle_mm_fault+0x3880/0x53e0 [ 341.446353] ? print_usage_bug+0xc0/0xc0 [ 341.450438] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 341.455301] ? graph_lock+0x170/0x170 [ 341.459118] ? print_usage_bug+0xc0/0xc0 [ 341.463191] ? graph_lock+0x170/0x170 [ 341.467007] ? graph_lock+0x170/0x170 [ 341.470834] ? graph_lock+0x170/0x170 [ 341.474687] ? handle_mm_fault+0x42a/0xc70 [ 341.478955] ? lock_downgrade+0x900/0x900 [ 341.483120] ? check_preemption_disabled+0x48/0x200 [ 341.488165] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 341.493976] ? kasan_check_read+0x11/0x20 [ 341.498142] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 341.503435] ? rcu_bh_qs+0xc0/0xc0 [ 341.506983] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 341.512448] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 341.518039] ? check_preemption_disabled+0x48/0x200 [ 341.523088] handle_mm_fault+0x54f/0xc70 [ 341.527186] ? __handle_mm_fault+0x53e0/0x53e0 [ 341.531793] ? find_vma+0x34/0x190 [ 341.535357] __do_page_fault+0x67d/0xed0 [ 341.539448] ? mm_fault_error+0x380/0x380 [ 341.543616] ? graph_lock+0x170/0x170 [ 341.547432] ? rbt_memtype_check_insert.cold.8+0x20a/0x20a [ 341.553086] do_page_fault+0xf2/0x7e0 [ 341.556917] ? vmalloc_sync_all+0x30/0x30 [ 341.561082] ? error_entry+0x76/0xd0 [ 341.564812] ? trace_hardirqs_off_caller+0xbb/0x310 [ 341.569850] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.574711] ? trace_hardirqs_on_caller+0x310/0x310 [ 341.579760] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.584653] page_fault+0x1e/0x30 [ 341.588125] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 341.594035] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 341.612955] RSP: 0018:ffff88018743f938 EFLAGS: 00010206 [ 341.618337] RAX: 0000000000000000 RBX: 0000000000000100 RCX: 0000000000000100 [ 341.625623] RDX: 0000000000000100 RSI: ffff88018114a880 RDI: 0000000020e3e000 [ 341.632904] RBP: ffff88018743f970 R08: 0000000000000000 R09: 0000000000000004 [ 341.640194] R10: ffffed003022952f R11: ffff88018114a97f R12: 0000000020e3e100 [ 341.647480] R13: 0000000020e3e000 R14: ffff88018114a880 R15: 00007ffffffff000 [ 341.654797] ? _copy_to_user+0xf6/0x110 [ 341.658791] pagemap_read+0x988/0xb50 [ 341.662631] ? m_start+0x8a0/0x8a0 [ 341.666197] ? __fget+0x4d1/0x740 [ 341.669676] ? smaps_pte_range+0x1cc0/0x1cc0 [ 341.674098] ? m_next+0x110/0x110 [ 341.677563] ? clear_refs_pte_range+0x1730/0x1730 [ 341.682426] ? ksys_dup3+0x680/0x680 [ 341.686149] ? proc_fail_nth_write+0x9e/0x210 [ 341.690654] ? proc_cwd_link+0x1d0/0x1d0 [ 341.694736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.700285] ? fsnotify+0xaae/0x12f0 [ 341.704020] __vfs_read+0x117/0x9b0 [ 341.707666] ? m_start+0x8a0/0x8a0 [ 341.711227] ? vfs_copy_file_range+0xb90/0xb90 [ 341.715828] ? fsnotify+0x12f0/0x12f0 [ 341.719688] ? security_file_permission+0x1ba/0x230 [ 341.724718] ? security_file_permission+0x1c2/0x230 [ 341.729755] ? rw_verify_area+0x118/0x360 [ 341.733925] vfs_read+0x17f/0x3c0 [ 341.737405] ksys_pread64+0x181/0x1b0 [ 341.741221] ? __ia32_sys_write+0xb0/0xb0 [ 341.745381] ? __ia32_sys_read+0xb0/0xb0 [ 341.749456] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.754840] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 341.760321] __x64_sys_pread64+0x97/0xf0 [ 341.764410] do_syscall_64+0x1b9/0x820 [ 341.768318] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 341.773709] ? syscall_return_slowpath+0x5e0/0x5e0 [ 341.778657] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.783527] ? trace_hardirqs_on_caller+0x310/0x310 [ 341.788571] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 341.793622] ? prepare_exit_to_usermode+0x291/0x3b0 [ 341.798669] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.803544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.808750] RIP: 0033:0x457569 [ 341.811957] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.830877] RSP: 002b:00007f36db835c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 341.838615] RAX: ffffffffffffffda RBX: 00007f36db835c90 RCX: 0000000000457569 [ 341.845915] RDX: 000000000000ffd8 RSI: 0000000020e3e000 RDI: 0000000000000004 [ 341.853203] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 341.860659] R10: 0000000000103f00 R11: 0000000000000246 R12: 00007f36db8366d4 [ 341.867948] R13: 00000000004c3080 R14: 00000000004d4a28 R15: 0000000000000005 12:34:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x20e4dfd8, 0x103f00) 12:34:02 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6800, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000240)={"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"}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x40, 0xffffffffffffff7f, 0x8200, 0x6, 0x1f, 0x4, 0x5, 0x1000, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000640)={0x0, 0x2c0, 0x20, 0x200, 0x7}, &(0x7f0000000680)=0x18) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000006c0)={r3, 0x0, 0x7, 0x480, 0x2, 0xffff, 0x1598000, 0x3, {r4, @in={{0x2, 0x4e22, @multicast2}}, 0x9, 0x1, 0xe663, 0x80, 0x101}}, &(0x7f0000000780)=0xb0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:02 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="7fffffff00", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0xe000000, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 341.950221] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 341.974973] audit: type=1800 audit(1539434042.650:140): pid=10338 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16537 res=0 [ 342.015339] EXT4-fs (sda1): Cannot specify journal on remount 12:34:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x0, &(0x7f0000000380), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000002d000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000000)="f2a766ba610066ed48b813c4830f000000000f23d00f21f835300000000f23f866ba2000edc441175d392e67450f01cb0fc72cbe67400f001066ba4100b0a8ee36420f015900", 0x46}], 0xaaaaaaaaaaaabe6, 0x0, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:34:02 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:02 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000600", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 342.178230] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0xe00, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xff7c, 0x103f00) 12:34:02 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 342.239842] audit: type=1800 audit(1539434042.920:141): pid=10350 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16519 res=0 [ 342.266110] EXT4-fs (sda1): Cannot specify journal on remount [ 342.319856] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:03 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='h\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x100002) 12:34:03 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf0ffffff00000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 342.492516] audit: type=1800 audit(1539434043.170:142): pid=10370 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16531 res=0 [ 342.527835] EXT4-fs (sda1): Cannot specify journal on remount 12:34:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x3f00, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f02) [ 342.551494] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:03 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000640)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c888c9ff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000040)=0x2) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 12:34:03 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:03 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4800000000000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 342.739406] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 342.752767] audit: type=1800 audit(1539434043.430:143): pid=10386 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16529 res=0 [ 342.784177] EXT4-fs (sda1): Cannot specify journal on remount 12:34:03 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4c000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x4000000000000000, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x20e4dfd8, 0x103f00) 12:34:03 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001f00", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:03 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x500000000000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 343.035016] audit: type=1800 audit(1539434043.710:144): pid=10401 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16537 res=0 12:34:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='-$&+\x00', 0x5, 0x2) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={'teql0\x00', {0x2, 0x4e21, @broadcast}}) [ 343.102298] EXT4-fs (sda1): Cannot specify journal on remount 12:34:03 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffff7f00000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:03 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) dup2(r1, r0) 12:34:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0xe00000000000000, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:03 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00L\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xff7c, 0x103f00) 12:34:04 executing program 3: r0 = gettid() r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)=0x1ff, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0x8, 0x33) 12:34:04 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x700000000000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:04 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x74, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x181) 12:34:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x100002) [ 343.358655] audit: type=1800 audit(1539434044.030:145): pid=10428 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16537 res=0 [ 343.394627] EXT4-fs (sda1): Cannot specify journal on remount 12:34:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x3f000000, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:04 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:04 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 343.599116] audit: type=1800 audit(1539434044.280:146): pid=10450 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16528 res=0 [ 343.632303] EXT4-fs (sda1): Cannot specify journal on remount 12:34:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x4, 0x3, @perf_bp={&(0x7f0000abe000)}, 0x2040, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b13f1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") socket$pppoe(0x18, 0x1, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x10305, 0x103f00) 12:34:04 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000900)="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") setgroups(0x52a, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xfffffffffffffff9) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) read$FUSE(r0, &(0x7f0000000b80), 0x1000) 12:34:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f02) 12:34:04 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x8000a0ffffffff, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x40000000, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:04 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 344.104253] audit: type=1800 audit(1539434044.780:147): pid=10462 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16537 res=0 12:34:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x101, 0x400000) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:04 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x300000000000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 344.150972] EXT4-fs (sda1): Cannot specify journal on remount 12:34:04 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00000000ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x8000a0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:04 executing program 3: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, r0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000040), 0xffffffffffffff08) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:04 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000900)="73746174757300c22322c94f133520785e91ea85ae107cc3819819c263540b1de1ba201e6de4b75a115091eed530aa482e36594601ceb5d169c5baf41b35d8a5a09a82496613d86023865b57ef269f90d304969f68e3541edbb55841bd978f7df53b611b40a44291b5a882208fbb835e54a41310a3b481d5bdbb0981742909a63b7cd1a18d405e5b011bfbe5a4d5bf299447e4c0dd4b63a367211c0078238b509d614100d33a5584aa3b3cb9b89e6e5f84719294d41b27117c47fb4f2b2be475eb25d5f69b6d10cf8422cade570c087b0387f7ea7fa5be8437b32e8083a8953509c5f244464dc657ace304e25d2420c1a55efe4669a0f8c3c9db254d0bd95c7b7729db77e0bdc0ce9f170827eebfe1395abfd8db1260ea8f47464499270816ad06a4d1726358e0355fc2b05329d34efbcdddc8bcd84db257a691ff137a798fae184b9803c866f1c32671b52961894eccae6b2d1b4fc500000000000000000065ddf85561717c6425fda90a23a6e775c95f9a18edd9c847038623cea48412d55604afc6e60b2f6d8a0a330fc1557c9e622b4f12d13c6ecb6256fe75218cacd5177b49be374443de1ab90042a574576a2b90818c1f573a028a395b12d4692f702917ef41112ae6edd2ded1ecfab70da6fa268d4222775dd801425bc2010887bbfb1b658120137df77509f33f3feb5365c2f08ebe233c4c262a1d6e12022dd801baa98459055a6a189bdd50ecb714f02c60b639087d50dfdc72ad72b0aadd68f0b2d227b2ca3c05dfc21fc860fbd392a7e5c127a8b46486c31da5b1f04b2d11f6ddf640305434") setgroups(0x52a, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xfffffffffffffff9) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)) read$FUSE(r0, &(0x7f0000000b80), 0x1000) 12:34:05 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffff000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x40}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/dsp\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'nr0\x00', 0xe1f077736d8bd37}) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x6e, 0x4, &(0x7f0000000580)=[{&(0x7f0000000140)="2970acac3aa2a6d323d73896e372181a5c2bb259fbb9d0a40714cccb764b3d85a3b31ddc20e97237bc9a486c7027d859e37824c0950b12f05ba9f67bc97189df53", 0x41, 0x8}, {&(0x7f0000000380)="7262434b1972b3d4871723cd88bcfbc3ee71b96e932ab02b13fc80bfa07cfb41fbb1122ad6b55c7ab5232ef315eb99891ef942ad68b4217cf7bbb8c225130d2a81ac63740a1e808749d34380a3d671a31e1c0450c6de435ce34a16eb272b52133ec47df13caa6775e079d88407a6d2e8f9020188d0d9c12a4f8c9f0c1132242b38518fe076ca2738dc81f92be1e4a967ed8d48c47d7f92667e24947bec66ef5e252421cbfa2125e6cf8f94fbdc19a4ba0d7f4c1ec2b514d901766aac2b7e2bbca7e7e0f71e9b42", 0xc7, 0x537aa20}, {&(0x7f00000001c0)="62c882f3d11cc34baa83770737f84a502e93c207e71f52f78c5e74e333ed3c7576af7a2f53c833d7618120d6bbac0d8b131dcb66d7322d9b04dcc53de18cce12de16d3ae66", 0x45, 0x3fb4}, {&(0x7f0000000480)="f08b16fe4479fb4ebd2a847a848fbfba00d50368a1722e52bd0f0f70f2100c3728681b4cfc498b16b9a4fbecf71de7864bd5ceefaf199298c62b519c87e2dcbb051d677421ff149e13da5c188f86ed7d3746855670a67383de537ec4849fdc0d3af42cbd18146aac93302f38e6e1aec7846556ec9ff142b1eb6c3307b82c4db3419303b65ff6dacf220b2d046c382a28c2741b03e2c50fa2ae400de8c48ec43870b7b0aaa1f9c51c93097c6ffad153b31cb1ecafcb3671f1a4bc38c20766754ffa1f02f07f6bc37e67b741c5", 0xcc, 0x8}], 0x4, &(0x7f0000000600)={[{@force='force'}, {@nls={'nls', 0x3d, 'iso8859-13'}}, {@type={'type', 0x3d, "02097050"}}, {@nls={'nls', 0x3d, 'utf8'}}, {@session={'session'}}, {@umask={'umask', 0x3d, 0x4}}, {@barrier='barrier'}], [{@smackfstransmute={'smackfstransmute', 0x3d, "706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}}]}) r3 = syz_open_procfs(r1, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000080)={0x8, 0x1, 0x0, 0x10001}, 0x6) pread64(r3, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 344.350857] audit: type=1800 audit(1539434045.030:148): pid=10488 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16537 res=0 12:34:05 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 344.399865] EXT4-fs (sda1): Cannot specify journal on remount 12:34:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x8, 0x1000000000103f00) recvfrom$llc(r1, &(0x7f0000000000)=""/104, 0x68, 0x40000100, 0x0, 0x0) 12:34:05 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) 12:34:05 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="001800", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x4000, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0', [{0x20, "706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}, {0x20, 'wlan1'}, {0x20, "706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}, {0x20, ')'}, {0x20, 'posix_acl_access/[/user'}], 0xa, "3800a80dfbe1d126caa276f43e174da3991ebaa2a94e3a10cf236fb8433d62688d123b8e84d674e9c486328e42a4aad6485104087147134240f0ba49377f17abfca81afe1e8278c23fe726b5e7dfd1bd91c5c0409171d5f0866528a43ba09a3323e293927b13e8a8b76a1c85a1e229f4f4bd14789e9457fe8f58fa531d302449750e5ce1a52aa64048c6"}, 0x29b) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:05 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:05 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000000)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000080)="e84e1da4f097bd5481f1524a387a08", 0xf}], 0x1, &(0x7f0000000700)=[{0x10}], 0x10}, 0x0) 12:34:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40040}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="bc000000", @ANYRES16=r1, @ANYBLOB="02042bbd7000fddbdf250e00000014000300080004000000000008000500ac1414aa080004000000000008000400de0b000008000500130000001400020008000800010000800800060009000000080005000000000008000600000001003c00020008000b000200000008000800800000000800090008000000080004000600000008000b0002000000080004000100000008000400020000001c0002000800050080000000080003000000000008000800020000000a61b378c5d93bc68e27"], 0xbc}, 0x1, 0x0, 0x0, 0x1}, 0x50) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 344.645139] audit: type=1800 audit(1539434045.320:149): pid=10517 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16532 res=0 12:34:05 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6800000000000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={r0, 0x10, &(0x7f00000000c0)={&(0x7f0000000080)=""/44, 0x2c, 0xffffffffffffffff}}, 0x10) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 344.740569] EXT4-fs (sda1): Cannot specify journal on remount 12:34:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x10608, 0x103f00) 12:34:05 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x8000a0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f0000000040)="fc000000480007fcab092500090007000aab08000a0000000000e293210001c000000000000000000000000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf1587c3b41", 0xfc) 12:34:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0xa0008000, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:05 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00`\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4080, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x2b, 0x4, 0x0, {0x2, 0xfd, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:05 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x74000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:05 executing program 1: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 12:34:05 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000240)=0x4, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) kcmp(r2, r3, 0x4, r1, r1) r4 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f000045b000/0x4000)=nil, 0x4000, 0x1, 0x80010, r4, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000100)) pread64(r4, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000000)={&(0x7f000080b000/0x2000)=nil, 0x2000}, &(0x7f0000000040)=0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000280)=0x2, 0x4) 12:34:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) socket$nl_route(0x10, 0x3, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x40, 0x6) getsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000040)={@ipv4={[], [], @multicast2}, 0x0}, &(0x7f0000000080)=0x14) bind(r0, &(0x7f00000000c0)=@xdp={0x2c, 0x0, r1, 0x16}, 0x80) [ 345.021849] audit: type=1800 audit(1539434045.700:150): pid=10552 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16522 res=0 12:34:05 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x700, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0xe, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:05 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='l\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000240)=0x50) inotify_init() r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000000)={0x9}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x7}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)=""/246, 0x130, 0xf6}, 0x20) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f00000000c0)={r2, 0x80000, r1}) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000040)={0x5de, 0x100}) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) [ 345.140478] validate_nla: 15 callbacks suppressed [ 345.140643] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000000)={{0x5e, @remote, 0x4e20, 0x2, 'wlc\x00', 0x8, 0x3, 0x6d}, {@loopback, 0x4e20, 0x2000, 0x1000, 0x5, 0x3}}, 0x44) write$UHID_INPUT(r0, &(0x7f0000000380)={0x8, "508c590f76a83551172ffe8b31cdb164285889684e72378378e588f0b5e2f60779509633633698b1d176c75e352c8af6696332e213b706e57e0a69d4c309cc2ca4ee407b93f944e6d01b34c4cb0b7707fb1e0c1ac1f37eb2f01adf78a5476b737884b3f091f0c0100737afd127352506b83787d9210815cf7cfc01b37934337a6d642f5d3d88261fc990dc72a280a1f71f4cda6e3944daacf8931c74bfb4af98d3dadf1c11216cabd38836223e518cdacda7c57fe25d8db3617a1cf5ced85a693eb858a5db76c03e308b426b20bbe7db98d18b40dc1dbbe8b6841cc843bb3f07226ebb513e06d041ea8126b6f38ebc127abcc71017cc856e633b38b956630dd1d9953f8b0e5b3536ccc0f304cab18c3019f5373058c7ac3ec25f4240cc2187fb9ba8703465f68c36a2fb5d4a2f9d08acee582254c429f6d942434cb8e49a542f310afd6505f54b986091f2128c2e2652cd8718356f500dbc84657232542406cb252c42568fd05060571bc11fc06bb3d3461d23b1188b118c366ca7c0c81422183ec9f78bc3559a706c1a4f19dbe9a05fb38281d8a8045651d423996882f23bfae0e9203c066730351bb707f354792b4f5b1bbeced3b1d80d4c242d2a7f8b26c004a3753458af7e0b0c125176e009c752889792da223ab76552df888c2a3649589dc00a7782213efb804316b74cfd7a2235fd55d49778dc7cb787d5252f7b404277abe322ebd9535b5d09d3fee1df2b787514f18a7ae8433fb400b0f9865562105be37dbfc2a73618ba55a569211fec9e5c61ae755d9ae52c8b322549904dd9ad265bd7cf1e90e3e3d7ecc98c55fd30ac0c548b475fad3e35177b971d6c2f0577df27968edda5a125eb82f1a40005882e23af9591c8c753c845e00c7701b7722c24dd5186e7b13de302fecadced530b8c7b70ab0b43c93a187ad6ef1323a715454df3fe14d2edeb276d08e86474f9fa3719ed03e230851a214ffa30ac3bbfeda3d30e0b50be93c2df44fbf5545fa491dff88b7c973d6e7efa080dc6cbab148434b7b7f5cf62495981f52e522a0ccc2e69a4782f43bc5dce378f9db7d66bfb954efc151a67f50323af04edaa1477bc550de93d2ac67f788db4d67afea2d63b496930cdbacd003a2673cbf76bd1b46d30fbe2e72359dc7e8fed9dd71ee92560270f0c18b3ed7c2edbcfadb1e818d74c5f5369ee6bef9ba4fe471f10a620f063ce09424cdf9aa395e30af60b8061cff9601f6c1758ee568ae364842ec3bdc6880123d693e3fa8854fdf6c4a32a3b140a636185463115b0dd8a80264fb6af7641823d9679d5b1008e629aaa6de87c414af9e3cc65296e65dfaa6f8ddf3b3c897bc420635c4393b280e6723d111af018ee9333c1f6bf24dcd01ff94becbcbe6982bdcfa8ef1740ecd7deeb155727a1b44b7337b738909dd4b99a2ea48e97d41d48c60f52c5b536abec92eaef96910c4f974af069bbe4ed19cd106fd43218299f9d7d5ab05f718375fd8499c728f0dfac9e8ed101c2a7dd07b7a0785253839507fec6cebcec5ea67b1b7a1031b48e6ae6a0835d0c62ec4a6658ab935783d61893178fd6ff4d1056c9efff5c50f20f87ff1bdb441e33d65a82e6d4980ba70406b7310abc03e9d61b958da29eba2a97e5dcb2265e85850941956d808828e9edbb89edb789bc5d1650a593c1626df0db0caca7ee8f9122c0345f3ec47a16428b55ab47c1d80b62f40714070496f27e843b4211a9e8cff9ed0b5a06492c5249881ca78b1bb811127da6d519b322f716c8a911740f383f54fa5a0926f059c2046b4a48ca90c12bb64d628bbfe007368cf30cce187fe0fc56a7e5bcc50ee2e41f43cccb3c3a1eff750ba281dbad556bca8778ce307c75e62df6aef2f4f78ca78df39bf330d34588f7920a27603995a7a47e906236676b47eb301a044a5309aee98afa667cee7f7326c9e24d8908b08101974dd4e92479142a138fce56a4d6d64f94e6c348850b12d900d694a95aa0907678b874e82deca32643b29a257a4075d813bc4604c132763873856f703c2e391002c407e8412177274db2f5a4dbe0731310cb6f7bb031dc71bd63c94249ba8596a35a4e0c672def63514b91f76c89c4b53b4ac44334807cb2f4766057fc0ecf7d859d260beca0ff42272d84609ada71aec53feb94b1a6b11406fbe96cc19bc6ab80ac9442ad5d275425b242352f6ee772c97c879338e33c40e95a66a2374bf3ff105bbb5f70fb15be9ae773a0d5f9412788f0fb8b002565fd6de386d1e00ce4ce2fa8e767678b7d199467c3c18fde243e799bd92845b930fc21db07973442a03ff5d991b06c573a5714e2b05ef8dce2992b37eb5144d5d885ad898c52f06cfec72f4084511a86cebab7078e3422acf3130c80b73ab6e9d901cdbecd1435acf40343f95dc961ce956283d9de1a0494b20f2896dc97bf406e877d16a1f5002cd3829b10e64bbfce64b2cb3f4a9edb5461899d5a8b59c86a17c57fe7d8349626b35b9b18fdeaa1b90685f489e3e1df25f7bd380e8ade94a9fd1593cdc146c207ca4dbb72e6da2443c97249653aade6d8dd52002cf4551bb9c01c5b39ba47cb22ec6bae0b8e307b07dc2a4b4460afce8a957b1bb8e7d617810d92656f0126c3cd0f0ad19a650bc33f796058770a772aa2114f19777278289241cb7b2027a4c9c66a184b47b358084210d7e2dda016791962e30bc016cbcf6bcd46fa95be5db464a66912f96867c62a03cf34a07d84df97faf16223715796a27d60c4de68c7cac95171a46eb61ea5fdd4091cd109211ee3957efda9754b49d5f55e45d062e6ca85954a5dfd7f0110d36b82174c6c45cbd77b67685e596c56d2a8658960e9a43e6bcbda421142b9456c915a78190c53740bffc718e11dbf1d17f2790b64f9200f1936f98140f6ccff0cd04ac789729c26361bdb192aed960b00b486d613a884686c6f80ac4f385b830b1c1167ed3026d08fd828b6724ec2b1f7bad0a0ac9b5dbd9e071a1841c3d47716c435c0ead09b00357bd549bd2e16b27554805b42e3cc12f14e92fcadb920d550e7667ebd555612b0383495d2daeb3c4582fa31487fd8626d18723fc72086c7e42a672d6d369357f68c2f5a0e84688d2c2871b2bb715e91c365299a4a8ad8e214bc12c7879ff7a5ef08ca0d7d97fcd8d5faf6e424683d63be238a578f5ae2a3832c0941f52f5bc2ad1fc081494ec4d7e859190ba49f5cb2ca9eaba8edaf73f2248c5f6d17950b51327fd75af94cf9a31f6d5e19462d42ff680f42c175aa7e8eb27a7552e97efeb4c1295e8f5ed7b60d6e944e61697e73c9fab8b7eb0075ad6570b27fc620b283d8caf50cdb38a801c69ad19bf83f21c64c84eb7340b35cf07cb77dae59838d7b83b55b3f28a320587d742c5703813093a3cb8236473097535a7be89ee596f0caa4ef434ebef103d5da956c429f38042079fe1ce73f230355f3186fce3e92f84e63f7e9332b269d3707d57790d72e93f96066005dc9bf1948a8078c81e9bc329c00a2137fa00dc3b36b24df3732ee2c69be10075312c1d6a03ee8addcd3853ae256c6a12f4b6e5a294e70ca269e0052e3c0691731bae9b115efdbb88eb988287ef4acbb01ce194546167085503dd6df5fd4a2a424461117f1f777288a3022674b2594e60dec36c1f3548311bf46b5d049834a0b865b0f60e78a78f0ab9bceaf494a45612116446ccc7f0ed63be0afc5f1efa4a4381e1ef1ee6d57f549b5049296d24c4b04545d7379076e30891253a49c94b9afdd7f1f701f644ebff3e0751e57c9bfa69b6134c7a3530e02beb28d1a58371470ef9ef74c87e0f6a7d32fd05ed5b05126d3598ee6b44dade90f7adaf0b6ed6a110275eefa144ecb0b377aa7ca942edc3b4a1bf8d6ccbefc87e8c4cd89448d4e340f2d5a2e9803528b5df588453e1af6449d25ecad13e5c1e3df24535e9c4f6e39e1f66bf4220e79d7f793d493aada4c9971403e523e41184d6a4a2ae6ba425ad5564b59f2285ad2834cd8ddce854fdd6db2a2dd0eefc7f16e0dae9860cb09491e3e9c46196477808d52b4751192f7a20a8dd0aad438cfe491fb503a2b6113e9f00a0ec6b85ff10c6d435375bb16246f7bfe326a18940edbb50f90e24692fee18e0c79fedc012c82e383739151595ebd173f3c56d67e8df99c215d5fe8e7518276929cd7e22d13068ec8df6411f3222d204c2747f81222b1929f135197ab599bc46786b67e626bca5b43930755736b48a93aa6954777897a230eb9ab3b6d5fb113837ab24b3047a69b6c7eb4982d34d19df300312f082e70952b95faa9be3c36dd84c12842a02b548f21721da2c19438a2640794a3fcf88509ae2627cef410daaa63315a87fa45ce9936277cc6e75c55d976630f0c5e4c3a0ab63b04468c9657308073797d4cd874cd4193e97bb692ab786aacf77068d541a72c520759d1fc0ed4c47781c0c31388724b8378b91f0dcfeabf24540ccecf765dab1a32d58fb9c894c110495c0f0c3665e531f72e6c26e5ef7a433bf230843d41293843dbd5a36944734f9d3d60f67da537ef0ca9332db3a38cd708a4623be9416e78a4560197c7653f6b1935666a17fb48a4a6e769f7a4a018c5f93086d19c546e9637a4e92c1b26295a16b4abc6496e0484d803042d054d75b842569f3f49654dfa990dcf41a4c13bea4db80fffd643c5fbf4cf590f63093712a7dd8f4d156409fb62d38f2ca63b175302a9f1c703bd8456f1bbfdd14c25c55b082646f7ccb65e03b0c15436916506d091a710b0d897ff3e81436083daf4566c208c620ebb54f295f186cb24cb8c6ed5a1197ee1ad393a00e6b1331d95801403c9bf01db60f3bc756a32fb79e2263618167c67a153c33588e9b7246d267b369f1e3923017b44147e91c338b545238bc15da069b1118ff69f49d6d277adf7141e23d50d448878f5721a6dbc1c1dbeb2528f67956ea82d95e333ba7a7013c597a983ae43411f268b2aeb38e64b85b11a17a2fa5c08b41fc7ffe89002a6445a6280309442a5626acb636cbf5587a398e94c9a6f69a5ce1245b10b8d30fc62f0e982e360dac192765716939f28f5d4cb90ed910a495aa958f71151d63ed8d6e1e1ac9a7a326ceb117630915f1aaee4cf9f78a7396ded923934139bdef525d48566370099d68045032df9e7408097615fb57fafc1b8b79dddc60f37b31a04c6309403799d1204eb5b5f62cfdbc20ec7f8b26e8bc405cf75971a393c528f51525889452475c9a1ab09ff3acf754d7b9ea6eeb01c6b1298cebcd7fdf94855e32eafd08231c575ab583de2fef91ad2e14b726e95dee6e995b7d3fc6d2b397b8c06dce2075f5e370ccb5448c8b9c3744305d5d5e10593bb7aa705588259585fcb3a00f45509d37f994ade580adabd346cebb8a9ffbe918bbf4a9a5ad70c9fed092a306ff2f1fdaa53e73c8be9070c25f861a15b02b849caf1bcda1bfdfefc96cd95ec918a1e17dbe5af17ef2fb53a0359feff3bf76146407cdaef954e34968c20fc5988e1ce4679b752df33ce216a2099e60f6fb4ef1098adc40bfe21c84150e3a198725d5d3f0ecd1ba7d829e2c7dfc03fde8396ac6a6415c170b2511dccac0f338d54ba95d1bbd185d39acbfa918821b658291bed3425a138aa47807d30f92870f5130f3c7f79cdecc152c883c56c20709d85719cb0a722e4933ec9b02d38686160763754e0c14989744967a027b25eb23df4f983c6ff8acf01dd317fdd309abe3b75f41b289436bebb83ea45910ea4efc5c252f573849129407ea2e1ad35e163ffd7ccd5cbd61338", 0x1000}, 0x1006) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0500040000000108000635e4481c7eaf"], 0x10, 0x2) [ 345.199982] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:05 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000000)={0xf000, 0xf000, 0x8970, 0x3, 0x400}) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 345.289834] audit: type=1800 audit(1539434045.970:151): pid=10578 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16517 res=0 12:34:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0xffffffffa0008000, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f00000018c0)='/dev/adsp#\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b34", 0x85, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:06 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000500", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 345.371076] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:06 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7a00000000000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x5, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000000)=0x3f, &(0x7f0000000040)=0x4) 12:34:06 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x42) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x2, 0x2e4) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 345.510539] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 756082810144684242 /dev/loop1 [ 345.523195] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 345.538069] audit: type=1800 audit(1539434046.210:152): pid=10596 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16528 res=0 [ 345.544885] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:06 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffdfd00", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:06 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xa00, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000100)=ANY=[@ANYBLOB="0400753c540000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000051669bce0000000000000000000000"]) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000080)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x2e9) pread64(r1, &(0x7f0000e3e000)=""/8, 0xfffffffffffffd93, 0x8) 12:34:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x8000a0ffffffff, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f00000018c0)='/dev/adsp#\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b34", 0x85, 0x10000}], 0x0, &(0x7f0000000240)) [ 345.730777] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:06 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x600, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x90004) 12:34:06 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="a0008000", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 345.905485] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:06 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6802, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:06 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeff, 0x4, 0x0, 0x4, "3eb5472d2377804fb95e11877f883d2ae65c159379f6c7e751c6c5723a452c911edfb169eac8268cbfa546db44c8dce7a3a2d7d16bb7d0370b3aee6a24666774", "4928b91d8a4444fc08ecefe592c0f84260bd9d3cc37db30bfbcadb78d8fc5c21", [0x2, 0x8]}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r1, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2000000000000000, 0xd, 0x0, 0x0, r0, &(0x7f0000000000), 0xfffffce4}]) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000240)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) [ 346.040182] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:07 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) mmap$binder(&(0x7f0000642000/0x1000)=nil, 0x1000, 0x9, 0x100010, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000e6d24b", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={r2, 0x1e7f}, 0x8) 12:34:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x1000000, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:07 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffffa0008000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:07 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00h\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:07 executing program 3: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r1 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) r3 = geteuid() lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @remote}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) r7 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x4, r1}, {0x2, 0x1, r2}, {0x2, 0x1, r3}, {0x2, 0x5, r4}, {0x2, 0x2, r5}], {0x4, 0x1}, [{0x8, 0x4, r6}, {0x8, 0x1, r7}], {0x10, 0x2}, {0x20, 0x5}}, 0x5c, 0x1) r8 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x10080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$KVM_GET_MSRS(r9, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{}]}) r10 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d034, r8, 0x0) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4) pread64(r10, &(0x7f0000e3e000)=""/8, 0x8, 0x103efb) 12:34:07 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r1 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000400)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x14) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ptrace$cont(0x20, r1, 0x0, 0x7) writev(r2, &(0x7f0000000a80)=[{&(0x7f0000000600)="80", 0x1}], 0x1) tkill(r1, 0x37) [ 346.412072] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:07 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f00000001c0)=[0x0, 0xffffffffffffffff, 0x0]) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x200000, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x800}}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, 'cgroupppp1'}}]}}) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x2, 0x1}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r1, 0x2, 0x4, [0x1, 0x3, 0x2, 0x80000001]}, &(0x7f00000000c0)=0x10) 12:34:07 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:07 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00t\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 346.563100] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x8000a0ffffffff, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:07 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") socket(0x13, 0x1, 0x7f) read(r0, &(0x7f0000000000)=""/174, 0xae) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f00000000c0)={0x8, 0x7}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000300)={0x18, 0x0, &(0x7f0000000100)=[@clear_death={0x400c630f, 0x1, 0x2}, @enter_looper, @enter_looper], 0x96, 0x0, &(0x7f0000000240)="4a7e6ef5c8103bf29adbbf2e4762e1c5560e2e63cfb68a721e5a3e541353fb6785d25f604195febab1596dc3421739ddacabeda37439ba2cc63866ea2ebe8d417904808c9c5df67ceb9e527cfda8399b873eb076095693062c8a4d9f82ea8c1d49ad23a9583c006b31bc146ed036256c9b6f08a2ff77b1d2bfd12c579340d994960cddd69c9b1dcb5eb7a19e9ed3c8b7a8723918c2fe"}) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:07 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x9effffff00000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)=0x7) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:07 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xa00000000000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x8000a0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:10 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00?\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f00008ee000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f0000000000)) 12:34:10 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x3000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @broadcast}}, [0xfffffffffffffe01, 0x9, 0x3, 0x800, 0x401, 0x7, 0x708ea57a, 0x50, 0x2, 0x68d, 0x400000000000, 0x2, 0x5, 0x3, 0x1f4]}, &(0x7f0000000140)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2, 0x0) 12:34:10 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x5000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 349.467388] kauditd_printk_skb: 4 callbacks suppressed [ 349.467402] audit: type=1800 audit(1539434050.140:157): pid=10696 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16522 res=0 [ 349.500719] EXT4-fs: 7 callbacks suppressed [ 349.500730] EXT4-fs (sda1): Cannot specify journal on remount 12:34:10 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x780, 0x1) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000040)={0x8, 0x6517}) perf_event_open(&(0x7f000001d000)={0x0, 0x41e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x400000000007f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:10 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xa000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:10 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) r1 = socket$inet(0x10, 0x3, 0x4) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000001b40)=[{{&(0x7f00000001c0)=@alg, 0x80, &(0x7f0000001440), 0x0, &(0x7f0000001480)=""/177, 0xb1}}, {{0x0, 0x0, &(0x7f0000001ac0)}}], 0x2, 0x0, &(0x7f0000001c40)={0x77359400}) pread64(0xffffffffffffffff, &(0x7f0000000000)=""/8, 0x343, 0x103f00) 12:34:10 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="f6ffffff00", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x3f000000, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:10 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000900)="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") setgroups(0x430c, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x71c) 12:34:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x7, 0x6818, 0x3, 0x100000001, 0x0, 0x6, 0x5, {0x0, @in6={{0xa, 0x4e22, 0xffffffff, @empty, 0x8000}}, 0x9, 0x5, 0x9, 0x3, 0x2}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r1, @in6={{0xa, 0x4e21, 0x6, @empty, 0x100}}, 0x4, 0x7, 0x3, 0x81, 0x1}, 0x98) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:10 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:10 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)={0xfffffffffffffff9, 0x6, 0x4, 0x0, 0x0, [{r1, 0x0, 0x7}, {r1, 0x0, 0x2}, {r1, 0x0, 0x7}, {r1, 0x0, 0x100000001}]}) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000), 0x4) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 349.768887] audit: type=1800 audit(1539434050.440:158): pid=10727 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 [ 349.815305] EXT4-fs (sda1): Cannot specify journal on remount 12:34:10 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6c00, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x4000, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:10 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000a0e000/0x2000)=nil, 0x2000, 0x1000008, 0x4d031, 0xffffffffffffffff, 0xffffffffffffffff) fcntl$setstatus(r0, 0x4, 0x400) 12:34:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap$binder(&(0x7f0000852000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:10 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6c, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 350.038072] audit: type=1800 audit(1539434050.710:159): pid=10751 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 [ 350.079235] EXT4-fs (sda1): Cannot specify journal on remount 12:34:10 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8001) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000040)=""/125) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x40}) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x5, 0x10400) 12:34:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x4ea) read$FUSE(r0, &(0x7f0000005000), 0xe83) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000008000), 0x139f) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x10165) write$FUSE_OPEN(r0, &(0x7f0000000240)={0x20, 0x0, 0x3}, 0x20) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 12:34:10 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\fz\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0xe, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:10 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xa0008000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 350.250283] validate_nla: 11 callbacks suppressed [ 350.250294] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 350.267119] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:11 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:11 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x9, 0x41) fstat(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) getgroups(0x5, &(0x7f0000000500)=[0xee00, 0xee01, 0x0, 0x0, 0xee00]) getgroups(0x1, &(0x7f0000000540)=[0x0]) getgroups(0x1, &(0x7f0000000580)=[0xee01]) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000680)={{}, {}, [{0x2, 0x0, r1}, {0x2, 0x2, r2}, {0x2, 0x0, r3}], {0x4, 0x4}, [{0x8, 0x4, r4}, {0x8, 0x5, r5}, {0x8, 0x0, r6}, {0x8, 0x6, r7}], {0x10, 0x7}, {0x20, 0xd93e1624b4ffa21f}}, 0x5c, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x40000000000004) ioctl$sock_bt(r8, 0x5411, &(0x7f0000000000)="bcf4853385d7f3618ff43fcc3a3429aa01970139d92b59ca66a4d073fb404a05c6069a7dd4aeb8c49f1c7346d1561f182c04e665fea8e412df4f8dc8dd408957fe88f203a7327b") sync_file_range(r8, 0x4, 0xd642, 0x2) pread64(r8, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) fchmod(r8, 0x20) [ 350.301118] audit: type=1800 audit(1539434050.980:160): pid=10775 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16538 res=0 [ 350.330037] EXT4-fs (sda1): Cannot specify journal on remount 12:34:11 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) getpid() r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000240)='net/dev\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x7f, "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", 0x3a, 0xffffffffffffff84, 0x1, 0x1, 0x7, 0x13, 0x3}, r3}}, 0x120) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x100000000000000, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:11 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00l\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 350.407754] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:11 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x68000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:11 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x440000, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000040)={@dev, @broadcast}, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915707000000000000001526067881fdf1e3db51d27684066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e6f3e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)={0x0}) fanotify_init(0x2, 0x101800) r3 = getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x1, &(0x7f0000000240)=""/60) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000200)={r2, 0x3}) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) connect$vsock_dgram(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) [ 350.540794] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 350.560893] audit: type=1800 audit(1539434051.240:161): pid=10797 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16519 res=0 [ 350.605911] EXT4-fs (sda1): Cannot specify journal on remount 12:34:11 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000900)="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") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setgroups(0x2, &(0x7f0000000200)=[0x0, 0x0]) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/71, 0x47}], 0x1, 0x0) 12:34:11 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:11 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") readv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/88, 0x58}, {&(0x7f0000000080)=""/154, 0x9a}], 0x2) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0xffffffff00000000, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x2bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='limits\x00') mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) write$P9_RVERSION(r1, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0xff, 0x8, '9P2000.u'}, 0xffffffffffffff74) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:11 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="1800", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 351.168854] audit: type=1800 audit(1539434051.840:162): pid=10815 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16531 res=0 [ 351.196715] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x4001, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x107041, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user='access=user'}], [{@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@smackfsroot={'smackfsroot'}}, {@hash='hash'}]}}) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) [ 351.221205] EXT4-fs (sda1): Cannot specify journal on remount 12:34:11 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7400, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @dev, @broadcast}, &(0x7f0000001b80)=0xc) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xfb, &(0x7f00000000c0)=""/251}, 0x48) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:12 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0400", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0xe00000000000000, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:12 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x101, 0xfffffffffffffff7}, 0xfffffffffffffffd) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000040)={r1, @in={{0x2, 0x4e22}}}, &(0x7f0000000100)=0x84) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000280)=""/93) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000071000/0x2000)=nil, 0x2000, 0x2, 0x4d031, r0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000240)={r1, 0x5}, 0x8) pread64(r2, &(0x7f0000e3e000)=""/8, 0x8, 0x800000103f00) [ 351.378182] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") write$binfmt_elf64(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0xe6, 0xb59, 0x1bf, 0xb3, 0x3, 0x3f, 0x6, 0x34, 0x40, 0x1b9, 0x8, 0x1, 0x38, 0x1, 0x7f, 0x80000000, 0xffffffff80000001}, [{0x6474e557, 0x7f, 0x3, 0x1ff, 0x100000001, 0xb9, 0x3, 0x3}], "67516cd820ec309d23ae4f6a57868f3bf24f05f5517c7994eb839510484420ebdd8c37c857878b523c5c69c090c93a92614a0b5b0508d7f0eeee8f4a8b7358bf681247308e31cb4518e552077347703d9a8c0c0e7727f57be8b4467c3a63ebe2b18905a11c357fd237e326aff52f5908644c3b0fa01c80d4f131fc43d0e37205e22e7e73f764f05a0706fd4bbcf4a58961fd", [[], [], [], [], [], [], [], [], []]}, 0xa0a) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 12:34:12 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x48000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:12 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x268, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 351.511922] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 351.530291] audit: type=1800 audit(1539434052.210:163): pid=10845 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16538 res=0 12:34:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @dev, @broadcast}, &(0x7f0000001b80)=0xc) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xfb, &(0x7f00000000c0)=""/251}, 0x48) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 351.565191] EXT4-fs (sda1): Cannot specify journal on remount 12:34:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0xa0008000, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:12 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x101000, 0x0) getsockopt$inet6_buf(r0, 0x29, 0xf3, &(0x7f00000003c0)=""/224, &(0x7f00000004c0)=0xe0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000540)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@local, @in6=@dev={0xfe, 0x80, [], 0x1f}, 0x4e24, 0x5, 0x4e21, 0x4e, 0x0, 0x20, 0x0, 0x3c, 0x0, r2}, {0x2, 0xfffffffffffffff7, 0x53, 0xea6, 0xffffffffffff91bf, 0xf21a, 0x7, 0x3}, {0x4, 0x3ff, 0x0, 0x1}, 0x7, 0x6e6bb0, 0x1, 0x1, 0x2, 0x2}, {{@in=@multicast1, 0x4d5, 0x2b}, 0x0, @in6=@remote, 0x34ff, 0x3, 0x1, 0x3ff, 0x100, 0x4, 0x1ff}}, 0xe8) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) getxattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="73797374656d2e776c6101007d3a6d696d655f7479706573797374656d00000000ab5cea260d6370757365745e706f7369785f61636c5f61666365737300"], &(0x7f0000000580)=""/227, 0xe3) r3 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="f14caf7654a9e04876fa44f1e096dadf83dceb2ecd1fa87256ad5f8fe22c9ee9c7cb688e8cd224cad75996613a1a77465cb6ddfc9e2f120b7d4fc637ba304493e2fae188b9c83172f3801520657e837a5cb05c84730d6b26e0b4d1efd37063803c6486f8f1ab22fa314b209e6336131e6129b91684b3410884a4a19f1e46aaff88eb1a5c31bfa3391d895643c2b92bfdf6ac2504169755ff65080bfa513d95b1e4d399af18441ce26ec13a2176cd5b57f5d5", 0xb2, 0xfffffffffffffff9) r4 = add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="1ff3bbaf81a1646c5c0ee50eb337d33d65b53f99ac7e7d1c617e44d1b30abd066da29fee4230f131dab171644ae4be33072b0a53391b491b5f21264530d665d5faf48552dd08a69984103db1c50a5b5a749f725547bf83c0f870db1b523aa2e77da30b4bfc991366a0a135d107685ea171a37b890d003bfbe1b1c6c3505b87b96ca222202c33051575c6cf0ceca32a10b625d64db47cc51cf0f3", 0x9a, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x7, r4) setxattr$security_smack_entry(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64EXEC\x00', &(0x7f0000000940)='\x00', 0x1, 0x2) [ 351.614353] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:12 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:12 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4c00000000000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x2000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(r0, 0x9) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000140)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={r1, r3, r4}, 0xc) r5 = fcntl$getown(r0, 0x9) r6 = syz_open_procfs(r5, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000374000/0x3000)=nil, 0x3000, 0xffffffffffffffff, 0x4d030, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000000c0)) pread64(r6, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000000)="8acad9603604ebd05058be073f133faabbf0d3e846b0de149a5fefc5cdef898ad5e58540e23ed191e869c327004dfde4e3c6050df7c14f3c93d085bbe8366bc6e1384747cc76bfbf46d0fdc3981280eb25c5b8e7466c738e9ac272204a9cc281ef8b899e28a48dbda788ec20ec6b53c1d1324fb076fd6ec7c352e6a4bd8cf1dee8ab5c995cd6", 0x86) [ 351.771018] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:12 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6c00000000000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @dev, @broadcast}, &(0x7f0000001b80)=0xc) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xfb, &(0x7f00000000c0)=""/251}, 0x48) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 351.814995] audit: type=1800 audit(1539434052.490:164): pid=10872 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16538 res=0 12:34:12 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") fcntl$addseals(r0, 0x409, 0x1) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000000)=""/8, 0x8, 0x103f00) 12:34:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x1000000, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 351.860576] EXT4-fs (sda1): Cannot specify journal on remount [ 351.897690] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:12 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00000000ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @dev, @broadcast}, &(0x7f0000001b80)=0xc) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xfb, &(0x7f00000000c0)=""/251}, 0x48) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:12 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x200000000000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x100011, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000782000/0x1000)=nil, 0x1000, 0x4, 0x13, 0xffffffffffffffff, 0x1000000000000001) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0xe000000, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:12 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x600000000000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 352.083725] audit: type=1800 audit(1539434052.760:165): pid=10894 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16530 res=0 [ 352.120723] EXT4-fs (sda1): Cannot specify journal on remount 12:34:12 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00H\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @dev, @broadcast}, &(0x7f0000001b80)=0xc) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0xb) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x8, 0x8000) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000180)) r2 = syz_open_procfs(r0, &(0x7f0000000000)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:13 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x3f00, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x1, 0x40000) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000001c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000000)={0x0, 0x7fffffff, 0x2, 0x7, 0x6, [{0x5, 0x2, 0x0, 0x0, 0x0, 0x8}, {0x10001, 0xf2a, 0x3, 0x0, 0x0, 0x8}, {0x8, 0x3, 0x1, 0x0, 0x0, 0x4}, {0x80, 0x7, 0xfffffffffffffff7, 0x0, 0x0, 0x404}, {0x3ff, 0x3, 0x6, 0x0, 0x0, 0x8}, {0x6, 0x1, 0x760, 0x0, 0x0, 0x80}]}) [ 352.370275] audit: type=1800 audit(1539434053.050:166): pid=10921 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16535 res=0 12:34:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='status\x00') mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x8, 0x103efc) write$P9_RXATTRWALK(r0, &(0x7f0000000000)={0xf, 0x1f, 0x2, 0x3ff}, 0xf) [ 352.422503] EXT4-fs (sda1): Cannot specify journal on remount 12:34:13 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:13 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00@\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='tunl0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000100)=0xe8) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000005c0)=0xe8) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000700)=0xc) getgroups(0x4, &(0x7f0000000740)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee01]) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000780)={0x478, 0xfffffffffffffffe, 0x8, [{{0x3, 0x3, 0x10001, 0xde, 0x0, 0x2, {0x1, 0x5, 0x8, 0x20, 0x80, 0x8f, 0x9800000000000000, 0x6, 0x2, 0x3, 0xfffffffffffffffd, r1, r2}}, {0x6, 0xe812, 0x1, 0x2, '/'}}, {{0x2, 0x2, 0x3, 0x5, 0xbed, 0xffff, {0x1, 0x9, 0x5, 0x40, 0xfffffffffffffff9, 0x2, 0x7, 0xffff, 0xe11f, 0x2, 0x7ff, r3, r4, 0x8000, 0x3f}}, {0x4, 0x7fffffff, 0xf, 0x8, "44bdc75d6d696d655f747970652134"}}, {{0x4, 0x2, 0xffff, 0x1, 0x5, 0x0, {0x2, 0x7, 0x4, 0x26b, 0x2, 0x1, 0x81, 0x4, 0x5, 0xfb, 0x800, r5, r6, 0x3, 0x18000000}}, {0x1, 0x10000000000, 0xf2, 0x35, "706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}}, {{0x3, 0x1, 0x5, 0x7, 0x2, 0x3, {0x1, 0x3, 0x3ff, 0xfffffffffffffa6d, 0x7, 0x9, 0x1, 0x4, 0x0, 0x3, 0x3, r7, r8, 0xa0ba, 0x1}}, {0x0, 0x0, 0xf2, 0x6, "706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}}]}, 0x478) 12:34:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0xe00, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:13 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x68020000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000100)={0x7, 0x5, 0x9, 0x8, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={r1}, &(0x7f00000001c0)=0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x402042) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0x74b4, 0x103f00) 12:34:13 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00@\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:13 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7a00, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0xffffffffa0008000, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:13 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x100000000000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ftruncate(r0, 0x1) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000000)={{0x0, 0x2, 0x3, 0x3, 0x7}, 0x25c, 0x7f}) 12:34:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 12:34:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x21) 12:34:13 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffffffff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:13 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4c, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 12:34:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x240200, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000280)={&(0x7f0000000040), 0x10, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0600000000010000c0ffffff0000000072213033", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=r2/1000+10000, @ANYBLOB="0000002001000000020000c0040200006d734f4993f05f23"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r3 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x10000, 0x800, 0xf4a9, 0xffffffffffff0001, 0x2}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)={r4, 0x45, "f435204ca8f721d610c88545e6c2b3c72958f148e59b09bc41a4a0d9704050a55752d468c0395b7bdd14217eac2bddd270e48c917e07ec2f7e6f4e40831a4429f8a5ab35e2"}, &(0x7f00000003c0)=0x4d) pread64(r3, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) open_by_handle_at(r3, &(0x7f0000000400)={0x12, 0x8, "8dee47edfa4f538025f1"}, 0x200) 12:34:13 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x68, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:13 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x4e20, @rand_addr=0x8}, @in6={0xa, 0x4e22, 0x8, @mcast2, 0x3c}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e24, @multicast2}], 0x4c) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={0x0, 0xfffffffffffffffb}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000180)={r3, 0xf296}, 0x8) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x3f00000000000000, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x3, 0x4d031, 0xffffffffffffffff, 0x0) accept$nfc_llcp(r0, &(0x7f0000000000), &(0x7f0000000080)=0x60) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 12:34:13 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x9effffff, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000001540)=0x0) r3 = geteuid() getresgid(&(0x7f0000001580), &(0x7f0000001880)=0x0, &(0x7f0000001600)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000001640)=0x0) fstat(r0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000015c0)={0x0, 0x0, 0x0}, &(0x7f0000001740)=0xfffffffffffffd05) sendmsg$unix(r1, &(0x7f0000001840)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000080)="4b26b80ea653f192dd4e3d46cfed15b693aeefbe2e53c2d7135953db8d59b4b971a1a8e7b8e084bc436afa81b58bf3da827a56741c9b02bc74f51309b76289d28d35627bf2561ed5778c557199936d11e5463ecc971fbbf966d024e519759c07480810c12c9ea57324fee6fce61a87dceedd0bc32c631df93fe2fb6a5c3631df630bc82b4e26af802b90c540bec7614f26b49fce356e064c8bb7b164441045412b259496ad0bf825c59f", 0xaa}, {&(0x7f0000000140)="af47d9cb808970a24a44", 0xa}, {&(0x7f0000000180)="96547f850c25bc169e9f4404bc6adbf82729b11b55c080989c516ec7ad48ed0ec32ceb6b8e43d5401ce572163d725651d33007ff9c621bbf2a386fc7208c102417fc0336007618bad83259b2d0da21050ea988e6760d1e46ca8954419917ac704141d72bb4bd5cfac574e0c52d0f32", 0x6f}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="6a655a42b4a2771473968f8455ed3ced11969c79ba09ef2a30b1659de7982f6b783818b9b1cd94c35eb12ab492328617e84badcf9216cd8ca4e92219c1542ed4e87a6c18debc245c5070a3cc94c16c7db41adb80fc816d515fb24789fc7ee140c88386dc8ca9bab75fa8a2c438c08ed88391811da56ad7cdb2092ae3f392d016aee597e74a7aaf2e8f98866d10839cbfe7e059b131ed3aa2ff4719cb2f29dcbf7ccbc712ce39d4fe5f4689f7993d2aaeecdee7ca5a518f3a081834b5a77391d68261a54edbc7e07478456959e7286c13d17b5128b3fe056ff8576614b184d4c881e5bbd13296926d55628359400782c63dc9bd2775", 0xf5}, {&(0x7f0000001480)="2f6b2ee38efda4e3b1577fa70a2af2bc11ba8186bed9aef9587409b98548fa9190a17b558ebc84a5e22b1daebcbf2858ad3919ea09b6e5e026a55da57356afd68cb0c83979ea9756e83c11b6f529bf55c3827da231cdbb8be2f63f0508f597e9ba81b628c18aa2a3f9bace9e9e8c9451f9b03672274bf87d428626d38fd8bf140e4cbfa3c923c48f5bb1d6f40f2d574b2845441ab72cfb2612d68c9ea2ea148a871c7001dc19554d", 0xa8}], 0x6, &(0x7f0000001780)=[@rights={0x18, 0x1, 0x1, [r1, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x30, 0x1, 0x1, [r1, r1, r0, r1, r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0x88, 0x8041}, 0x20040001) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:14 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, r1, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:14 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00000000ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6c000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x4000000000000000, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/snmp\x00') ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000040)={{0x3, 0x2, 0x40, 0x38400000, 0x7fffffff, 0x7}, 0xff, 0x401, 0xff8, 0x3, 0x514, "77b339953389a88eb6c5035e4d1e0b57b671b65a3fd7a1239b1dc6390151d54f3bacda0881680bdcbafb344a5f066ee601e4a07eef6b5bc64664fb2ae805c248960968e83ed9de4fbe3af97e59de40bd97b09550571f82450f77a24e13c0df64c2b0e0b32487dc2515eb5fb4ea9ad614bc1303478248f308b2b5cbebbb7612fe"}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000380)=@v3={0x3000000, [{0xdb, 0x6}, {0x2}], r1}, 0x18, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f00000000c0)=""/8, 0x8, 0x103efe) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac14140a000018002a02611204000000e0a043b4a0759c49fc06c2d77bb7e6c7b341736dc87b000000e0000001"], 0x20) 12:34:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4800, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:14 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x3, 0x1) ioctl(r0, 0x2, &(0x7f0000000100)="1d39c1bdb4557df5207c32ea8c3def658a5e") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x1ff}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000300)={r2, 0x8, 0x3, [0xfab0, 0x6, 0x1]}, &(0x7f0000000340)=0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0x18}, 0xff}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x13}}, @in6={0xa, 0x4e23, 0x3, @ipv4={[], [], @remote}, 0x9}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e22, 0x7f, @mcast2, 0x6}, @in={0x2, 0x4e21, @loopback}], 0xb4) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:14 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00`\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x80) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x94, r1, 0x0, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3ff}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x741}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x39}]}]}, 0x94}}, 0x4044081) r2 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) getpeername$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10) 12:34:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7a, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x40000000, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffff0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000a82000/0x2000)=nil, 0x2000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000), 0x4) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:14 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00z\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x6802000000000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0x4000}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:14 executing program 0: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000000)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@multicast2, @empty, 0x0}, &(0x7f0000000380)=0xc) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={r2, @multicast1, @rand_addr=0x5}, 0xc) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x0, 0xab20, 0x6, 0x80000001, 0x0, 0x8, 0x10000, 0x4, 0x2000000000, 0xfffffffffffffffa, 0x4, 0x5, 0x9, 0xb5, 0x6, 0x6, 0x4, 0x8, 0x100, 0x38, 0xb102, 0x6345590e, 0x0, 0x9, 0x1, 0x100, 0x7, 0x3, 0x600000000000, 0x10001, 0x9, 0x7, 0x8, 0xe06, 0x2, 0x42, 0x0, 0xc3b, 0x5, @perf_bp={&(0x7f0000000100)}, 0x2100, 0x1, 0x8, 0x7, 0x3, 0x1, 0xfffffffffffffe78}, r0, 0x10, r1, 0x8) 12:34:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x400000000000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:14 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000600", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") flock(r0, 0x10000000006) mmap(&(0x7f000087b000/0x1000)=nil, 0x1000, 0xa, 0x100110, r0, 0xfffffffffffffffd) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', "706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}, &(0x7f0000000240)='#\x00', 0x2, 0x3) 12:34:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f00003d6000/0x2000)=nil, 0x2000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x400, 0x1) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:15 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf0ffffff, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x90}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r1, 0xc, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x62}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8000) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) setsockopt$inet6_int(r0, 0x29, 0x13, &(0x7f0000000000)=0xa7a, 0x4) 12:34:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0xffffffff00000000}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x9, 0x100) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x9) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2, 0x0) write$tun(r1, &(0x7f0000000040)={@val={0x0, 0x1e}, @void, @ipx={0xffff, 0xf0, 0xffffffffffff0001, 0x0, {@random=0xfffffffffffffff9, @current, 0xd29}, {@current, @broadcast, 0x100000000}, "52775c8279c8c389364f583b221ba265c6e9c38a983f7d68cf8ee41f7f19b3ea5b17d20ece8906ac2aea8085024b61f77c69e70800518137c05e8e23ee0fbcc2033428c21804bc2db0ca3fee34d3433bb9e559b17e43ecae5774237f68f9ad90bbd1d15c349b7a5341b764d213cbb635ea31cb4131f5081d1d2f578ca0e7055d54150b01076f2f53e0e46db72d4b4e2ce00b215aa2728a09b310bf4d92fc409b911e062c295fee806e1c437c649eb8916370eabee62b07db399ece27682bf01835a7b4bf5b0f4d772bc5b9e0f1ce64bce9c6"}}, 0xf4) r2 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e409cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) eventfd2(0x3ff, 0x80800) pread64(r2, &(0x7f0000000180)=""/8, 0x8, 0x1000000000103f00) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f00000001c0)={'ip_vti0\x00', {0x2, 0x4e1f, @local}}) 12:34:15 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffff600", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:15 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x4c00, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000040)={0x1bacf914c1bafea, &(0x7f00000004c0)=[{}, {}, {}, {}]}) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f0000000240)) [ 354.516500] kauditd_printk_skb: 8 callbacks suppressed [ 354.516514] audit: type=1800 audit(1539434055.190:175): pid=11129 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16535 res=0 [ 354.556626] EXT4-fs: 8 callbacks suppressed 12:34:15 executing program 0: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000007c0)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f00000008c0)=0xe8) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000900)={r1, 0x1, 0x6}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e67be509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 354.556638] EXT4-fs (sda1): Cannot specify journal on remount 12:34:15 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0xe00000000000000}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:15 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0600", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:15 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'ip_vti0\x00', 0x4}, 0x18) pread64(r0, &(0x7f0000e3e000)=""/8, 0x8, 0x57) 12:34:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:15 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffff7f, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x923}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x7, 0x2, 0x670}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r1, 0x401}, 0x8) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:15 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 354.813119] audit: type=1800 audit(1539434055.490:176): pid=11160 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 [ 354.845684] EXT4-fs (sda1): Cannot specify journal on remount 12:34:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x8, 0x103f00) 12:34:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:15 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffffffff000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0x3f00000000000000}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:15 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='H\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:15 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7400000000000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:15 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000100)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") recvfrom$unix(r1, &(0x7f0000000000)=""/106, 0x6a, 0x20, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 355.082269] audit: type=1800 audit(1539434055.760:177): pid=11184 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16535 res=0 12:34:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000000c0)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fc11850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) r2 = semget(0x1, 0x4, 0x80) semctl$IPC_INFO(r2, 0x0, 0x3, &(0x7f0000000000)=""/137) [ 355.133153] EXT4-fs (sda1): Cannot specify journal on remount 12:34:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:15 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x7a000000, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:15 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0x4000000000000000}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 12:34:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x101000, 0x4) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040), 0x4) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 355.321464] validate_nla: 26 callbacks suppressed [ 355.321475] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 355.382901] audit: type=1800 audit(1539434056.060:178): pid=11214 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16525 res=0 12:34:16 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f0000000240)) [ 355.434579] EXT4-fs (sda1): Cannot specify journal on remount 12:34:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0x1000000}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r0 = gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000340)=0xc) r1 = getpgid(r0) r2 = syz_open_procfs(r1, &(0x7f0000000380)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r2) [ 355.501241] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) write$P9_RCLUNK(r0, &(0x7f0000000000)={0x7, 0x79, 0x1}, 0x7) 12:34:16 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00-\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:16 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) sync_file_range(r0, 0x3, 0x20, 0x6) 12:34:16 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f0000000240)) [ 355.691673] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 355.712957] audit: type=1800 audit(1539434056.390:179): pid=11245 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16519 res=0 12:34:16 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0x8000a0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 355.760408] EXT4-fs (sda1): Cannot specify journal on remount 12:34:16 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00h\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 355.823794] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x9, 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000200)={0x2b, 0x4, 0x0, {0x1, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000240), &(0x7f00000004c0)=0x4) uselib(&(0x7f0000000500)='./file1\x00') pread64(r0, &(0x7f0000000040)=""/1, 0x1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f00000000c0)={0x0, 0x1, 0xffffffff, 0x4, 0x4be, 0x1}) unshare(0x200) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000380)={{0xa, 0x6, 0x7f, 0x1, '\x00', 0x9}, 0x5, 0x8, 0x1000, r3, 0x6, 0x7, 'syz1\x00', &(0x7f0000000180)=['/dev/ashmem\x00', '*#\x00', '\x00', 'y%\x00', 'md5sumselinux\x00', 'keyring\x00'], 0x29, [], [0x7, 0xffffffff, 0x100000000, 0xffff]}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x2280, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r4, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 12:34:16 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0x8000a0ffffffff}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 355.958535] audit: type=1800 audit(1539434056.630:180): pid=11272 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16535 res=0 [ 355.982458] EXT4-fs (sda1): Cannot specify journal on remount 12:34:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x30) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:16 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00z\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 356.033417] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)=0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x282002) r2 = syz_open_procfs(r0, &(0x7f0000000240)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0xc5, "73f5cfb53f7911529fb8d263ee24da1c4b9c27fa21575f91c8388431e7b411574f969fbdcaeb8f68c56293337c8563e0e60fc164b8ff47c4861e5fa55d80f2c23e86e689c1b4a699317af5e218fe88223b7c6ed5a66a03cbe83bd697b3ce3f5a0f37ecc21dcae1a2d967ed60b40458db3258ea6005a109539485a7843fe68f1f5e3820821d3fe626f33199d169beeb2905bcbb2ffe64b630bcd9e6093d588087dba0e5b5aa893470dd7a20fd04091455c99cdf4909451763f36778710ce5e9489364380aad"}, &(0x7f0000000040)=0xcd) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{}]}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000080)={r3, 0x2}, &(0x7f00000000c0)=0x8) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:16 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x10002) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000040)={0xf, 0x1, 0x3ff}) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 356.200577] audit: type=1800 audit(1539434056.880:181): pid=11294 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16535 res=0 [ 356.224988] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0x100000000000000}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x40, 0x84440) 12:34:16 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) [ 356.284605] EXT4-fs (sda1): Cannot specify journal on remount 12:34:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x6) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:17 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fcfdffff00", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 356.375909] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:17 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:17 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = semget(0x1, 0x2, 0x100) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) sched_setaffinity(r2, 0x8, &(0x7f00000002c0)=0xaef2) semctl$IPC_RMID(r1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)="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") unshare(0x29f197c3cdee160) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE(r3, 0x1260, &(0x7f0000000000)) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000040)) pread64(r3, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0x15, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6d56}, [@jmp={0x5, 0x5, 0x9, 0xf, 0x5, 0xc, 0x4}, @call={0x85, 0x0, 0x0, 0x4a}, @map={0x18, 0x0, 0x1, 0x0, r3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, @map={0x18, 0x8, 0x1, 0x0, r3}, @exit, @generic={0x1f, 0x8001, 0x8, 0x5}, @generic={0x2, 0x9, 0x8, 0xfffffffffffff000}, @jmp={0x5, 0x5, 0x6, 0x0, 0xf, 0x100, 0x10}]}, &(0x7f0000000300)='GPL\x00', 0x6, 0x2, &(0x7f0000000340)=""/2, 0x40f00, 0x1, [], r4, 0x5}, 0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000080)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x14) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000200)=r3, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000100)={r5, @in={{0x2, 0x4e23, @loopback}}, 0x0, 0x8}, &(0x7f00000001c0)=0x90) 12:34:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0xffffffff80000000, 0x6, 0xfffffffffffffffa, 0x1, r1, 0x3}, 0x2c) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), 0x4) 12:34:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0xe000000}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 356.529232] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:17 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 356.748661] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 356.765747] audit: type=1800 audit(1539434057.440:182): pid=11331 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16538 res=0 12:34:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) [ 356.804248] EXT4-fs (sda1): Cannot specify journal on remount 12:34:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x4) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:17 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:17 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00000000ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x1053}) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 356.940750] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0x3f000000}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 12:34:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:apt_lock_t:s0\x00', 0x20) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:17 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x83e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xfffffffffffffffe, 0x4d031, r0, 0x4) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000000)=0xffffffffffff0001) [ 357.040974] audit: type=1800 audit(1539434057.720:183): pid=11351 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16519 res=0 [ 357.066696] EXT4-fs (sda1): Cannot specify journal on remount 12:34:17 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:17 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 12:34:17 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000080)={0x57, 0x4, 0xa1, {0x0, 0x5}, {0x5, 0x139}, @period={0x5d, 0xffffffffffffffff, 0x2, 0x9, 0x51ae, {0x7f, 0x3f5b, 0x6, 0x30b0}, 0x2, &(0x7f0000000040)=[0x3, 0x8000]}}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") socket$l2tp(0x18, 0x1, 0x1) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:17 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x80, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000380)='\x00', 0xffffffffffffffff}, 0x30) r2 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000a00)=0xe8) r4 = syz_open_dev$sndpcmp(&(0x7f0000000a40)='/dev/snd/pcmC#D#p\x00', 0x3000000000000, 0x20000) r5 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001040)='cgroup.type\x00', 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000001080)={0x0, 0x0, 0xffffffffffffffff}) r7 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r8 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000010c0)='/proc/self/net/pfkey\x00', 0x84000, 0x0) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000001100)='/dev/full\x00', 0x618100, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) r12 = openat$full(0xffffffffffffff9c, &(0x7f0000001180)='/dev/full\x00', 0x401, 0x0) r13 = socket$inet6(0xa, 0x1, 0x10001) r14 = openat$uhid(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/uhid\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001200)={0xffffffffffffffff}) r16 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001240)=0x0) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001340)=0x0) lstat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r23 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001500)='/dev/vsock\x00', 0x40041, 0x0) r24 = socket$bt_bnep(0x1f, 0x3, 0x4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001c00)={0xffffffffffffffff, 0xffffffffffffffff}) r26 = socket$xdp(0x2c, 0x3, 0x0) r27 = syz_open_dev$mice(&(0x7f0000001c40)='/dev/input/mice\x00', 0x0, 0x208002) r28 = socket$xdp(0x2c, 0x3, 0x0) r29 = syz_open_dev$sndctrl(&(0x7f0000001c80)='/dev/snd/controlC#\x00', 0x20, 0x400) r30 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}) r32 = epoll_create1(0x80000) sendmsg$netlink(r0, &(0x7f0000001e40)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000400)={0x4f0, 0x34, 0x0, 0x70bd2b, 0x25dfdbfb, "", [@nested={0x330, 0x28, [@typed={0xf8, 0x43, @str="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}, @typed={0x8, 0x0, @u32=0x7}, @generic="8368057f1304dbddeb002e98e0dd4398110f5dbdde9d9479ee3f152fca6abc0bac61415f5ee6ec10d067f7e79e345f5d4a176bc01e82afc82e6f8693a066ffb2f478d32a5af327e8e060c7f110aa356f20fca1cc7c93830d35fb19eba76201a09aa4235d21a3ae44b711c3cf26059ef6636dada4a32727042e6beefe9d8f315ebe9e21b04408f59ec1", @generic="36d5f21bfc9fc65e4a2fcea1d6ba9dfbb0b16f051d18da9f3db27636eb087d25ffe9e927d6ae47de06c98e932cdf8d133a5a95c4a9388418298c8cbd4e56f0895a51eced7585c9edfadf", @generic="941b36db3a9e57f2a135be4802f66a55891f6be29780905e6cb654492b4d888e385bb61c09d5e5c8041b5023a7e974d72cbb3998c40ab7c46d2fa3b37211fc571abce9a7d633735726610b1191df14c5a886086e9d27aee840bed9e00e11bd6b341f77a4789b80c8fb35d1f257e258ffd0685a892c25b3f6f2c5311e278cb19e6b056a681c122824024bd3b70430073c34380c47d9952b184d7fb5cae959e0415e265a9321007fab58fec024d90d34279eb424a7e782172585aca0751feda86e8ec33252230d850b3ec8f521a7ac7a92fa1883f0364919420a18f4484db20b7e1a8a17fe8bfa2df9a6ed490b39", @typed={0x4, 0x3d}, @typed={0x8, 0x34, @pid=r1}, @generic="6baf46669d994e8e5580eddfd97170633b4e9a9b059b76a9a0bcf4ceb724b077cc29c3d3a0e8b45874391945a3f02df46c114cd53f4d41e785f4e8af6eba8873b84a48aa1b61c0a53f42439de1d33378150d9090ab3775c7f3c4a1fe0e"]}, @nested={0x24, 0x4b, [@generic="4be08ba1b5c645a1b4f7b6a81cfb72d935f90578b2cd04e547abb4243782bf"]}, @nested={0x150, 0x78, [@typed={0xf8, 0x72, @str="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}, @typed={0xc, 0x7e, @u64=0x65}, @generic="558aa7997690f9af07939c07ce08367fd4dd88932d82ad0a4489a5b5e176ace6bfe5f2d7e4bd65673a97f791691c41eab0", @typed={0x14, 0x19, @ipv6=@ipv4={[], [], @multicast1}}]}, @generic="397da5ae3a93e74680e5bc371731e22147c8bc727f293566dd636aeb6db7e80edab4647f78398b40ccb6d8e85697704c257571494d797d722e4f"]}, 0x4f0}, {&(0x7f0000000a80)={0x55c, 0x2e, 0x400, 0x70bd27, 0x25dfdbfd, "", [@typed={0x8, 0x52, @ipv4}, @typed={0x8, 0x17, @u32=0x5}, @generic="effc628bbff3404d2f376a30ac29ce0d49ba0583b0c7345562ce70ffde66bfaf7a164b9f264b46f55d926eb6acbb7a1f0c4a998dd1bb506042c6cd5ad2a09eb2cd824c328eecae74655f67b0e93c29724746cce80c74252ca00c0d08bb81b05a9068562ace2e1f4da6390da0e7f0efb0b82fcd80c149b9acf115afb82d987a1eef323d1b3224f0d7d3c7429b7dd21d1c2db699676e6a7e6665cfc61d5519", @nested={0x2b4, 0x77, [@generic="84062fcdd3fb3b754add1257f56403f1a81f57f4f76f986c81d8f3d735f2736d96fb46526f17379684b674d45ad042ef400ab871074faf638c24e02dbe4e48e0ce34062cb78c463f49fe", @typed={0x8, 0x6b, @pid=r2}, @generic="899415860b96637a64ab31a48a730c2b7ce70e0454e8e1fdd6eca2ae316f5df8eae079f853fb656cf0b294eec75832241b34f664171be16ff604253b6d0b3fcc14feed4115fa466fdf312e5d04f81326538eac83dfee87aa11bddf5c79d2ec33ecffc7e16652aebcb33759768cdb2f5fc83397ff73", @generic="93a513e83aeff7f10dc6d8f34379b22f317dbcab49df1bb8e81e1a1f0c0d06296f5168b344d0b5aa420bba0b13011ba8fcb332e19cda636da40f02318ac9cf270d995c4f81057ffef092f4cea24ac3d69af63cb15dd6d203796a5cf476dc238a327da3ed1662c807b6f4a5e7537e74297a875e2041e297aa0d099c65d5802a0216fdc39e36b67ca62661c5baa04a64f536c9593eb70e252042406cfedda307b09fd91c7bf104f07e5acc09bc488dd3b35fc459aed3334d42f9e247158ccd82abc5ee74eff60295f9c27d0a39ee077f8fc79840718c8d14e602c1971442551057057e212ac090b8", @typed={0x8, 0x42, @uid=r3}, @typed={0xf8, 0x11, @str="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}]}, @typed={0xf8, 0x16, @str="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}, @typed={0x8, 0x64, @fd=r4}, @typed={0x14, 0x32, @ipv6=@remote}, @generic="181bbd9d5857439b38c7a8918df1b53c3f2ab1bf16bd518c1d01c7c9b89d830a7d5a775c50b8e66eef7909f6f4513d2436125af6a84eaa5a867dd133861d5974ad70d48de5cb2b887c1cea9edf365de6601f043031e3d1bedaab0059b97e5729be91f2844d2ac0c8d62490fe131a755f714b3902f6f24934b28788a6f32f26d9fe37cede6bd1cba85d37bf712227a0965d6d9cb7b1f1a50136364b935491b09db5d563948485d7150b6c029d7b1847a3aba6d074023622ab9eccbc34ee74a413ccce0e719d1bcc", @typed={0xc, 0x26, @u64=0x9}]}, 0x55c}], 0x2, &(0x7f0000001d00)=[@rights={0x28, 0x1, 0x1, [r5, r6, r7, r8, r9]}, @rights={0x28, 0x1, 0x1, [r10, r11, r12, r13, r14]}, @rights={0x18, 0x1, 0x1, [r15, r16]}, @cred={0x20, 0x1, 0x2, r17, r18, r19}, @cred={0x20, 0x1, 0x2, r20, r21, r22}, @rights={0x30, 0x1, 0x1, [r23, r24, r25, r26, r27, r28, r29]}, @rights={0x18, 0x1, 0x1, [r30]}, @rights={0x18, 0x1, 0x1, [r31]}, @rights={0x18, 0x1, 0x1, [r32]}], 0x120, 0x20004000}, 0x20000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_netdev_private(r33, 0x0, &(0x7f0000000180)="1e6631395fa837a2f9d4f68bbfb344fe4d5df3cc998ab68ba5a2770b67f2b5e24e31ea889c832efe3df25b31332a77b3db926cc8b531fca61496c3fbfae1b5f590127f35e60d236f4836a84af3e5c7c60d7fc5dbe5b2cfccb7e108ed3793f041282fc35d7dacf1245de6f48698a93decff19a90f0094472f8299d88b1143d2cf3e022c3238187682b51df3e48c7a55396aba721c6e9e0898565ccb536fe6cb55666e21c6b41863cfa44134d30cc846a7ac") r34 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000000)=0x0) clock_gettime(0x1, &(0x7f0000000080)={0x0, 0x0}) io_pgetevents(r35, 0x0, 0x2, &(0x7f0000000040)=[{}, {}], &(0x7f00000000c0)={r36, r37+30000000}, 0x0) pread64(r34, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r34, 0x84, 0x8, &(0x7f0000000100)=0x800, 0x4) 12:34:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0x40000000}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 357.307104] audit: type=1800 audit(1539434057.980:184): pid=11378 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16533 res=0 12:34:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) [ 357.351316] EXT4-fs (sda1): Cannot specify journal on remount 12:34:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = dup3(r0, r0, 0x80000) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000000)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:18 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x101, 0x2}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r1, 0x1}, &(0x7f00000000c0)=0x8) 12:34:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0xe00}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 12:34:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x5c0, 0x0) 12:34:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:18 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00000000ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x7, 0x7, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0x3f00}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d03f, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x4000) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000240)={0x113, 0x3, 0x0, {0x6, 0xf2, 0x0, "706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}}, 0x113) 12:34:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:18 executing program 1: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) 12:34:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 12:34:18 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00000000ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) fchown(r0, r1, r2) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0xffffffffa0008000}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/96, 0x60) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:18 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001800", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:18 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000040)=""/52, &(0x7f0000000080)=0x34) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000979000/0x2000)=nil, 0x2000, 0x0, 0x4d031, 0xffffffffffffffff, 0x2000000000) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:19 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000900)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) read$FUSE(r0, &(0x7f0000000b80), 0x1000) 12:34:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0xe}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) msgget(0x1, 0x40) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) openat$ion(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ion\x00', 0x4000000000080001, 0x0) 12:34:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/68, &(0x7f0000000080)=0x44) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:19 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:19 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="8cffffff00", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:19 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:19 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x8}, {0x8000, 0x8}]}, 0x14, 0x3) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x2, @mcast2, 0x2}, 0x1c) 12:34:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000000)={0x0, 0x0, @ioapic}) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0, 0xa0008000}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:19 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:19 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:19 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:19 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6552, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x2004d031, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x145080, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000100)) fstat(r0, &(0x7f0000000040)) pread64(0xffffffffffffffff, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x93, 0x2000) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:19 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:19 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00t\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x20000210) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x20000000000000, 0x0, 0x1, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/8, 0x8, 0x103f01) 12:34:20 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x8, 0x55) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000000)=0xfffffffffffff800) 12:34:20 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:20 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00 \x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") getsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000080)={0x74, &(0x7f0000000000)="ccb7a0b9f1130d56e794e7df71d9f25565bca53a3b856b3772976e0b02646902d37b8a22fa145f4a09c97ae7e0a16bab97baa9746ca9d82355972f6352daccb82cf43ba538789dd94fc1f9c33b7eb8d8c12983415413d481a03e2074dee4dc6c4dd32421b1727ee5b56bdc7aea6572d0146275a5"}) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0xf) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:20 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:20 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x200100, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 359.562520] kauditd_printk_skb: 7 callbacks suppressed [ 359.562534] audit: type=1800 audit(1539434060.240:192): pid=11544 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16527 res=0 12:34:20 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) [ 359.607766] EXT4-fs: 7 callbacks suppressed [ 359.607777] EXT4-fs (sda1): Cannot specify journal on remount 12:34:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) gettid() pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:20 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:20 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004e40)=[{{&(0x7f0000001980)=@rc, 0x80, &(0x7f0000003c00)=[{&(0x7f0000001a00)=""/129, 0x81}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000002ac0)=""/38, 0x26}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/20, 0x14}, {&(0x7f0000003b40)=""/166, 0xa6}], 0x6, &(0x7f0000003c80)=""/155, 0x9b, 0xff}, 0x5}, {{&(0x7f0000003d40)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000003dc0)=""/120, 0x78}, {&(0x7f0000003e40)=""/56, 0x38}, {&(0x7f0000003e80)=""/48, 0x30}, {&(0x7f0000003ec0)=""/45, 0x2d}, {&(0x7f0000003f00)=""/77, 0x4d}], 0x5, &(0x7f0000004000)=""/222, 0xde, 0x5}, 0x100000000}, {{&(0x7f0000004100)=@un=@abs, 0x80, &(0x7f0000004500)=[{&(0x7f0000004180)=""/233, 0xe9}, {&(0x7f0000004280)=""/48, 0x30}, {&(0x7f00000042c0)=""/165, 0xa5}, {&(0x7f0000004380)=""/188, 0xbc}, {&(0x7f0000004440)=""/144, 0x90}], 0x5, &(0x7f0000004580)=""/205, 0xcd, 0x5}, 0x3}, {{&(0x7f0000004680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000004d00)=[{&(0x7f0000004700)=""/243, 0xf3}, {&(0x7f0000004800)=""/227, 0xe3}, {&(0x7f0000004900)=""/88, 0x58}, {&(0x7f0000004980)=""/18, 0x12}, {&(0x7f00000049c0)=""/16, 0x10}, {&(0x7f0000004a00)=""/175, 0xaf}, {&(0x7f0000004ac0)=""/94, 0x5e}, {&(0x7f0000004b40)=""/249, 0xf9}, {&(0x7f0000004c40)=""/170, 0xaa}], 0x9, &(0x7f0000004dc0)=""/80, 0x50, 0x3}, 0x4000400}], 0x4, 0x40000000, &(0x7f0000004f40)={0x0, 0x989680}) ppoll(&(0x7f0000001700)=[{r2}, {r1, 0x1020}, {r2, 0x6000}], 0x3, &(0x7f0000001780), &(0x7f00000017c0)={0x3}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000004f80)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x8, 0xfffffffffffffffb, 0x2, 0x2}, &(0x7f0000005040)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000005080)={r3, @in={{0x2, 0x4e21, @broadcast}}}, 0x84) write$FUSE_GETXATTR(r1, &(0x7f0000001740)={0x18, 0xfffffffffffffff5, 0x7, {0x4a}}, 0x18) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r4 = socket$vsock_stream(0x28, 0x1, 0x0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf52f, 0x9, &(0x7f0000001600)=[{&(0x7f0000000100)="731bf26e27b25b09c77deb15be7d347d4c2930c779c2e72b486c4401adfe2fc294fe8e3d09ee362d7a9c96f813916f9a2eab954f05e12ec71ab777b646dfacf8a42919bfcf9ae0218fe860a185b02c37f00cdd51b477d0e8fb2c364dee5dfbf04a6e361f43e27781952802", 0x6b, 0x80000000}, {&(0x7f0000000240)="2d8372fda8c65744d6cf3f92bffc7166053c5434b7c798ab47ccf924e2798bee37d6465c05c37afbb9da75d8ec03a0540cc6e050d3a0fac3a03e6cb58916b9ea54576030ed54f106ed587aa6f8d8d2ff95a43b7df80d6affb73994bb564ec0d25796ee12151dcca5405049619b81386938e6ed0239f75e64f6106199bd5bca3334e2208f6edab62aa5adb22ddbf5ae2338271c0c159323dffa2cad96fce3d3b059facee257a59a904ecc688cd690f54b07e061c9cb3a53a93fe4acba2f78f8b7db6a3f017b6bd98a15f46582492a06f2f9a829fedcf3a23d196ad42ce8f8c53d06f7", 0xe2, 0x4}, {&(0x7f0000000340)="c9bb7f3b331f3f32367bc755f7425d35a23ae8835e9d11c5599cac1cd2546330a3660618084daa5646626b89a75a083f4f1806ca626ca1dc8d69ee22047442e9258275e575381f392a61e847aa0df0e5bbfcb4c1fbc7d0dce36b6912908c3753e4e98e8236a217758dc8b5bd14e8a01833fa920cf7cc5e69789434d6ce337da46f4ab9f00564ad3090b5e7fd34c8c52781a119738eee6df04b2089497cc93605786caa9c8ada9059ffd027097160aef04e07e61a6616e6392bb0c4b0e1c702a0d968fbe962351dc371190fe299d8f4896b6b5d629ca925006ba7a838bdef9ae33e95ce762dc51e17a4c6f4c225657bc7b0fdb1fef9", 0xf5, 0x1ff}, {&(0x7f0000000180)="04d463d64747da67edef6201bfeb1ee3e067294707a96cfa98021961c33399f9ef5b6565cee6119ca6fffc871748b3cb68f49f3e", 0x34, 0xfffffffffffffffb}, {&(0x7f0000000440)="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", 0x1000, 0x400}, {&(0x7f0000001440)="55fdc9c47784b574ebc90d3b4eeeceb08095f8e258ab1e46a646f49eebc894c96346276a8cac68bb792183390e5ee59e8989cf64b1cdd1f84227324a133dddaf3d757723751cb1d9188014155d5cc892744c2c6632da8df00444f3a9fb02347dded349be08d87831ddc140fca71bca014e1808abb47691737933032e", 0x7c, 0xeb}, {&(0x7f00000014c0)="ff9f5bf8fde73edd6eb77cc2251388b425462d1c251b9c284cba13eaade56430a5906e1ec5ca53473487f11123241b26cc686b252ae5594879a2f9d493cde2d3498107e4490f7d677243ee4dcbfff24a4726", 0x52, 0x3}, {&(0x7f0000001540)="6bd8aa68374c54e9e0c91a733be5137b58890df587e7b04baa28959c3e42878159116a7e1be75a76d8658e1bad0111cd57036a52ce88a625f36173e5aa3af4f66c58d68f3c9f267958cacef555eb48ab4a8fc1ae36e62083a069a1a25cc1d67ee46e68a6ac41cbbbbf8dc47791b4fca55a410afbf04facbd18576f8502fa1620ffae7e0360006f668b89840bfd46dc2cd1fdc687485112eda1f730", 0x9b, 0x6}, {&(0x7f00000001c0)="403bc6be00eb19de5989cc4cbd30276a8e3d6ed4bfb21b90a14d1cb0b783e146c9049bee9567e7c2f4", 0x29, 0x79b}], 0x200000, &(0x7f0000001800)=ANY=[@ANYBLOB="6e6f67727069642c7571756f74612c6e6f6c617a7974696d652c6673636f6e746578743d757365725f752c00a72e2543a6c45bc2d57ec868fc48db3e212e483e8a092fccf343d2833c1e63bee59035ca4aa0f7215c5a91d556bf7de85a2b1b7c5ba54a2bd87c371231a6affbb2c2bde6f504c35df16ed498988e9a46f3ebcc27e5e377d9fd069a6da0b811a9047c3f43665290be482612f15d0faa50cc4687c94440f4e722b03fd3bf67d3613204207cc151e9e4d07f4477e6b8ac8dac31d078a9e90f70f53543eef1d5fe7aa91a18b3e2b7bebf734fb20fa0788bd2e45c068bd4e08a9ae064e00560e4f1708c3410b662"]) connect$vsock_dgram(r4, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}}, 0x7ab1, 0x8}, &(0x7f00000002c0)=0x90) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000300)={r1, 0x3, 0x3, [0x1, 0x8, 0x8]}, 0xe) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000100)={0x0, 0x7, 0x30, 0x2, 0x8}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r2, 0x1, 0x20}, &(0x7f00000001c0)=0xc) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x6) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000340)=0x11, 0x4) 12:34:20 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0x7, @local, 0x20}}, 0xc03, 0x1, 0x8, 0x2, 0x9}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r1, 0x9}, &(0x7f0000000300)=0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:20 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 359.883370] audit: type=1800 audit(1539434060.560:193): pid=11573 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16528 res=0 12:34:20 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) [ 359.926616] EXT4-fs (sda1): Cannot specify journal on remount 12:34:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:20 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:20 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x208402, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:20 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) fcntl$setflags(r0, 0x2, 0x1) write$P9_RFLUSH(r1, &(0x7f0000000000)={0x7, 0x6d, 0x1}, 0x7) pread64(r1, &(0x7f0000e3e000)=""/8, 0x8, 0x103f00) [ 360.128135] XFS (loop5): unknown mount option [nolazytime]. [ 360.196109] audit: type=1800 audit(1539434060.870:194): pid=11594 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16526 res=0 [ 360.251269] EXT4-fs (sda1): Cannot specify journal on remount [ 360.615409] XFS (loop5): unknown mount option [nolazytime]. 12:34:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\'md5sumwlan1/nodevsystem\x00', 0x1716761a449b7a9e) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x102, 0x1009}}, 0xfffffefb) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000240), r1, 0x3}}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x1, @mcast2, 0x7}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7, @loopback, 0x9}], 0x48) 12:34:21 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:21 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:21 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\fz\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:21 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f00000000c0)) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x480a00) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x100) ioctl$RTC_EPOCH_SET(r4, 0x4008700e, 0x7) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r5 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x6}]}, 0x30}}, 0x0) connect$vsock_dgram(r5, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x33) 12:34:21 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x80, 0x1ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x80000) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000040)={0x100, 0x3}) gettid() fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f00000003c0)='attr/fscreate\x00') mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) socket$inet(0x2, 0x2, 0x100) [ 360.717046] audit: type=1800 audit(1539434061.390:195): pid=11615 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16535 res=0 [ 360.728970] validate_nla: 23 callbacks suppressed [ 360.728981] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 360.760696] EXT4-fs (sda1): Cannot specify journal on remount 12:34:21 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:21 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x240000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/anycast6\x00') ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000240)=ANY=[@ANYBLOB="0500000000040000000008"]) r2 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000100)) pread64(r2, &(0x7f0000000180)=""/8, 0x2, 0x103f02) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f00000000c0)) setsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000000200)=0x2c37, 0x4) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xff8f) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000001c0)=0xa0296b078f9793e9, 0x4) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)) 12:34:21 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:21 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00?\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x80000000, 0x80000) getsockname$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x16) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) [ 360.904550] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:21 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregset(0x2, 0x0, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:21 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 361.018554] audit: type=1800 audit(1539434061.690:196): pid=11638 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16524 res=0 12:34:21 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3541, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xfffffffffffffffc, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000040)={0x100000001, 0x2, 0x4, 0x2}) 12:34:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000000)) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 361.062746] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 361.076302] EXT4-fs (sda1): Cannot specify journal on remount 12:34:21 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:21 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") bind(r0, &(0x7f0000000000)=@vsock={0x28, 0x0, 0xffffffff}, 0x80) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:21 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:21 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000300", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) write$binfmt_aout(r1, &(0x7f0000000240)={{0x107, 0x7, 0x7ff, 0x94, 0x13b, 0x40, 0x275, 0x7}, 'X{\'%', [[], [], [], [], [], []]}, 0x624) tkill(r0, 0x1004000000016) 12:34:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x5, 0x7, [0x7, 0x3, 0xfff, 0x3, 0x7ff, 0x2, 0x100000000]}, &(0x7f0000000040)=0x16) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={r1, 0x4, 0xabe9}, &(0x7f00000000c0)=0x8) [ 361.226737] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:21 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregset(0x2, r1, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:22 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 361.300474] audit: type=1800 audit(1539434061.980:197): pid=11663 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16530 res=0 12:34:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000040)) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x5, 0x2010, r0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) 12:34:22 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:22 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, r1, 0x0) pread64(r0, &(0x7f0000000080)=""/8, 0x239, 0x103f00) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)) [ 361.358535] EXT4-fs (sda1): Cannot specify journal on remount [ 361.384543] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:22 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00L\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:22 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000080)=""/8, 0xaa87, 0x103eff) 12:34:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x7, 0x624400) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x300000e, 0x10, r1, 0x2e) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x6, 0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000240)={'vcan0\x00', r4}) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r5, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:22 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregset(0x2, r1, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) [ 361.544142] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 361.570453] audit: type=1800 audit(1539434062.250:198): pid=11688 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16526 res=0 12:34:22 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000100)='projid_map\x00') mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000000)={0x0, 0xfffffffffffffff9}) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 361.596441] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 361.613323] EXT4-fs (sda1): Cannot specify journal on remount 12:34:22 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000080)=r2) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x4000004000000002, 0x300) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @random="a29ab0893fde", [], {@ipv6={0x86dd, {0x0, 0x6, '?:T', 0x14, 0x32, 0x0, @remote, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000100)={0xfffffffffffffffc, 0x0, [0x6c9, 0x3, 0x400000000]}) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:22 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:22 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:22 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000004", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) setfsuid(r3) [ 361.745959] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:22 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x11) fchmod(r0, 0x90) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0x9c215763c786ed3, 0x103f03) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4000, 0x0) 12:34:22 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:22 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000380)={0x0, 0x67, &(0x7f0000000280)=[{&(0x7f0000000040)=""/133, 0x85}, {&(0x7f0000000100)=""/54, 0x36}, {&(0x7f0000000240)=""/21, 0x15}], 0x3, &(0x7f00000002c0)=""/188, 0xbc, 0x8}, 0x101) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 361.852560] audit: type=1800 audit(1539434062.530:199): pid=11713 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16525 res=0 [ 361.871893] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 361.894734] EXT4-fs (sda1): Cannot specify journal on remount 12:34:22 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00 \x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:22 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x59259f03e42692bf, 0x103f00) 12:34:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ptrace$getregset(0x4204, r0, 0x3, &(0x7f0000000180)={&(0x7f0000000080)=""/204, 0xcc}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:22 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000004c80)=0x2, 0x8) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000004bc0)=@assoc_id=0x0, &(0x7f0000004c00)=0x4) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000004c40)={r3, 0xffffffff80000001}, 0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000004e40)={{{@in6=@ipv4={[], [], @remote}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004e00)=0xfffffffffffffdc9) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) sendto$inet6(r1, &(0x7f0000004cc0)="7fb780758818e7d9aa1cddfa327d04bd8cb22c23de029f352c68670b0c03cbc7b1f6768e3118281e5d43b7a3af568baa88acac7e3da2734f6513a8f837aa695ed094dbb80058d1ec9abb2fe41fc4df7f447ec0e696f0ce8d4940f2aca645cdf32fc1ffc274b08da5598e7d9b4929a196efa9e86a6eeae1244a55b5274c0c84d26fe20d3f404724b3ef09ab1271d5", 0x8e, 0x5, &(0x7f0000004d80)={0xa, 0x4e24, 0x71a2, @loopback, 0x80000000}, 0x1c) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_route(r0, &(0x7f0000004b80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000004b40)={&(0x7f00000005c0)=@setlink={0x4544, 0x13, 0x10, 0x70bd27, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x10025, 0x10200}, [@IFLA_OPERSTATE={0x8, 0x10, 0x2}, @IFLA_VFINFO_LIST={0x4514, 0x16, [{0x1c8, 0x1, [@typed={0x14, 0x8f, @ipv6=@ipv4={[], [], @loopback}}, @generic="284ad0d07b8ea687cabeae38780af032ae76035e1866c7afca96f1d986f2122d6d74ecae", @nested={0x130, 0x11, [@generic="864c99f38e430f642ae100ca5e6ef58345591ec7bc38af44286b0aab83823311843dfc5e78f3c3842955c79148bc8d43db9cbf56", @generic="a538476a711f44d5c079ec7a9c4445e0e6a466370dd4a7ba8070e9f6778e3de7093e4111c34bf1e575ab3420611d5d4872d1c13e064efbc073c879af7223e17b9c0e9f6f67239cfef75b7853b05dcc8e2c5e41cda4afb28fc173cb85d5aea6abfe33dd396013b43f0cb540d2468bdafeee9130d6bf9f06a27d6825ef61215bfdd6ab68cc20987c797359d3a21b4d0c56b010ef208ff2d0106c6bc6e3f923b34c388d4d08bd28b6b4c54ef2e5da89b5652e51ecb334f61c0a1d3dd854935c8202dea7fe6c5b482e9a01def8dfb5236e2d23f3defd84d21cf9614d627eda60db2dafe35609dbeb395e724377fb8260d789810463b9f4c724"]}, @generic="cd666dbbd16f0d000fbdc4692a60f1c8011ba0ee5937f207714a84db7219ed00207e07c17edc9e9e0ac4c0a757946ce34c7fcc3bed286a6f63c15be5772623fdefa1aaac91d6dc507ad5a5be9852cad42b28f8baf8810cf5efb0d4d2"]}, {0x1508, 0x1, [@generic="5815b29fbcfa2bfb25ceaeb1967ac38b064261adf9c235e34de58e8f9ff9393dd2553c98dfa983d19166e4e6b43e35f325cf10146e64002c29f997223057d93c0c9df9de8ec1836f", @typed={0x8, 0xc, @u32=0x200}, @nested={0x1164, 0x8d, [@typed={0x8, 0x22, @pid=r4}, @generic="ebceb354c458676e6f93641746d52e14485d6b55df80beb0c8b34decb289e4ad5ce70f61a84213f28928e8a1482f3cdbc3e5fad3af26bbe6cc346b9b05fed996b0d79698d5dd77e89df412bb27be3fa33d224aa79f399a140d4ad1e307809ed4222e9cdad9c601143b04ea3251d67a0e44de1888aa60fa4d1a9e6f15ff31180c1e624bdb2d679481e01ab19db9536060d019a7a1bdbac3f459f880a29f913233a3556c16eaad817dd19e94030177f410317f7515a56e5d337399e0517b441098b4dfa72706aea297f3f2900a73a09b911c332028b3528fbcfac56dbb1fc43d6bb3b1c1bc9e1d60405d745639fa", @generic="f2b6f21dcdf587d8a97e70", @generic="e5e255a2e2bb2697aee0b585760c0f526b8185674827ae98fa82bc7cea142836f6bd06196dd7c0a563b8d37b00857aff91a2d5129cd4b09b27ed7b3f8e16f334e370d2e0f01710877b4e434e364a42036b35dfde729777cebd2c0c", @typed={0x1004, 0x86, @binary="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"}]}, @generic="ad262fc3b29fbd0487d423a1c341df0e1cb5b5df8fa7d599e7a21444e5c78c29551967e81f2a5e70a761845864660b4a245f626ff4cc1842bae3385110143a3c9cc7af14c4c274317210e6aa62baf052e5b13bd1fbfa555d0f275550a576b73cccc04a6c196ab2ba05410862612948816dc64415ca66496d37c2efb24830ce97b83ecabcdd041700ac315c472bc25798d1c1717476b754f2b85bc6f57db23ef4cb5604bfbf9239764eebe1ac3b3c084aee3291fffe6001069ce2620f65879ff9d3fe12b0f3ab60e8c7", @nested={0x4c, 0x45, [@typed={0x4, 0x6}, @typed={0x8, 0x3d, @str='\x00'}, @generic="4c1dbef2fa616d51567a3177ae2981fb45ded6abb54de52216bf5b", @typed={0x14, 0x5, @ipv6}, @typed={0x8, 0x5e, @uid=r5}, @generic, @typed={0x4, 0x43}]}, @generic="606804a8fcc6d1611af6a0eb7bfb97fc86178db0dbcb7ba1f54c2762f5b1cf1486629a867c56878272cb8fb56351af0828e0811cc65cc034980508f12f1dd01dceb73629c797a49ca73fd9308b230b5851d2b160d238b8e404f01b2b14c094e4f99f673ba137b39018ed4f9dc660ac6f54d8b834a913625d5c109fad13ffaeb346e8fec3a6c61e814854685f4cf3fc33e7acbf0b97c4764decc9071aae2789a2a5d4d0c230a280de264483e13caa0d7fe29b86437111c34c725573c77b88f77162a7676818705829e9eecf99fb0b899fa288f3d971324b0dc619b70429096968861fcb8599bc8606d4d437cf6e27bd4d", @typed={0x18, 0x4, @str='em0loppp1{system\x00'}, @nested={0x130, 0x94, [@generic="2e9a0f4126649e1ab99c845b3b2f741cab89bdab0107f29c8668fb2977de6c44e2b1d78b3277d58eaf1fb08a64d9802d680b59f76878e5fb3612d7b1f08839dbd2e0386eeeeef54e973dcb62b95cc38d280bcab62bed260e15f2f321f4b7e118eef05dd937bcb63013677495e11a95d25be3cb2354b57779481bea08d8b0", @typed={0x14, 0x73, @ipv6=@loopback}, @typed={0x8, 0x5f, @uid=r6}, @typed={0xc, 0x4, @str='nodev%/\x00'}, @typed={0xc, 0x63, @u64=0x8}, @typed={0x4, 0x78}, @typed={0x8, 0x4a, @str='+\x00'}, @generic="e74f652f4e2c64769ff16ad714258c5121c2da5ccb2d75ce02c4feb0f8a140a69eaf9b5799d704ac10057cbfcabb834bc68008b4b2ce0e0dfa6e3cb06aaaf5c88034a13680f884fbe687072062e9a4674cabecb754875f1d3812e6f683d3bfd017c8abda6545f4dbed52d14f"]}]}, {0x178, 0x1, [@nested={0x100, 0x5a, [@typed={0x8, 0x87, @u32=0x6}, @generic="18209ef5229c548ea8710d689b60bbec8e9b0e66393b47f5b2a8775607f4e9d31484d2479616d221319f48b0733bf412b7a94848a95dcf9279db3ff03e20fe3bd94f3b254b751cc23c3dfcf373f961f81a0ea24e3e385c85022646e10b761fda52fa72748fd1e60c08af3dec2058a565474e7389db531e26ba945cc24ba3e18cc0b710c939ed0b3caa7f07af2c53a8f9812e15e4930727d76533ec1f18a0cb41ca4087a86904e70d07c80cafc3c0f27baa008748695d0c3e9ff23affc09528c4ff98451ad230159405ce5dbd87cc5932b6f62fddaf56bc265b595c3a2829b6ca938f57be7b49ee712984ac335c07143496"]}, @typed={0x8, 0x28, @ipv4=@loopback}, @nested={0xc, 0x35, [@typed={0x8, 0x8a, @u32=0x9}]}, @generic="1ec5cc6c15b6f01973ecee636429bd85e9c5acce32d5df6161ec514bfa80095a6ec8c2a96b7b1a90acaae300adf7df8675bf88ee3c6868fb09d62a28005e51173e9711791d56eae3d0d299b5d13fb5b5b2ce3ea098f9a2c4d7997490c973"]}, {0x1f0, 0x1, [@nested={0xc, 0x81, [@typed={0x8, 0x12, @uid=r7}]}, @nested={0x1e0, 0x2, [@typed={0xf8, 0x18, @str="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}, @generic="052d5345b2b4901c12a67749f184d5681c01c0a9f4fb37a7f4bad10c09d6ebf0f116453c30ae3f2f8e503f1864f9351c8a21fe6c4a9d8d0a546901787f01b7258aaff72c7ac94387f8ff22e79e0d811d8337081819b05526ed6ec1cfc742b0e7398bb3479c39ed622f98f24eae31be08aa57c3d35160196ca7c9c56a71b924693d5036abfed45ae7fd7d56008d58a8981bd43c4e3e239b2b6c9fd54a22aff876b8076885054dea3a42fedbced21d167b978752faef4bc6f580ed6ccd3f828786f14b9ebc6135c33778f1fda880e617ee0096aeabadf863110ad1619b0b5e06c4fa"]}]}, {0x26c, 0x1, [@generic, @generic, @generic="4ee5026de12d98cfa62b6c4476680262572be3feddd5e185ceebffde703b32c4e6d7cb51c5ed7b4d2e97ac2705ace38d8451a1c1c18975a725f0426fc18247d8f8c69d33ad3b95f7d2fce8bf08687c5c7bc3e401e5", @typed={0x8, 0x31, @ipv4=@local}, @nested={0x208, 0x8c, [@generic="e630ef671930e0442984c21a389e904a7a006fb97db0a8cfb47847347f083460ad86547d8e7c8f77b0f6894790f71cfe86ecc6cb155e916706013f8e2b1963466bc72a1104dbf422e871e49a5485a275e60f47571a751c053665c3fdd38c6311786b565acfe9438551abf4fa08ec549fb338395439789f64388d20c65e81bd62b6a976b3bcf7506182fff7a8786c6b7899244577d92155a7b87a6d4465b153be9bdd3c216bd6dd366fface2bca958ea79973d14939e9c0a5b41f84bc3e9426ed0103866fc4f38ac515c1be6120e19426bc4c4165289363e3556baf75e2ee473eb30025b88bab7ea7e714da4e054c4efd6b027ead46e9091fadba331075", @generic="3136e4c194f30591702ded87d762926846d8b4c4cf3631a0ed1d80fac22c58625683d75aaa6fc7ed0be52786640e58737812808a9a199d8de4fb931752e5611d7605ee7df0a00e889380ca82152418862e0ad5ab2f8812fc3a02223ac141f46445ae52f83f5401d04cd29fb15f0225565f269d15627a410759a30c0e66b0b5190a24f25dbd76c8d61036627aae5cfe146344011f4bd7cb8db0c12292d3e50c40c3bcd33ded9229bd2cbdc8577fa8b02e8c6efb539c035e2f315f4595214b83fa74d8f658cf2b355f62165447f4b785239581e99e5ec58a3870c3b922722ab2f6c2c8ab482a22a1fa50ecd981422cca9c8d98029399b9444e4d13801ec46d4e", @typed={0x8, 0x33, @ipv4=@multicast1}]}]}, {0x3bc, 0x1, [@generic="81b1de9fe608013587826f52bf08da148d84", @nested={0x23c, 0x1b, [@generic="bb4574315a1d210a07e604bfbf08cde68ecc8ab5ef3cf68170e3f66685d274468af141f2f653b8dc542ecb89c18a3b1b6e0722feb61d71efdc10cc3c80fd1d5ad8528c6e64b468cfa8e723b54893071fb99462d3ddb4a42c91f2f1f2fee3ea9c0583ae3b06d0ef07bc4fdeced84fc58e9312a36adb8d5606fb40fab4fe955b7718765af2500a13eeb30a975f23f0bb9be4e2b9289ae3c8cb3de088b0db25594e8175ea3633ae2c2fd16f8f6ded82dcb3c8b1193ccd0c35a695ae270d38676b318fdea34c1b073f85697fc95974be313f3396ea667ac9ba6e6a77efb4481b3f4bb45214e72526e01f674cc180ae7255", @generic="9fe0a26d78c529124784137e6afaf621ab026d2efea109ea3c0144765443de0384273180d5adb6868decd39956d233ddcaf5b76ee93d6b7903a321b8e3eaf364f07228da154ccf59bf3cb7af12137e016f69d76be240250eb1ba5a01f7e08731b4e3f23c0e123e6fd52f9b6f196b2d1208dbe55d3f3e452e80d6ed91fa3d8166a12440f54ddfa8cad8724fa2d2dbb3ab98d174b139868e0e3c35b720d01db90cdaa0a0a2025342b4", @generic="c2a11b9d0a39184f37f82b457ee8e153e734c0fe368ff45b250ceaa69946a0a450fd8a0fc7c67d81cf2c807e613cd7ce5afa", @typed={0x8, 0x73, @uid=r8}, @typed={0x8, 0x6d, @u32=0xffff}, @generic="af2ccb35618c0bd68bb44ab847cda0dd25a9176ecb187628c4aae58cee1ef8976fa9a011c033136f66fad4daff54b81b40818e208c9deb75593608f13cdacb659bd204d67b29109dcf", @typed={0x14, 0x6a, @ipv6=@loopback}]}, @nested={0x68, 0x4, [@typed={0x8, 0x80, @ipv4=@rand_addr=0xad4}, @generic="b8c7f817dcdfaf213b9505a862d8842ec2599778f8d1a20e745499fc8bbe41e2d5aa4fefe6a015965b4bbd32d57ba86f457b3e540871aa3a", @generic="783ae25aaf00dd16cdf363891d3770e6c43e843943ac7296c54a2dc83985681ff06ade"]}, @typed={0x14, 0x68, @ipv6}, @generic="6d2ad213b5728d6f701cddf838aff15fe6d2d8fb93a00c5f5b9d425a37fa7982466cdc32d6816e8137ed4b511fdb0a99a673b583fbc96999419733", @generic="c1831fb3ff2fbbc8f532750b9de0a88e035a4b1f5d2c2d5a101bdb7aa27ee655af1cf53f9f6c6d5569b3476cbd52c11ab6b76391d3710d3ab2a744f3ef39af17c3bffdb08cbac144c78f8b00f2ea53d5d32ceeeefecfb5aa22938ed6c0fd9c852f022e8e3b898503ae7e6601194a2925dfb6be8c4dcbe91f3581728e45a1fccdb00b480f9f3c43523f82bad127c5244816a6be2ab503d924296d7b621ab01a1096069291a6106cb8dcc2740c31a9b89d0e5e"]}, {0x24b0, 0x1, [@nested={0x4, 0x64}, @typed={0x8, 0x6a, @fd=r0}, @nested={0x9c, 0x4c, [@typed={0x8, 0x1d, @str='\x00'}, @generic="726f1fad1293232288ed7605cdb95c9653", @typed={0x7c, 0x7, @binary="c9a643d7f2eb667bafe9a3fec54ac147ea696e18b103c18a90dd1af216cbda2efe21bb38b572e4851b9761d04510f2d1e591f8d114478e76c2aaa6a036a4bbde29cfc71c08ef6d3e4dba1ddb839ed96f143350c97bedfad00b8c9d8db163d9b292a80228b7943862c14ae7856d7955bce3c7a24626f8"}]}, @nested={0x1234, 0x5f, [@generic="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", @typed={0x2c, 0x7a, @binary="34e1143600200a81be161905dc43e850c12fd0f88711e44ca3ec73bb232aa81bd7c7288891884c32"}, @generic="0d14f61a994df459bcf6cdfaa69ecbccf5efde1c793987970e757822d31d805e7bb53817e088db0e21b5bab7972e423ba72a43327ef09e501169272340a5a731450d54602c4610a1f71696cad456c0c192dad400d65f1a7f165c23e81e262622e8201b85390a79f647774800a8", @typed={0x14, 0x37, @ipv6}, @generic="809c5820f3ef6929077d60ef847c4de240b7083ce516e6654617fd2bc516776683ff900315f928e7331f6ebe5ac163771713bd5e443ffe855babdc762a7947925d386fd2065c393c64648cc74e5859ddd9ab05e8ee7ad1f0fb954eb6dd6562c688bf4bddb0a89df72d45e30f8dfe21cb58be2634b63610e04bda686ddb07ef5e9001db736182f8596ac2a687045585026a3fce7c660c24d0265c3dba3ef76d6f83a316513dd2f1715bd2e8fbbc9b20d4512302d9074e48cc3aecda", @typed={0xc, 0x46, @u64}, @generic="0851dd0b0967453171fa89db869e4a14cf6035243b2a2b6a245e2d3a597ebb9824a1273d7dba1ddd6c2f8b931b8fbf0456f94715ffd5aff7a5388fb8f4da7fd9d4fc39cfa014e730221e8088aacd041bfa2912cb1004b8c308ab5045e742f3501902c0f06567c6b7fa4fd526c17490dbbfb377bfcf0cc6be0e36085b33eb8d9cad6613d07cb2714f1a6488637216f673ce55d33703ee85923761379c1f91f05c9cbc28b9719eee40aeb9f9d4583af7a937a43b126385b189b728"]}, @nested={0x1054, 0x13, [@generic="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", @generic="59566698a8b6a4daa2e451b04d7af5bd2fc8b5b9ceab9c2a3a12b6d6fecb52a0deb942712ab02a6580c83a198c08607aaf1f91594710dcf3ce21e1a4fb126fb129fc59b54235d9fbb572455776cc7d29"]}, @nested={0x30, 0x21, [@generic="c1883fcb78cd40b13984faddd84b46b4c0ca05db93c3eb45", @generic="30cdac883bb54eb1b1c2a4e2116d903177de"]}, @nested={0x14c, 0x5d, [@typed={0x58, 0x80, @binary="3a4bf847ce846c245dedcf64db7132588cd63b4f6fe23793a4fd1cdd34b9e463e131fb5219d2b0bc0246f1a8b1d498eb465dcd6413a2afc80936843171b1a4e8b3456221e3c38783d1495f12fbc772db8523"}, @typed={0x8, 0x4, @u32=0x3f}, @generic="3e4384404993396c2c3281f6aa84b962517b40f9fe7719d217588161535a807dbd6f3b39cfe51e2de0ddfc0dd14f478386", @generic="6f906566e8fb1f95320eb54f349348ca2c1f6a90cc83a4cce45b06e8d78a3e8c5152bb37aa38435749fd1c15cc3b7b7a4129530aa2d8ea6de560fa5d462cb60288e7460598f8d9a551214ef4a00d971fb4d5da2b0a06e8c50f9d4a6a830b73", @generic="c1cb17817f50c8c60362450caf35641c8c98053ed0d15c61e5b624ed8c959e9b708a8aaf4cb849998d0ec4fb0e729a9b7839bbfa60ae302bb3e945ef6fdbfd5df7adbc5013505b9b0b71d9f9fc48d42bf12187c820f4b30b"]}]}]}, @IFLA_LINKMODE={0x8, 0x11, 0x101}]}, 0x4544}, 0x1, 0x0, 0x0, 0x20040001}, 0x40000) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000004dc0)) [ 362.032664] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:22 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 362.103285] audit: type=1800 audit(1539434062.780:200): pid=11734 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16528 res=0 [ 362.145741] EXT4-fs (sda1): Cannot specify journal on remount 12:34:22 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:22 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r1, 0x8, 0x10}, 0xc) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:22 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00`\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:23 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) capget(&(0x7f00000000c0)={0x20071026, r0}, &(0x7f0000000100)={0x9, 0x4, 0x7, 0x1, 0x5, 0xfffffffffffff00d}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f0000000040)={@my=0x0}) dup2(r3, r1) r4 = socket$vsock_stream(0x28, 0x1, 0x0) getpeername(r4, &(0x7f0000000380)=@ipx, &(0x7f0000000400)=0x80) connect$vsock_dgram(r4, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1004000000016) ptrace$pokeuser(0x6, r0, 0xfffffffffffff801, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x3, 0x3, [0x3, 0x1, 0x33a]}, &(0x7f00000001c0)=0xe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000240)={r6, @in={{0x2, 0x4e23, @multicast2}}, 0x1, 0xfffffffffffffffe, 0x3, 0x3, 0x20}, &(0x7f0000000300)=0x98) ioctl$VHOST_SET_VRING_NUM(r5, 0x4008af10, &(0x7f0000000340)={0x0, 0x2}) 12:34:23 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:23 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000040)=""/8, 0x1fd, 0x100000) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) readahead(r1, 0x7f, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) get_robust_list(r2, &(0x7f0000000340)=&(0x7f0000000300)={&(0x7f0000000240)={&(0x7f0000000100)}, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)}}, &(0x7f0000000380)=0x18) [ 362.371446] capability: warning: `syz-executor5' uses deprecated v2 capabilities in a way that may be insecure [ 362.381969] audit: type=1800 audit(1539434063.050:201): pid=11754 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16531 res=0 12:34:23 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x8000, 0x7ff, 0x3, 0x7, 0x5, 0x4}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)="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") getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000240)={0x0, 0x10000}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r3, 0x7a}, 0x8) mmap(&(0x7f00002f4000/0x4000)=nil, 0x4000, 0x0, 0x40000000004d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:23 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) [ 362.420002] EXT4-fs (sda1): Cannot specify journal on remount 12:34:23 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x2, 0x3, 0x3, 0x8, 0x3, 0x1, 0x101, 0x16c000000, 0x7f, 0xe73}) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:23 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00000500", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x14}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x105000, 0x0) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f00000000c0)=""/39) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000100)) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:23 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:23 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:23 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) pread64(r1, &(0x7f0000000000)=""/8, 0x8, 0x0) 12:34:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0x3}, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:23 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0xffffffffffffffff, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:23 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\a\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:23 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:23 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1858, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:23 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:23 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x3, 0x0) recvfrom$llc(r0, &(0x7f00000000c0)=""/243, 0xf3, 0x40000001, &(0x7f00000001c0)={0x1a, 0x104, 0x8, 0x2, 0x3, 0x218, @broadcast}, 0x10) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) tkill(r1, 0x12) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000240)={0x2, 0x1000}, 0x2) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1004000000016) 12:34:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000000)={0x500000000000000, 0x1d001, 0x7, 0x8, 0xd}) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000080)={0x1fffff47}) 12:34:26 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_SECURITY(r0, 0x11, 0x4, &(0x7f0000000080), 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r1, 0x0, 0xf2, &(0x7f0000000000)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}, 0x30) r2 = getpgrp(0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f0000000240)='net/rt_acct\x00') mmap(&(0x7f00003dd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0xfffffffffffffffc) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) pread64(r3, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:26 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:26 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:26 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:26 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 365.660386] kauditd_printk_skb: 2 callbacks suppressed [ 365.660400] audit: type=1800 audit(1539434066.340:204): pid=11821 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16521 res=0 [ 365.705929] EXT4-fs: 2 callbacks suppressed [ 365.705941] EXT4-fs (sda1): Cannot specify journal on remount 12:34:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f00007e2000/0xb000)=nil, 0xb000, 0x4, 0x4d031, r0, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:26 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:26 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r1 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x33, 0x0, 0x5, 0x0, 0x2, 0x1000, 0x7, 0x2, 0x2, 0x101, 0x7, 0x7, 0x40, 0x2, 0x5, 0x7, 0x100, 0x401, 0x3, 0x1, 0x2, 0x6, 0x8, 0x41, 0x3, 0xfffffffffffffffb, 0x81, 0x80000000, 0x4, 0x1, 0x8001, 0xffffffffffffff01, 0x8, 0xffffffffffffff01, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x1d09a, 0x4, 0xffffffff80000001, 0x7, 0xffff, 0x5, 0x7ff}, r1, 0xd, r0, 0x9) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 365.766163] validate_nla: 8 callbacks suppressed [ 365.766172] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:26 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 365.884559] audit: type=1800 audit(1539434066.560:205): pid=11840 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 [ 365.923086] EXT4-fs (sda1): Cannot specify journal on remount 12:34:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x448202, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000140)={0x1e, 0x7, 0x1, {{0x11, '/dev/vhost-vsock\x00'}, 0x5}}, 0x1e) write$P9_RRENAME(r3, &(0x7f0000000180)={0x7, 0x15, 0x2}, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x9, r4, 0x1, 0x1000, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0x1000}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000280)={r5, 0x8001}, &(0x7f00000002c0)=0x8) 12:34:26 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:26 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 365.937352] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:26 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000100)={0x0, 0x2cf5f8d1, {0x56, 0x9, 0x4, {0x4, 0x8001}, {0x9, 0x1}, @period={0x59, 0x1ff, 0x4, 0x7, 0x9, {0x3, 0x6}, 0x6, &(0x7f0000000080)=[0xa740, 0x1000, 0x7, 0x400, 0x80000000, 0x8]}}, {0x51, 0x3a, 0x0, {0x8}, {0xffffffffffffff1a, 0x2}, @period={0x5d, 0x1, 0x81, 0x2, 0x1, {0x9, 0x8, 0x8, 0xf08}, 0x8, &(0x7f00000000c0)=[0xfffffffffffffffa, 0x6bb, 0x8000, 0x80, 0x100, 0x1, 0x8000, 0x8]}}}) bind$can_raw(r1, &(0x7f0000000040), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 366.041459] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:26 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:26 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 12:34:26 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xf2, &(0x7f0000000000)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494", 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x2f03, 0x0, 0x2}, 0x0, 0x0, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:26 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x400000) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x11c, r4, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xa85}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfb}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2788}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x5}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @rand_addr=0x1}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x4000}, 0xc8c4) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) [ 366.192023] audit: type=1800 audit(1539434066.870:206): pid=11864 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16531 res=0 [ 366.216459] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 366.234711] EXT4-fs (sda1): Cannot specify journal on remount 12:34:27 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) writev(r0, &(0x7f0000001400)=[{&(0x7f0000000000)="0d09eab39dd769ede029b70afedbbda2bd566648c8e7c3f076aba4d1ddad8d1c4b020fd6a7a6aba1a917713318f36a156d19006212da9e2072ed18e0a4bd6131ac646e4c37120b3bec7243d5fcfa3c84e06adbe19a304e0ee7d081addcdb819a514f1c29140c26d13cdfc084ce345adb009d7aa032701cd03e2dc23cfafd87db146e73c0f0bacb848a02addb1d719df20a38c179c9560c45978973c5241d781083bff30614def2f71a25", 0xaa}, {&(0x7f00000000c0)="cdd23cd8f0421776da4fb8", 0xb}, {&(0x7f0000000240)="7d4c3b97a7a5d350c0cdd5b7a571991b07156340e0e98f1402ace9fd31bffec2fac0eaadbe9f1de372c3bddba194982eaf9f8b338a1d214ed936a0231eaa50eaeb18c4976d0383774c73fefb13", 0x4d}, {&(0x7f00000002c0)="071aa2ea0ed287cf764bd9812c487a5862473fc7865decd4ab432ce307785e6d4a7c4fff410bc52033d0adf046a2cef77834da0984889cd3d832cc8a5a6003bee4075efcdc", 0x45}, {&(0x7f0000000100)="990fde2542c435715b1fee2bed929bb5", 0x10}, {&(0x7f0000000340)="0462c310c5c5cc0e455f5fd2419a89a9316ad48dea74ae9c7dbfec5a0443cd7dd3459248b199e3564ec29fefc6399806a34a5e4c7194f32d9dfa5243677f99d83ad40fbcd281d9837985fb06887476f28ec212e7bf8ca50f2f024ef9077abe6f54e9", 0x62}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="e053e851518d4abf86664363d60b062101bbe7a10db1db260608b7165701", 0x1e}], 0x8) 12:34:27 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ptrace$setregset(0x2, r2, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:27 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:27 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000000)={0x1000}) pread64(r2, &(0x7f0000e3e000)=""/8, 0xe16e, 0x103f00) [ 366.380746] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:27 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 366.461064] audit: type=1800 audit(1539434067.140:207): pid=11889 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16527 res=0 [ 366.496095] EXT4-fs (sda1): Cannot specify journal on remount 12:34:27 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregset(0x2, 0x0, 0xffffffffff600000, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) 12:34:27 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000040)={@my=0x0}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000080)) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1004000000016) 12:34:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0xb9, 0xffffffffffffca82, 0x5}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) accept$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) [ 366.513210] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x8, 0x6, 0x8, 0x2, 0x37, 0x4}) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:27 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00L', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:27 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace(0x4207, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregset(0x2, r2, 0x0, &(0x7f0000000080)={&(0x7f0000000040), 0xffffff67}) [ 366.587724] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:27 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 366.690148] audit: type=1800 audit(1539434067.370:208): pid=11911 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16531 res=0 [ 366.726259] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 366.736983] EXT4-fs (sda1): Cannot specify journal on remount 12:34:27 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) connect$pptp(r1, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) r2 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) shutdown(r2, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r4, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r5, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1004000000016) connect(r1, &(0x7f00000000c0)=@llc={0x1a, 0x30b, 0xffffffffffffffff, 0x589, 0x6, 0xee, @remote}, 0x80) 12:34:27 executing program 1: 12:34:27 executing program 0: prctl$getname(0x10, &(0x7f0000000000)=""/210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:27 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:27 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00z', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:27 executing program 1: [ 366.866068] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f00000002c0)=""/8, 0xfffffffffffffdd6, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000240)={0xffffffffffffffb9, 0x1, 0xffffffffffffff81, 0xf, &(0x7f0000000000)=""/15, 0xa9, &(0x7f0000000040)=""/169, 0x1d, &(0x7f0000000100)=""/29}) 12:34:27 executing program 1: [ 366.918652] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:27 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) r1 = accept$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0xa) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:27 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 367.008701] audit: type=1800 audit(1539434067.680:209): pid=11937 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16522 res=0 12:34:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) io_setup(0x0, &(0x7f0000000080)=0x0) socket$inet6_sctp(0xa, 0x5, 0x84) io_getevents(r3, 0x100000000, 0x5, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], &(0x7f0000000180)={0x77359400}) 12:34:27 executing program 1: [ 367.052124] EXT4-fs (sda1): Cannot specify journal on remount 12:34:27 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, r0, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0xd6) r2 = accept(r1, &(0x7f0000000000)=@nl=@unspec, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f00000000c0), 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x10) 12:34:27 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) getpeername$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) accept$packet(r1, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001600)={'team0\x00', 0x0}) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000001640)={@local, 0x0}, &(0x7f0000001680)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000016c0)={{{@in6=@local, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000017c0)=0xe8) getsockname$packet(r1, &(0x7f0000005a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005a40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006c40)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000006d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006d80)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000006e80)=0xe8) sendmsg$nl_generic(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100040}, 0xc, &(0x7f0000000100)={&(0x7f00000005c0)={0x370, 0x1c, 0x100, 0x70bd25, 0x25dfdbff, {0x16}, [@generic="12bc7bfc22601308ec89ad0bc6323168777cb6ccc0598e0d89a028373e7cba03ff438f905cfabf56d85d1c7e28de8f03a89588b95aa912bc5e619904a43849af91b97a0e9b9658ef9785afcd3363e50d4da837a9ad7c32edc8e0f87afaaebd6908cf7bd3", @nested={0xf4, 0x12, [@generic="792bb0c6388d74cc6ed9f9cd83d5fca893fe79ea35cf3ff4fabed73793c5e9db343af97db19eb1930f7b44213abd06a6074cf8e766e6613650f865b3b34cefc3739d681c8bc9b7051afce097caf0f42508f98ef19bffa912af0df718b6253fe6", @generic="a12f6d6ef581b56fdec428d4f1f4e15458cf7bd14098702e6a6914f71ed979b977b7e29fe385a3b1e234a647c9f38053764e2c8f0ab8a077c33c73384bca2c98cdf866b37589b07fc3c9b3aebd388f", @generic="ce4d0d4a3ca06d1473af3285c5fe7d6d6f0cadb39ca9634879d4fadc", @generic="5b6caa001454244c9631070f2ff77934bf4ae557055f8cfe2130704407691c758c08"]}, @nested={0x12c, 0x66, [@typed={0x44, 0x52, @binary="d8cefc379098d76156570c8c10a308cc5d0eaa592632248261f149a74567f1fda7ab14201b05737302f7bd5fb688ab8deb937a765b6d96b2320cf2099806f7d1"}, @generic="72153731c3f77f9e97a415f5c6d989f8add8f259ee0d6bb397abee727c0a3971d6f3d7b48e761846f4f3961d71c930004a05239fecb58f41fb3b7399eb85e413cdb836a6b8cdb6eb11365e46b16333371d7b9c79c6c6349ff7a571abf8350894d6907cc0c3fe7ec48680bbc61ded649088fbb7f86b38bea60d80f88ef15c586f67464b154f62258a88c80be7790d5ad61cde7413bce513e05b0cf335fd458498d5ba6b22eb727656205ded448f0d98c45462d8bb8320e835e59775670794e0f9d04d9bef237fa73d45a25b21f65d57f7dac69441", @generic="b2b69fcd026a6662b2e2a3d6c4defc"]}, @nested={0xd0, 0x5f, [@typed={0x8, 0x7c, @fd=r0}, @generic="76652e05d538034447bb8ace03ebd28e62e1892f0d136413eeef935c5ef4556cf1d3d8423bf28ca5ac4ab49efe5ab22712ad0b27b7f7870212629303ed06f10c6f98d41b75a3328b6bff9e383102912cd40fd4597fa316515a27492d242c42839607b862334809547fa310eb2ed3bcba6610652deb327c017035fbb18c657af0984cc40839784d1968bd5bc66d678520c5cec71a082a6c4eae995c42011ee6d1f56733333f6f65c493adc181f8d0208598bab96adc0995e79ec352d64b73119a68424e3c"]}, @typed={0x8, 0x5, @uid=r12}]}, 0x370}, 0x1, 0x0, 0x0, 0x8010}, 0x40000) r14 = accept4(r1, &(0x7f0000006f00)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000006f80)=0x80, 0x800) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000007240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000007200)={&(0x7f0000006fc0)=ANY=[@ANYBLOB="3c020000", @ANYRES16=r2, @ANYBLOB="000429bd7000fcdbdf250100000008000100", @ANYRES32=r3, @ANYBLOB="04010200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004006500000008000600", @ANYRES32=r4, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000000000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004008100000008000600", @ANYRES32=r6, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f61646361737400000008000100", @ANYRES32=r7, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400ffff000008000600", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="400002003c00010024001e267573657245e2696e6b756162371a65000000000000000000000000000800030006000000040004000800060000000000", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="800002003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000700000008000600", @ANYRES32=r15], 0x23c}, 0x1, 0x0, 0x0, 0x80}, 0x80) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r14, 0x84, 0x8, &(0x7f0000000080)=0x8000000000000280, 0x4) dup3(r1, r1, 0x80000) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:27 executing program 1: 12:34:27 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000001", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:27 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000040)=0xfffffffffffffe01) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000000)={0x100000001, 0x8}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f00000000c0)=0xfec6571) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000080)) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) socket$rds(0x15, 0x5, 0x0) 12:34:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) tkill(r0, 0x1004000000016) 12:34:28 executing program 1: 12:34:28 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x6b3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 367.360574] audit: type=1800 audit(1539434068.040:210): pid=11969 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16528 res=0 12:34:28 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0', [{0x20, "706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}, {0x20, '*'}, {0x20, "706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494"}], 0xa, "a64fbc0c926f9037b40d18f910f946d9f8261913b58d4678e9da829c841f8a86059384aaf0b83996bc1eb66de04bfe3db685277aee52c422e980597da354f5c9be1a5f259b14a5c9876e803390fdf50d7a487387bfa1a4c6240ea9295c64b872aa463ac2efcc8f73f024b80c1733b041dafc1f9b71a3736bfadf377cd089dd81c221ab7049dc28ab21dfc899733966fcfc928819dd4ddc050374ece604eea26f94269e2cd99284b32c3e89b2ff11cc945f7cba6098bc9bd22ae5e011bcc8b55557884de04896397df15cc55c048b"}, 0x2c1) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xfd41, 0x0, 0x6}, &(0x7f0000000180)=0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5933010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x9, 0x30}, 0xc) [ 367.430709] EXT4-fs (sda1): Cannot specify journal on remount 12:34:28 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x1, {0x2, 0x1f, 0x9, 0x6, 0xe271, 0x8}}) 12:34:28 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00000300", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:28 executing program 0: r0 = accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000100)=0x1c) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") socket$inet6_udplite(0xa, 0x2, 0x88) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x4}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000380)={0x0, 0xa4, "79fb9d875537a6fbaa900f363069106f4ae5ae5d8685e4c68427dcdb7448bd1e5503dfa2a9e1dbfb063d5403ed9ff8b2b16952a8360058e5a326d3722552723caeec0456428fe4da493ef0c1a1ff5067501fcf1b34395fb5cdb4e4291443b3f0adc425af6d5e3692003db448d937c357cba9396d9751e43f2ed4ce4c95bbb8e6eade1c56e22c03732b47264ea88037519205e2de074de39972e9a31ff2d4bece77ac9173"}, &(0x7f0000000240)=0xac) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000440)=@assoc_id=0x0, &(0x7f0000000480)=0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000180)={r2, 0xfffffffffffffe85, "75de55dae1042530c1ae41e95fd1a36fa18850ecb167ab4fd14e2613be54a5204449040f0ddf8f43416b11"}, &(0x7f0000000040)=0x11) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000080)={r3, 0x2}, 0x8) 12:34:28 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000000)=0x1) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 367.669678] audit: type=1800 audit(1539434068.350:211): pid=11997 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16537 res=0 [ 367.705615] EXT4-fs (sda1): Cannot specify journal on remount 12:34:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f00000000c0)={@my=0x1}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) r3 = syz_open_dev$midi(&(0x7f0000000480)='/dev/midi#\x00', 0x4dc, 0x24001) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000004c0)={0x0, 0x2, 0x0, 0x1, 0x2}, &(0x7f0000000500)=0x18) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000540)={r4, 0x77, "52b1cee046809400e65ced9ae99ddc00ff00c78de4b4c38e0087b523698d049df95ba34886070c235235b5524c19bcedf55ca734971887dcfb23534f5902c7c8547f835356c945ce618664bccfab59454f62406b7134b73767b23a72349ad5962e0846b89fcc4f3e2b79e5b8f1e7610860f37a58add891"}, &(0x7f00000005c0)=0x7f) 12:34:31 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:31 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00fcfdffff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000000)) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:31 executing program 1: 12:34:31 executing program 1: [ 371.027764] audit: type=1800 audit(1539434071.700:212): pid=12012 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16534 res=0 [ 371.052326] validate_nla: 6 callbacks suppressed [ 371.052337] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 371.082356] EXT4-fs (sda1): Cannot specify journal on remount 12:34:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)) 12:34:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaac, 0x0, 0x0, 0x448, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1004000000016) 12:34:31 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x200100, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/148, 0x94}], 0x1) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='nr0\x00') timer_create(0x0, &(0x7f0000000140)={0x0, 0x1d, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000100)}}, &(0x7f00000001c0)) timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000440)=""/238) 12:34:31 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00ebffffff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x8, 0x103f00) 12:34:31 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 371.265453] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:32 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x30c, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffa, 0x49, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") write$P9_RATTACH(r1, &(0x7f0000000000)={0x14, 0x69, 0x2, {0x8, 0x4, 0x5}}, 0x304) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) 12:34:32 executing program 3: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/attr/current\x00', 0x2, 0x0) fadvise64(r0, 0x25, 0xffffffff, 0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r2, 0x0, 0x9, &(0x7f0000000100)='selfbdev\x00', 0xffffffffffffffff}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f00000004c0)={{0x3, 0x4, 0x1, 0x2}, 0x4, 0x23, 0x1, r3, 0x5, 0x9, 'syz1\x00', &(0x7f0000000280)=["706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494", "706f7369785f61636c5f6163636573737365637572697479182d766d6e657430216d696d655f747970655d6d643573756d235d00", "706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494", '%\x00', '}\x00'], 0x21c, [], [0x6, 0x1, 0x6, 0x4]}) dup(r2) 12:34:32 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x8000, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000100)=""/171) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, r1) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)={@reserved}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r4, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r5 = socket$vsock_stream(0x28, 0x1, 0x0) write$nbd(r2, &(0x7f0000000240)={0x67446698, 0x0, 0x3, 0x1, 0x4, "1701f7c20ca19d8e74ee1e943d5e3e3d716a834b7cebad20e302764770b508e972e502a7b757b8cce30adba102952c1f413a1260e91e3c7acde5f9a9ccb577b5636ea43202a495c95fa17c4b29d1208b38843e3247e1ea4ff5379570"}, 0x6c) connect$vsock_dgram(r5, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1004000000016) [ 371.372166] audit: type=1800 audit(1539434072.050:213): pid=12042 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16528 res=0 [ 371.396344] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:32 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 371.440218] EXT4-fs (sda1): Cannot specify journal on remount 12:34:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000200)=ANY=[@ANYBLOB='\a\x00\x00\x00\f\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000000)) setxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.SMACK64\x00', &(0x7f00000001c0)='wlan1lomime_typeppp1)}\x00', 0x17, 0x1) 12:34:32 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00ffffffff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 12:34:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x81, 0x4000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000040)={0x9, 0x7, 0x8, 0x6, '\x00', 0x9}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) [ 371.508204] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 371.643706] audit: type=1800 audit(1539434072.320:214): pid=12063 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16526 res=0 [ 371.667421] EXT4-fs (sda1): Cannot specify journal on remount [ 371.676791] ================================================================== [ 371.684454] BUG: KASAN: use-after-free in vhost_work_queue+0xc3/0xe0 [ 371.684474] Read of size 8 at addr ffff8801809222e8 by task syz-executor5/12059 [ 371.698403] [ 371.698422] CPU: 1 PID: 12059 Comm: syz-executor5 Not tainted 4.19.0-rc7+ #58 [ 371.698431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.698438] Call Trace: [ 371.698462] dump_stack+0x1c4/0x2b4 [ 371.698486] ? dump_stack_print_info.cold.2+0x52/0x52 [ 371.698500] ? printk+0xa7/0xcf [ 371.698516] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 371.698543] print_address_description.cold.8+0x9/0x1ff [ 371.741556] kasan_report.cold.9+0x242/0x309 [ 371.745985] ? vhost_work_queue+0xc3/0xe0 [ 371.750155] __asan_report_load8_noabort+0x14/0x20 [ 371.755108] vhost_work_queue+0xc3/0xe0 [ 371.759107] vhost_transport_send_pkt+0x28a/0x380 [ 371.763976] ? vhost_vsock_dev_open+0x5a0/0x5a0 [ 371.768672] virtio_transport_send_pkt_info+0x31d/0x460 [ 371.774056] virtio_transport_connect+0x17c/0x220 [ 371.778921] ? virtio_transport_send_pkt_info+0x460/0x460 [ 371.784474] ? vsock_auto_bind+0xa9/0xe0 [ 371.788560] ? __local_bh_enable_ip+0x160/0x260 [ 371.793263] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 371.798823] vsock_stream_connect+0x4ed/0xe40 [ 371.803343] ? vsock_dgram_connect+0x500/0x500 [ 371.807940] ? lock_downgrade+0x900/0x900 [ 371.812106] ? lock_release+0x970/0x970 [ 371.816100] ? arch_local_save_flags+0x40/0x40 [ 371.820701] ? finish_wait+0x430/0x430 [ 371.824627] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 371.829839] ? smack_socket_connect+0x13f/0x1c0 [ 371.834530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 371.840084] ? security_socket_connect+0x94/0xc0 [ 371.844867] __sys_connect+0x37d/0x4c0 [ 371.848783] ? __ia32_sys_accept+0xb0/0xb0 [ 371.853037] ? kasan_check_read+0x11/0x20 [ 371.857204] ? _copy_to_user+0xc8/0x110 [ 371.861370] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 371.866936] ? put_timespec64+0x10f/0x1b0 [ 371.871111] ? do_syscall_64+0x9a/0x820 [ 371.875109] ? do_syscall_64+0x9a/0x820 [ 371.879104] ? lockdep_hardirqs_on+0x421/0x5c0 [ 371.883706] ? trace_hardirqs_on+0xbd/0x310 [ 371.888047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 371.893620] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.899007] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 371.904482] __x64_sys_connect+0x73/0xb0 [ 371.908567] do_syscall_64+0x1b9/0x820 [ 371.912477] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 371.917864] ? syscall_return_slowpath+0x5e0/0x5e0 [ 371.922816] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.927684] ? trace_hardirqs_on_caller+0x310/0x310 [ 371.932721] ? prepare_exit_to_usermode+0x291/0x3b0 [ 371.937762] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.942638] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.947844] RIP: 0033:0x457569 [ 371.951055] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 371.969967] RSP: 002b:00007fecbda0dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 371.977699] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 371.984978] RDX: 0000000000000010 RSI: 0000000020000200 RDI: 0000000000000006 [ 371.992259] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 371.999537] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fecbda0e6d4 [ 372.006836] R13: 00000000004bdb06 R14: 00000000004cc658 R15: 00000000ffffffff [ 372.014138] [ 372.015773] Allocated by task 12053: [ 372.019506] save_stack+0x43/0xd0 [ 372.022984] kasan_kmalloc+0xc7/0xe0 [ 372.026718] __kmalloc_node+0x47/0x70 [ 372.030539] kvmalloc_node+0xb9/0xf0 [ 372.034278] vhost_vsock_dev_open+0xa2/0x5a0 [ 372.038777] misc_open+0x3ca/0x560 [ 372.042348] chrdev_open+0x25a/0x710 [ 372.042363] do_dentry_open+0x499/0x1250 [ 372.042377] vfs_open+0xa0/0xd0 [ 372.042392] path_openat+0x12bf/0x5160 [ 372.042405] do_filp_open+0x255/0x380 [ 372.042418] do_sys_open+0x568/0x700 [ 372.042437] __x64_sys_openat+0x9d/0x100 [ 372.050217] do_syscall_64+0x1b9/0x820 [ 372.050234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.050239] [ 372.050247] Freed by task 12050: [ 372.050260] save_stack+0x43/0xd0 [ 372.050273] __kasan_slab_free+0x102/0x150 [ 372.050286] kasan_slab_free+0xe/0x10 [ 372.050299] kfree+0xcf/0x230 [ 372.050314] kvfree+0x61/0x70 [ 372.050333] vhost_vsock_dev_release+0x4f4/0x720 [ 372.105521] __fput+0x385/0xa30 [ 372.108821] ____fput+0x15/0x20 [ 372.112112] task_work_run+0x1e8/0x2a0 [ 372.116014] exit_to_usermode_loop+0x318/0x380 [ 372.120615] do_syscall_64+0x6be/0x820 [ 372.124519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.129713] [ 372.131355] The buggy address belongs to the object at ffff880180922240 [ 372.131355] which belongs to the cache kmalloc-65536 of size 65536 [ 372.144374] The buggy address is located 168 bytes inside of [ 372.144374] 65536-byte region [ffff880180922240, ffff880180932240) [ 372.156437] The buggy address belongs to the page: [ 372.161381] page:ffffea0006024800 count:1 mapcount:0 mapping:ffff8801da802500 index:0x0 compound_mapcount: 0 [ 372.171367] flags: 0x2fffc0000008100(slab|head) [ 372.176057] raw: 02fffc0000008100 ffffea00061d1008 ffffea000600f008 ffff8801da802500 [ 372.183957] raw: 0000000000000000 ffff880180922240 0000000100000001 0000000000000000 [ 372.191841] page dumped because: kasan: bad access detected [ 372.197554] [ 372.199193] Memory state around the buggy address: [ 372.204132] ffff880180922180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 372.211507] ffff880180922200: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 372.218878] >ffff880180922280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 372.226243] ^ [ 372.233005] ffff880180922300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 12:34:32 executing program 1: clone(0x200, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)="e91f7189591e9233614b00", &(0x7f0000000140), &(0x7f0000001580)) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000400), &(0x7f0000000b40)) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000003c0)) 12:34:32 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) 12:34:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) setsockopt(r0, 0xff2c, 0x9, &(0x7f0000000000)="e40ff87902918fa93aeddb2a920e23a460f49c873c754b66aa61614c41d077b5b4434544f059744fee488cbc3a69a93260b54b51a899c14a57f1acbbda8a19a03337778f116f2aec4e93a2e193f9fa8fe65302d7ad4cff27e5caa5c57a8579e4aeb264f9f9b4108d475dff433770f44debc36f7654318148a259706912bc8064011fced76134f1556f20c4c9192da30a4c6f6103c71b13b0ed9b9675ddf441d19aaad12d16b6a8f38494ab25c428587a5526ffdc78bb6af176", 0xb9) [ 372.240377] ffff880180922380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 372.247739] ================================================================== [ 372.255106] Disabling lock debugging due to kernel taint 12:34:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="706167656d617000c46465673a5dff2d69d7b5e06a108983b721f5915719b4d6b4f0f8a2201526067881fdf1e3db51d276bf066a4c08113f5954bfcf386001f9cc3f97a5a0a3eef721a3ba628bba650d2fbd605e2c4840cfa0e684e509cdc4204c1bc2f3fc32b8c9920512426c3bc7eba1c11b6307a47996b31b631d5f069950157c6681463dec68331f567f818e95f96a258c71eebe115e17dd84617cbe410821c0651d0fbbc9f2bfd9f33fafdb3b32c792b17b1fd21850fd925a63fd85729f8b32f6a9d7713d04f5cb3561d9789cf3e6c30bf2dbd096c43be91e457687e59495e6fd857b6b2460c89298b2c4b9a1ae2494") ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x2, 0xffffffffffffff64, 0x6}) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@local, 0x0}, &(0x7f0000000080)=0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000000c0)={@local, r1}, 0x14) bind$xdp(r0, &(0x7f0000000100)={0x2c, 0x4, r1, 0xc, r0}, 0x10) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 12:34:33 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00l\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x100020, &(0x7f00000002c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 372.288350] netlink: 'syz-executor2': attribute type 1 has an invalid length. 12:34:33 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 372.338808] Kernel panic - not syncing: panic_on_warn set ... [ 372.338808] [ 372.346232] CPU: 0 PID: 12059 Comm: syz-executor5 Tainted: G B 4.19.0-rc7+ #58 [ 372.354901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.363412] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 372.364265] Call Trace: [ 372.374142] dump_stack+0x1c4/0x2b4 [ 372.377789] ? dump_stack_print_info.cold.2+0x52/0x52 [ 372.382993] ? trace_hardirqs_on_thunk+0x1a/0x1c 12:34:33 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba204007f7e", 0x24}], 0x1}, 0x0) [ 372.387767] panic+0x238/0x4e7 [ 372.390972] ? add_taint.cold.5+0x16/0x16 [ 372.395135] ? preempt_schedule+0x4d/0x60 [ 372.399297] ? ___preempt_schedule+0x16/0x18 [ 372.403723] ? trace_hardirqs_on+0xb4/0x310 [ 372.408081] kasan_end_report+0x47/0x4f [ 372.412073] kasan_report.cold.9+0x76/0x309 [ 372.416415] ? vhost_work_queue+0xc3/0xe0 [ 372.420262] netlink: 'syz-executor2': attribute type 1 has an invalid length. [ 372.420576] __asan_report_load8_noabort+0x14/0x20 [ 372.420591] vhost_work_queue+0xc3/0xe0 [ 372.420612] vhost_transport_send_pkt+0x28a/0x380 [ 372.441633] ? vhost_vsock_dev_open+0x5a0/0x5a0 [ 372.442497] kobject: 'loop2' (000000001fa0fc7b): kobject_uevent_env [ 372.446323] virtio_transport_send_pkt_info+0x31d/0x460 [ 372.456900] kobject: 'loop2' (000000001fa0fc7b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 372.458095] virtio_transport_connect+0x17c/0x220 [ 372.468565] kobject: 'loop2' (000000001fa0fc7b): kobject_uevent_env [ 372.472367] ? virtio_transport_send_pkt_info+0x460/0x460 [ 372.472383] ? vsock_auto_bind+0xa9/0xe0 [ 372.472404] ? __local_bh_enable_ip+0x160/0x260 [ 372.472426] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 372.479400] kobject: 'loop2' (000000001fa0fc7b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 372.484399] vsock_stream_connect+0x4ed/0xe40 [ 372.484420] ? vsock_dgram_connect+0x500/0x500 [ 372.517166] ? lock_downgrade+0x900/0x900 [ 372.521330] ? lock_release+0x970/0x970 [ 372.525318] ? arch_local_save_flags+0x40/0x40 [ 372.529913] ? finish_wait+0x430/0x430 [ 372.533829] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 372.539035] ? smack_socket_connect+0x13f/0x1c0 [ 372.543728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 372.549279] ? security_socket_connect+0x94/0xc0 [ 372.554049] __sys_connect+0x37d/0x4c0 [ 372.557953] ? __ia32_sys_accept+0xb0/0xb0 [ 372.562201] ? kasan_check_read+0x11/0x20 [ 372.566359] ? _copy_to_user+0xc8/0x110 [ 372.570349] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 372.575899] ? put_timespec64+0x10f/0x1b0 [ 372.580064] ? do_syscall_64+0x9a/0x820 [ 372.584055] ? do_syscall_64+0x9a/0x820 [ 372.588048] ? lockdep_hardirqs_on+0x421/0x5c0 [ 372.592653] ? trace_hardirqs_on+0xbd/0x310 [ 372.596985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 372.602534] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.607915] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 372.613382] __x64_sys_connect+0x73/0xb0 [ 372.617457] do_syscall_64+0x1b9/0x820 [ 372.621361] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 372.626774] ? syscall_return_slowpath+0x5e0/0x5e0 [ 372.631720] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 372.636582] ? trace_hardirqs_on_caller+0x310/0x310 [ 372.641619] ? prepare_exit_to_usermode+0x291/0x3b0 [ 372.646653] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 372.651511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.656711] RIP: 0033:0x457569 [ 372.659920] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 372.678840] RSP: 002b:00007fecbda0dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 372.686562] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 372.693841] RDX: 0000000000000010 RSI: 0000000020000200 RDI: 0000000000000006 [ 372.701119] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 372.708395] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fecbda0e6d4 [ 372.715668] R13: 00000000004bdb06 R14: 00000000004cc658 R15: 00000000ffffffff [ 372.723841] Kernel Offset: disabled [ 372.727468] Rebooting in 86400 seconds..