Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 67.139472][ T24] kauditd_printk_skb: 4 callbacks suppressed [ 67.139483][ T24] audit: type=1800 audit(1562991983.528:33): pid=9221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 67.167653][ T24] audit: type=1800 audit(1562991983.528:34): pid=9221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 70.765880][ T24] audit: type=1400 audit(1562991987.148:35): avc: denied { map } for pid=9397 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.35' (ECDSA) to the list of known hosts. 2019/07/13 04:26:33 fuzzer started [ 77.277550][ T24] audit: type=1400 audit(1562991993.658:36): avc: denied { map } for pid=9406 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/07/13 04:26:36 dialing manager at 10.128.0.26:42173 2019/07/13 04:26:36 syscalls: 2488 2019/07/13 04:26:36 code coverage: enabled 2019/07/13 04:26:36 comparison tracing: enabled 2019/07/13 04:26:36 extra coverage: extra coverage is not supported by the kernel 2019/07/13 04:26:36 setuid sandbox: enabled 2019/07/13 04:26:36 namespace sandbox: enabled 2019/07/13 04:26:36 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/13 04:26:36 fault injection: enabled 2019/07/13 04:26:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/13 04:26:36 net packet injection: enabled 2019/07/13 04:26:36 net device setup: enabled 04:27:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) [ 104.332939][ T24] audit: type=1400 audit(1562992020.718:37): avc: denied { map } for pid=9422 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16222 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 104.431853][ T9423] IPVS: ftp: loaded support on port[0] = 21 04:27:00 executing program 1: write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@initdev, @in6=@remote}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, 0x0) sync() [ 104.553869][ T9423] chnl_net:caif_netlink_parms(): no params data found [ 104.642215][ T9423] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.658161][ T9423] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.666066][ T9423] device bridge_slave_0 entered promiscuous mode [ 104.676107][ T9423] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.683486][ T9423] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.691621][ T9423] device bridge_slave_1 entered promiscuous mode [ 104.714226][ T9426] IPVS: ftp: loaded support on port[0] = 21 [ 104.720753][ T9423] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 104.735883][ T9423] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 104.767854][ T9423] team0: Port device team_slave_0 added [ 104.780708][ T9423] team0: Port device team_slave_1 added 04:27:01 executing program 2: syz_emit_ethernet(0x2d2, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00143300fe0000000000000000000d00000000aafe8000000000000000000000000000aa00000005", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090580000"], 0x0) [ 104.852484][ T9423] device hsr_slave_0 entered promiscuous mode [ 104.908507][ T9423] device hsr_slave_1 entered promiscuous mode [ 104.993470][ T9428] IPVS: ftp: loaded support on port[0] = 21 [ 105.064099][ T9423] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.071895][ T9423] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.079965][ T9423] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.087052][ T9423] bridge0: port 1(bridge_slave_0) entered forwarding state 04:27:01 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) [ 105.115851][ T9426] chnl_net:caif_netlink_parms(): no params data found [ 105.299892][ T9426] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.306994][ T9426] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.319320][ T9426] device bridge_slave_0 entered promiscuous mode [ 105.354246][ T9428] chnl_net:caif_netlink_parms(): no params data found [ 105.375156][ T9423] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.385151][ T9426] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.394676][ T9426] bridge0: port 2(bridge_slave_1) entered disabled state 04:27:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 105.404844][ T9426] device bridge_slave_1 entered promiscuous mode [ 105.457505][ T9428] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.477721][ T9432] IPVS: ftp: loaded support on port[0] = 21 [ 105.484141][ T9428] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.509372][ T9428] device bridge_slave_0 entered promiscuous mode [ 105.550047][ T3010] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.569069][ T3010] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.589255][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 105.617021][ T9428] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.627640][ T9428] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.637040][ T9428] device bridge_slave_1 entered promiscuous mode [ 105.664511][ T9423] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.674498][ T9436] IPVS: ftp: loaded support on port[0] = 21 [ 105.681387][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.690470][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 04:27:02 executing program 5: creat(&(0x7f0000000140)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00'}, 0x10) [ 105.718349][ T9426] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 105.729084][ T9428] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 105.749644][ T9428] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 105.767852][ T9426] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 105.837168][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.850356][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.861421][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.868541][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.877580][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.889168][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.897460][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.904562][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.923518][ T9428] team0: Port device team_slave_0 added [ 105.934669][ T9428] team0: Port device team_slave_1 added [ 105.960360][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 105.968895][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 105.977438][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 105.986356][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 105.995209][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.006621][ T9426] team0: Port device team_slave_0 added [ 106.031076][ T9439] IPVS: ftp: loaded support on port[0] = 21 [ 106.041063][ T9426] team0: Port device team_slave_1 added [ 106.048495][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 106.057140][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.067523][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 106.076289][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.085634][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 106.094291][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.140308][ T9428] device hsr_slave_0 entered promiscuous mode [ 106.188498][ T9428] device hsr_slave_1 entered promiscuous mode [ 106.258223][ T9428] debugfs: Directory 'hsr0' with parent '/' already present! [ 106.270831][ T9423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 106.421431][ T9426] device hsr_slave_0 entered promiscuous mode [ 106.488555][ T9426] device hsr_slave_1 entered promiscuous mode [ 106.548226][ T9426] debugfs: Directory 'hsr0' with parent '/' already present! [ 106.589298][ T9423] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 106.602614][ T9436] chnl_net:caif_netlink_parms(): no params data found [ 106.686982][ T9432] chnl_net:caif_netlink_parms(): no params data found [ 106.746935][ T9432] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.754845][ T9432] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.763101][ T9432] device bridge_slave_0 entered promiscuous mode [ 106.771666][ T9432] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.779125][ T9432] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.786748][ T9432] device bridge_slave_1 entered promiscuous mode [ 106.793991][ T9436] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.801109][ T24] audit: type=1400 audit(1562992023.178:38): avc: denied { associate } for pid=9423 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 106.825619][ T9436] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.834452][ T9436] device bridge_slave_0 entered promiscuous mode [ 106.843078][ T9436] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.850691][ T9436] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.858974][ T9436] device bridge_slave_1 entered promiscuous mode [ 106.897841][ T9439] chnl_net:caif_netlink_parms(): no params data found [ 106.976841][ T9432] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 107.000880][ T9432] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 107.024729][ T9439] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.032252][ T9439] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.041388][ T9439] device bridge_slave_0 entered promiscuous mode [ 107.051838][ T9436] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 04:27:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) [ 107.093980][ T9436] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 107.108311][ T9439] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.115401][ T9439] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.137394][ T9439] device bridge_slave_1 entered promiscuous mode [ 107.183495][ T9432] team0: Port device team_slave_0 added [ 107.199881][ T9426] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.217823][ T9436] team0: Port device team_slave_0 added 04:27:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) [ 107.232902][ T9436] team0: Port device team_slave_1 added [ 107.249181][ T9432] team0: Port device team_slave_1 added [ 107.268612][ T9428] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.295776][ T9426] 8021q: adding VLAN 0 to HW filter on device team0 [ 107.332068][ T9439] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 04:27:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) [ 107.349278][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.357124][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.421141][ T9432] device hsr_slave_0 entered promiscuous mode [ 107.458495][ T9432] device hsr_slave_1 entered promiscuous mode 04:27:03 executing program 0: getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) [ 107.498195][ T9432] debugfs: Directory 'hsr0' with parent '/' already present! [ 107.507566][ T9439] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 04:27:03 executing program 0: getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) [ 107.539012][ T9439] team0: Port device team_slave_0 added [ 107.573356][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 04:27:04 executing program 0: getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) [ 107.594026][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.613995][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.621141][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state 04:27:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) [ 107.646720][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.662393][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.673449][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.680660][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.704801][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.750960][ T9439] team0: Port device team_slave_1 added [ 107.841313][ T9436] device hsr_slave_0 entered promiscuous mode [ 107.898669][ T9436] device hsr_slave_1 entered promiscuous mode [ 107.938257][ T9436] debugfs: Directory 'hsr0' with parent '/' already present! [ 107.945929][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 107.954203][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.962872][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 107.971611][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 107.980607][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 107.989283][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 108.004152][ T9428] 8021q: adding VLAN 0 to HW filter on device team0 [ 108.033899][ T9426] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 108.046370][ T9426] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 108.058574][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 108.066399][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 108.074103][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.081796][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 108.090374][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.098767][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 108.106911][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.116000][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 108.128539][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 108.137100][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.146304][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.153415][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.194846][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 108.202823][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 108.211541][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.220704][ T9433] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.227750][ T9433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.235946][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 108.244560][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 108.253507][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 108.262227][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 108.270551][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 108.279222][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 108.287448][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 108.295752][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.304099][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 108.312492][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.321657][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 108.360990][ T9439] device hsr_slave_0 entered promiscuous mode [ 108.418522][ T9439] device hsr_slave_1 entered promiscuous mode [ 108.458379][ T9439] debugfs: Directory 'hsr0' with parent '/' already present! [ 108.480694][ T9432] 8021q: adding VLAN 0 to HW filter on device bond0 [ 108.489755][ T9428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 108.516568][ T9426] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 108.559403][ T9428] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 108.579027][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 108.587299][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.597413][ T9432] 8021q: adding VLAN 0 to HW filter on device team0 [ 108.642872][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 108.652006][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.672964][ T3010] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.680235][ T3010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.688663][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 108.725094][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 108.734115][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.744297][ T3010] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.751422][ T3010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.759682][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 108.771721][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 108.780468][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 108.789156][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 108.797408][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 108.806101][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 108.815217][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 108.823586][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.832424][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 108.843536][ T9432] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 108.856062][ T9432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 108.870764][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 108.880806][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.932462][ T9436] 8021q: adding VLAN 0 to HW filter on device bond0 [ 108.957475][ T9439] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.033421][ T9436] 8021q: adding VLAN 0 to HW filter on device team0 [ 109.041032][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.066514][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.081701][ T9432] 8021q: adding VLAN 0 to HW filter on device batadv0 04:27:05 executing program 1: write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@initdev, @in6=@remote}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, 0x0) sync() 04:27:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) [ 109.106053][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.130405][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.139012][ T9433] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.146071][ T9433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.166610][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.185464][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.199744][ T9433] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.206829][ T9433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.222234][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 109.232226][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 109.242511][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 109.269396][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.309269][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.330205][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 109.343108][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 109.354580][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 109.366832][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 109.375869][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.384213][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.393798][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 109.402128][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.410812][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 109.424158][ T9436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 109.435195][ T9439] 8021q: adding VLAN 0 to HW filter on device team0 [ 109.472149][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.490473][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.505091][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.512249][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.521105][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.530508][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.539136][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.546225][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.554503][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 109.576192][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 109.592288][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 109.604887][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 109.625566][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 109.634200][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 109.649164][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 109.664251][ T9436] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 109.686233][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 109.711435][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.735559][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.750139][ T9439] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 109.763526][ T9439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 109.784442][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 109.794104][ T9433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.867070][ T9439] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 110.080760][ T9515] EXT4-fs (loop4): fragment/cluster size (2048) != block size (4096) 04:27:06 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:06 executing program 2: syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x4002) 04:27:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) 04:27:06 executing program 1: 04:27:06 executing program 5: 04:27:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:27:06 executing program 1: 04:27:06 executing program 2: 04:27:06 executing program 5: 04:27:06 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) [ 110.482078][ T9532] EXT4-fs (loop4): fragment/cluster size (2048) != block size (4096) 04:27:06 executing program 1: 04:27:07 executing program 2: 04:27:07 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:07 executing program 5: 04:27:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:27:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) 04:27:07 executing program 1: 04:27:07 executing program 2: 04:27:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) [ 111.184162][ T9565] EXT4-fs (loop4): fragment/cluster size (2048) != block size (4096) 04:27:07 executing program 2: 04:27:07 executing program 5: 04:27:07 executing program 1: ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) sync() 04:27:07 executing program 5: mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2) 04:27:07 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), &(0x7f0000014e40)=0x14) 04:27:08 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x0, 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) 04:27:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:27:08 executing program 1: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'btrfs.', '^\x00'}, 0x0, 0x0) 04:27:08 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000100), 0x4) socket$tipc(0x1e, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) 04:27:08 executing program 2: rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f00000002c0)={0x0, 0x989680}, 0x8) [ 111.909219][ T24] audit: type=1400 audit(1562992028.298:39): avc: denied { create } for pid=9596 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:27:08 executing program 2: rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f00000002c0)={0x0, 0x989680}, 0x8) 04:27:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x0, 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) 04:27:08 executing program 1: fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f0000000080)='/dev/ptmx\x00', 0xa, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000100)={0x4, 0x0, 0x0, 0x2, 0x8001, {0x1}}) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f00000000c0)=0x1) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) [ 112.014708][ T9600] EXT4-fs (loop4): fragment/cluster size (2048) != block size (4096) [ 112.015899][ T24] audit: type=1400 audit(1562992028.298:40): avc: denied { write } for pid=9596 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:27:08 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000100), 0x4) socket$tipc(0x1e, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) 04:27:08 executing program 2: rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f00000002c0)={0x0, 0x989680}, 0x8) [ 112.149619][ C0] hrtimer: interrupt took 36969 ns 04:27:08 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x0, 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) [ 112.222850][ T24] audit: type=1400 audit(1562992028.298:41): avc: denied { read } for pid=9596 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:27:09 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:27:09 executing program 1: fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f0000000080)='/dev/ptmx\x00', 0xa, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000100)={0x4, 0x0, 0x0, 0x2, 0x8001, {0x1}}) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f00000000c0)=0x1) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) 04:27:09 executing program 2: rt_sigtimedwait(&(0x7f0000000200), 0x0, &(0x7f00000002c0)={0x0, 0x989680}, 0x8) 04:27:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) 04:27:09 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000100), 0x4) socket$tipc(0x1e, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) 04:27:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) 04:27:09 executing program 2: rt_sigtimedwait(0x0, 0x0, &(0x7f00000002c0)={0x0, 0x989680}, 0x0) 04:27:09 executing program 1: fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f0000000080)='/dev/ptmx\x00', 0xa, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000100)={0x4, 0x0, 0x0, 0x2, 0x8001, {0x1}}) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f00000000c0)=0x1) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) 04:27:09 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000100), 0x4) socket$tipc(0x1e, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) 04:27:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:27:09 executing program 2: rt_sigtimedwait(0x0, 0x0, &(0x7f00000002c0)={0x0, 0x989680}, 0x0) 04:27:09 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:09 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) 04:27:09 executing program 1: fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f0000000080)='/dev/ptmx\x00', 0xa, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000100)={0x4, 0x0, 0x0, 0x2, 0x8001, {0x1}}) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f00000000c0)=0x1) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) 04:27:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:27:09 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000100), 0x4) socket$tipc(0x1e, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) 04:27:09 executing program 2: rt_sigtimedwait(0x0, 0x0, &(0x7f00000002c0)={0x0, 0x989680}, 0x0) 04:27:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@iocharset={'iocharset', 0x3d, 'macgreek'}}, {@iocharset={'iocharset', 0x3d, 'cp869'}}]}) 04:27:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:27:10 executing program 2: rt_sigtimedwait(&(0x7f0000000200), 0x0, 0x0, 0x8) 04:27:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) 04:27:10 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000100), 0x4) socket$tipc(0x1e, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) [ 113.880683][ T9699] FAT-fs (loop1): bogus number of reserved sectors 04:27:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) [ 113.925817][ T9699] FAT-fs (loop1): Can't find a valid FAT filesystem [ 114.062265][ T9699] FAT-fs (loop1): bogus number of reserved sectors [ 114.078311][ T9699] FAT-fs (loop1): Can't find a valid FAT filesystem 04:27:10 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:27:10 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="00062bbd7000fbdbdf250800000004000500380002000800010009000000080002000600000008000200fffeffff080001000a000000080002000800000004000400080002000200000044000900080002007f000000080002000000000008000100b23100000800010001000000080002000300000008000100010000800800010020000000080001002000000024000100100001007564703a73797a3200000000080003000600000008000300010000001c0009000800010004000000080002000100008008000200070000000c000900080001000300000034000100180001006574683a76657468315f746f5f68737200000000180001006574683a7465616d5f736c6176655f310000000060000500040002001c0002000800030001000100080001000b00000008000400020000003c00020008000400090000000800020008000000080003000104000008000400b53c000008000200080000000800020001800000080003007b4b0000"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000100), 0x4) socket$tipc(0x1e, 0x2, 0x0) 04:27:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) 04:27:10 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) 04:27:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:27:10 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000100), 0x4) [ 114.525085][ T24] audit: type=1326 audit(1562992030.898:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9742 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c65a code=0x0 04:27:11 executing program 2: rt_sigtimedwait(&(0x7f0000000200), 0x0, 0x0, 0x8) 04:27:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:27:11 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 114.871407][ T9761] EXT4-fs (loop4): Can't read superblock on 2nd try 04:27:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:27:11 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:11 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) [ 115.100056][ T9772] EXT4-fs (loop4): Can't read superblock on 2nd try 04:27:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:27:11 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="00062bbd7000fbdbdf250800000004000500380002000800010009000000080002000600000008000200fffeffff080001000a000000080002000800000004000400080002000200000044000900080002007f000000080002000000000008000100b23100000800010001000000080002000300000008000100010000800800010020000000080001002000000024000100100001007564703a73797a3200000000080003000600000008000300010000001c0009000800010004000000080002000100008008000200070000000c000900080001000300000034000100180001006574683a76657468315f746f5f68737200000000180001006574683a7465616d5f736c6176655f310000000060000500040002001c0002000800030001000100080001000b00000008000400020000003c00020008000400090000000800020008000000080003000104000008000400b53c000008000200080000000800020001800000080003007b4b0000"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() [ 115.343878][ T9781] EXT4-fs (loop4): Can't read superblock on 2nd try 04:27:12 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) 04:27:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x0, 0x0) 04:27:12 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) sched_yield() 04:27:12 executing program 2: rt_sigtimedwait(&(0x7f0000000200), 0x0, 0x0, 0x8) 04:27:12 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) [ 116.051490][ T9808] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 116.059165][ T24] audit: type=1326 audit(1562992032.448:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9804 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c65a code=0x0 04:27:12 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) sched_yield() 04:27:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x0, 0x0) 04:27:12 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) sched_yield() [ 116.341869][ T9820] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:12 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sched_yield() 04:27:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x0, 0x0) 04:27:12 executing program 5: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) sched_yield() [ 116.559378][ T9830] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:13 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 04:27:13 executing program 5: mq_notify(0xffffffffffffffff, 0x0) sched_yield() 04:27:13 executing program 2: mmap(&(0x7f0000147000/0x7000)=nil, 0x7000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) 04:27:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) 04:27:13 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:13 executing program 2: mmap(&(0x7f0000147000/0x7000)=nil, 0x7000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) [ 117.109992][ T24] audit: type=1326 audit(1562992033.498:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9845 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c65a code=0x0 04:27:13 executing program 5: sched_yield() [ 117.226973][ T9852] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:13 executing program 2: mmap(&(0x7f0000147000/0x7000)=nil, 0x7000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) 04:27:13 executing program 5: sched_rr_get_interval(0x0, &(0x7f0000000500)) 04:27:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 04:27:13 executing program 2: mmap(&(0x7f0000147000/0x7000)=nil, 0x7000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) [ 117.626717][ T9877] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:14 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:14 executing program 5: sched_rr_get_interval(0x0, &(0x7f0000000500)) 04:27:14 executing program 2: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) 04:27:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 04:27:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000014e00), 0x0) 04:27:14 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:14 executing program 2: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) [ 118.151710][ T9896] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, 0x0, 0x0) 04:27:14 executing program 2: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) 04:27:14 executing program 5: sched_rr_get_interval(0x0, &(0x7f0000000500)) 04:27:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x0, 0x0) 04:27:15 executing program 2: mmap(&(0x7f0000147000/0x7000)=nil, 0x7000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) [ 118.664697][ T9918] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:15 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) 04:27:15 executing program 5: sched_rr_get_interval(0x0, &(0x7f0000000500)) 04:27:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x0, 0x0) 04:27:15 executing program 0: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x0, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8", 0x0, 0x1f}) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:15 executing program 2: mmap(&(0x7f0000147000/0x7000)=nil, 0x7000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) 04:27:15 executing program 3: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:15 executing program 3: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:15 executing program 0: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x0, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8", 0x0, 0x1f}) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:15 executing program 5: sched_rr_get_interval(0x0, 0x0) [ 119.158141][ T9940] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:15 executing program 2: mmap(&(0x7f0000147000/0x7000)=nil, 0x7000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) 04:27:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x0, 0x0) 04:27:15 executing program 5: sched_rr_get_interval(0x0, 0x0) [ 119.498215][ T9961] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:16 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) 04:27:16 executing program 3: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:16 executing program 0: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x0, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8", 0x0, 0x1f}) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:16 executing program 2: mmap(&(0x7f0000147000/0x7000)=nil, 0x7000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) 04:27:16 executing program 5: sched_rr_get_interval(0x0, 0x0) 04:27:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x0, 0x0) 04:27:16 executing program 5: 04:27:16 executing program 2: mmap(&(0x7f0000147000/0x7000)=nil, 0x7000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) [ 119.893990][ T9980] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:16 executing program 0: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x0, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8", 0x0, 0x1f}) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:16 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x0, 0x0) 04:27:16 executing program 5: [ 120.180768][T10000] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:16 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) 04:27:16 executing program 0: ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:16 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:16 executing program 2: mmap(&(0x7f0000147000/0x7000)=nil, 0x7000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) 04:27:16 executing program 5: 04:27:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x0, 0x0) 04:27:16 executing program 5: 04:27:16 executing program 2: mmap(&(0x7f0000147000/0x7000)=nil, 0x7000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 04:27:17 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) [ 120.648302][T10016] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:17 executing program 5: mmap(&(0x7f0000bd6000/0x3000)=nil, 0x3000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) 04:27:17 executing program 2: mmap(&(0x7f0000147000/0x7000)=nil, 0x7000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 04:27:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001", 0x1d, 0x400}], 0x0, 0x0) [ 120.955268][T10040] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:17 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:17 executing program 0: ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:17 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:17 executing program 2: mmap(&(0x7f0000147000/0x7000)=nil, 0x7000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 04:27:17 executing program 5: semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000001400)) 04:27:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001", 0x1d, 0x400}], 0x0, 0x0) 04:27:17 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:17 executing program 5: 04:27:17 executing program 2: [ 121.447884][T10057] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:18 executing program 5: 04:27:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001", 0x1d, 0x400}], 0x0, 0x0) 04:27:18 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) [ 121.795770][T10077] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:18 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:18 executing program 0: ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:18 executing program 2: 04:27:18 executing program 5: 04:27:18 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000", 0x2c, 0x400}], 0x0, 0x0) 04:27:18 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:18 executing program 5: 04:27:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) [ 122.353610][T10100] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000", 0x2c, 0x400}], 0x0, 0x0) 04:27:18 executing program 5: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x0, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) [ 122.537644][ T24] audit: type=1400 audit(1562992038.918:45): avc: denied { prog_load } for pid=10106 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 04:27:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) [ 122.688157][T10115] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:19 executing program 5: 04:27:19 executing program 0: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, 0x0) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000", 0x2c, 0x400}], 0x0, 0x0) 04:27:19 executing program 5: 04:27:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:19 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:19 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:19 executing program 5: 04:27:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) [ 123.275389][T10138] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x0, 0x0) 04:27:19 executing program 5: 04:27:19 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 123.551426][T10152] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:20 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:27:20 executing program 0: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, 0x0) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:20 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 04:27:20 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:27:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x0, 0x0) 04:27:20 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:20 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:20 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) [ 124.181985][T10177] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x0, 0x0) 04:27:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:20 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) [ 124.456963][T10192] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x0, 0x0) [ 124.698094][T10204] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:21 executing program 0: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, 0x0) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:21 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 04:27:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x0, 0x0) 04:27:21 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) [ 125.054583][T10218] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:21 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:21 executing program 5: timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 04:27:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x0, 0x0, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x0, 0x0) 04:27:21 executing program 5: timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 04:27:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x0, 0x0, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:21 executing program 5: timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) [ 125.412227][T10238] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:22 executing program 0: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x0, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x0, 0x0) 04:27:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x0, 0x0, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:22 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 04:27:22 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) [ 126.028386][T10260] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:22 executing program 1: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x0, 0x0) 04:27:22 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 04:27:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:22 executing program 0: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x0, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 04:27:22 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) [ 126.363662][T10276] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:22 executing program 1: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x0, 0x0) 04:27:23 executing program 1: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:23 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) [ 126.611521][T10294] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:23 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) 04:27:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x0, 0x0) 04:27:23 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) 04:27:23 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) [ 127.040661][T10316] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:23 executing program 0: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x0, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 04:27:23 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:23 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) 04:27:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x0, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x0, 0x0) 04:27:23 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x0, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) [ 127.356114][T10334] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:24 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0), 0x0) 04:27:24 executing program 5: syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$video(0x0, 0x0, 0x0) 04:27:24 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x0, 0x0) 04:27:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x0, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) [ 127.845809][T10356] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:27:24 executing program 0: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x0, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 04:27:24 executing program 5: ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) fchdir(0xffffffffffffffff) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x1000, 0x4) readlink(0x0, &(0x7f0000000240)=""/142, 0xfffffffffffffe13) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12b, &(0x7f0000000400)=0x1000, 0x4) unshare(0x60000000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000100)=""/194) 04:27:24 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:24 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x4002) 04:27:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x0, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x0, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:24 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) [ 128.415818][T10369] IPVS: ftp: loaded support on port[0] = 21 04:27:25 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0), 0x0) 04:27:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x0, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:25 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp%E4Xo\x91\xe4\xaap\x17\x86\x94\xf4\xf9\xbfhS^\x12\"\xd5\xff|\xc9V^\xbd\x06\x86\x14\xb9\n\x1b2\xfd\xe1\xc6+\xd6?\x0fK\xd0\xea\xd0\xf0\xd1I4M\xdb\xb4\x06\xf4O\x00\x00\x00\x00\x00\x00\x00\x00\x944?\xfcq\xe1\xc8\xfa\xf7\x05\x00\x00\x00/\xedM\xc4\x94v\v\xa2\xb5\xd8\x96MG\xd6P\r<\xc2k\xb6\xd8c\x8eu\xfa\xeb\tt/\xb3\x90\x1c\x97\xd9\x98b\xcd\xf4$\xcd~\v\xd8\x90\xf4\x9c\xa9#i\xa3\x03\x1d>\x82\x94\x89\xbc\xa2\xcfi\xff\xff}\xae{\v\xa2\xfeH\x9a\xb5TLqk') 04:27:25 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x0, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) [ 129.082322][T10378] IPVS: ftp: loaded support on port[0] = 21 04:27:27 executing program 5: ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) fchdir(0xffffffffffffffff) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x1000, 0x4) readlink(0x0, &(0x7f0000000240)=""/142, 0xfffffffffffffe13) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12b, &(0x7f0000000400)=0x1000, 0x4) unshare(0x60000000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000100)=""/194) 04:27:27 executing program 4: request_key(&(0x7f0000000340)='.request_key_auth\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f0000000080)='/dev/ptmx\x00', 0xa, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000240)=""/66) epoll_create1(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000040)={0x100000001, 0x0, @value=0xf49}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) clone(0x1fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000100)={0x4, 0x0, 0x0, 0x2, 0x8001, {0x1, 0x150e4aa1}}) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f00000000c0)=0x1) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000440)="3058020af10cb8b56c9606987fe808d672bd136840d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a939b4fd0072693a46c08df6616dd21be3453ecf", 0x42, 0xfffffffffffffffd) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) 04:27:27 executing program 0: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x0, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 04:27:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x0, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:27 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:27 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0), 0x0) 04:27:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x0, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:28 executing program 4: request_key(&(0x7f0000000340)='.request_key_auth\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f0000000080)='/dev/ptmx\x00', 0xa, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000240)=""/66) epoll_create1(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000040)={0x100000001, 0x0, @value=0xf49}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) clone(0x1fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000100)={0x4, 0x0, 0x0, 0x2, 0x8001, {0x1, 0x150e4aa1}}) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f00000000c0)=0x1) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000440)="3058020af10cb8b56c9606987fe808d672bd136840d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a939b4fd0072693a46c08df6616dd21be3453ecf", 0x42, 0xfffffffffffffffd) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) [ 131.606650][T10420] IPVS: ftp: loaded support on port[0] = 21 04:27:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:28 executing program 4: request_key(&(0x7f0000000340)='.request_key_auth\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f0000000080)='/dev/ptmx\x00', 0xa, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000240)=""/66) epoll_create1(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000040)={0x100000001, 0x0, @value=0xf49}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) clone(0x1fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000100)={0x4, 0x0, 0x0, 0x2, 0x8001, {0x1, 0x150e4aa1}}) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f00000000c0)=0x1) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000440)="3058020af10cb8b56c9606987fe808d672bd136840d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a939b4fd0072693a46c08df6616dd21be3453ecf", 0x42, 0xfffffffffffffffd) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) 04:27:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:28 executing program 4: request_key(&(0x7f0000000340)='.request_key_auth\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f0000000080)='/dev/ptmx\x00', 0xa, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000240)=""/66) epoll_create1(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000040)={0x100000001, 0x0, @value=0xf49}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) clone(0x1fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000100)={0x4, 0x0, 0x0, 0x2, 0x8001, {0x1, 0x150e4aa1}}) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f00000000c0)=0x1) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000440)="3058020af10cb8b56c9606987fe808d672bd136840d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a939b4fd0072693a46c08df6616dd21be3453ecf", 0x42, 0xfffffffffffffffd) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) 04:27:28 executing program 5: ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) fchdir(0xffffffffffffffff) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x1000, 0x4) readlink(0x0, &(0x7f0000000240)=""/142, 0xfffffffffffffe13) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12b, &(0x7f0000000400)=0x1000, 0x4) unshare(0x60000000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000100)=""/194) 04:27:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:28 executing program 0: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x0, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 04:27:28 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:28 executing program 4: ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) fchdir(0xffffffffffffffff) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x1000, 0x4) readlink(0x0, &(0x7f0000000240)=""/142, 0xfffffffffffffe13) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12b, &(0x7f0000000400)=0x1000, 0x4) unshare(0x60000000) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000100)=""/194) [ 132.614765][T10457] IPVS: ftp: loaded support on port[0] = 21 [ 132.788499][T10464] IPVS: ftp: loaded support on port[0] = 21 04:27:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:29 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) 04:27:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:29 executing program 0: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x0, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 04:27:29 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:32 executing program 5: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7, 0x3, 0x295}) 04:27:32 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000640)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) socket(0x3, 0x2, 0x0) 04:27:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:32 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) 04:27:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:32 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:32 executing program 5: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7, 0x3, 0x295}) 04:27:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:32 executing program 5: futex(&(0x7f0000000700), 0x8c, 0x1, 0x0, &(0x7f0000000780), 0x0) 04:27:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 04:27:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:33 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) 04:27:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:33 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x2000) 04:27:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 04:27:33 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:27:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xc}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 04:27:33 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:27:33 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:27:33 executing program 5: 04:27:33 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:27:34 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:27:34 executing program 2: 04:27:34 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:34 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 04:27:34 executing program 5: 04:27:34 executing program 3: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:34 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000014e00), 0x0) 04:27:34 executing program 5: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 04:27:34 executing program 3: 04:27:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:34 executing program 2: 04:27:34 executing program 5: 04:27:35 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:35 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) 04:27:35 executing program 2: symlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00') acct(&(0x7f0000000c40)='./file0\x00') 04:27:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:35 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x0, 0x0, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:35 executing program 2: symlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00') acct(&(0x7f0000000c40)='./file0\x00') 04:27:35 executing program 3: 04:27:35 executing program 3: 04:27:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:36 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x0, 0x0, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:36 executing program 2: symlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00') acct(&(0x7f0000000c40)='./file0\x00') 04:27:36 executing program 3: 04:27:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:36 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x0, 0x0, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:36 executing program 3: 04:27:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:36 executing program 2: symlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00') acct(&(0x7f0000000c40)='./file0\x00') 04:27:36 executing program 1: 04:27:37 executing program 1: 04:27:37 executing program 3: 04:27:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:37 executing program 2: acct(&(0x7f0000000c40)='./file0\x00') 04:27:37 executing program 3: 04:27:37 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:37 executing program 1: 04:27:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:37 executing program 2: acct(0x0) 04:27:37 executing program 3: 04:27:37 executing program 1: 04:27:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:37 executing program 2: acct(0x0) 04:27:37 executing program 3: 04:27:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x0, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:38 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 04:27:38 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) 04:27:38 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x0, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:38 executing program 2: acct(0x0) 04:27:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x0, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:38 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 04:27:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x0, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x0, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:38 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) [ 142.107705][T10742] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000000, 04:27:38 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 142.213974][T10758] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000000, 04:27:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x0, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:39 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:39 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:39 executing program 3: msync(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x5) 04:27:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x0, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x0, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:39 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 04:27:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x0, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:39 executing program 3: 04:27:39 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 142.915200][T10787] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000000, 04:27:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x0, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:39 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:39 executing program 3: [ 143.297864][T10807] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000000, 04:27:40 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x0, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:40 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 04:27:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:40 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:40 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 04:27:40 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 143.731959][T10825] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000000, 04:27:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x0, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:40 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x1, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:40 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:40 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:40 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 04:27:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:40 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x1, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:40 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:40 executing program 2: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 04:27:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:40 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x1, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:40 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:41 executing program 2: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 04:27:41 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 04:27:41 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x1, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:41 executing program 1: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:41 executing program 2: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 04:27:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:41 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:27:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:41 executing program 3: ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:41 executing program 1: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:42 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:42 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:27:42 executing program 1: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:42 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:27:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:42 executing program 1: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:42 executing program 3: ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:42 executing program 2: shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) 04:27:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:43 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:43 executing program 1: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 04:27:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0xb2b, 0x7f, 0x0, 0x9, 0x0, 0x7}, 0x1c) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) 04:27:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 04:27:43 executing program 1: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 04:27:43 executing program 2: pipe2(0x0, 0x2000000083fff) 04:27:43 executing program 3: ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 04:27:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 04:27:43 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:43 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000000280)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0}, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) 04:27:43 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 04:27:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 04:27:43 executing program 2: capget(&(0x7f0000000540)={0x19980330}, &(0x7f0000000580)) 04:27:43 executing program 4: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x19b4085471fc65b4) 04:27:44 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) 04:27:44 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) [ 147.686125][T11049] capability: warning: `syz-executor.2' uses 32-bit capabilities (legacy support in use) [ 147.872544][T11055] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000000, [ 148.017799][T11063] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000000, 04:27:44 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, 0x0) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:44 executing program 2: capget(&(0x7f0000000540)={0x19980330}, &(0x7f0000000580)) 04:27:44 executing program 4: openat$vicodec0(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/video36\x00', 0x2, 0x0) 04:27:44 executing program 5: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:44 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:44 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) 04:27:44 executing program 4: 04:27:44 executing program 2: capget(&(0x7f0000000540)={0x19980330}, &(0x7f0000000580)) 04:27:44 executing program 4: shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0) 04:27:44 executing program 2: capget(&(0x7f0000000540)={0x19980330}, &(0x7f0000000580)) 04:27:44 executing program 0: mkdir(&(0x7f0000000200)='./control\x00', 0x0) chmod(&(0x7f0000000040)='./control\x00', 0x0) 04:27:45 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:45 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, 0x0) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:45 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, 0x0) 04:27:45 executing program 5: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:45 executing program 2: capget(0x0, &(0x7f0000000580)) 04:27:45 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@link_local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "bd7344", 0x18, 0x0, 0x0, @rand_addr="649ddc6814121cfe9d23a09f6bc6768e", @rand_addr="cb1c80fcb8f08c1a3adbde9b6425c850", {[@hopopts], @icmpv6=@ni}}}}}, 0x0) 04:27:45 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:45 executing program 5: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:45 executing program 2: capget(0x0, &(0x7f0000000580)) 04:27:45 executing program 0: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) 04:27:45 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) [ 149.245347][T11122] EXT4-fs (sda1): re-mounted. Opts: [ 149.374004][T11132] EXT4-fs (sda1): re-mounted. Opts: 04:27:45 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:45 executing program 0: 04:27:46 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, 0x0) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:46 executing program 2: capget(0x0, &(0x7f0000000580)) 04:27:46 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, 0x0) 04:27:46 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:46 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:46 executing program 0: 04:27:46 executing program 2: capget(&(0x7f0000000540), &(0x7f0000000580)) 04:27:46 executing program 0: 04:27:46 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) [ 150.205195][T11161] EXT4-fs (sda1): re-mounted. Opts: 04:27:46 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:46 executing program 2: capget(&(0x7f0000000540), &(0x7f0000000580)) 04:27:46 executing program 4: 04:27:47 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x0, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:47 executing program 0: 04:27:47 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:47 executing program 2: capget(&(0x7f0000000540), &(0x7f0000000580)) 04:27:47 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:47 executing program 4: 04:27:47 executing program 0: 04:27:47 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:47 executing program 4: 04:27:47 executing program 2: capget(&(0x7f0000000540)={0x19980330}, 0x0) 04:27:47 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x0, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:47 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:47 executing program 4: 04:27:47 executing program 0: 04:27:47 executing program 2: capget(&(0x7f0000000540)={0x19980330}, 0x0) 04:27:47 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:47 executing program 4: 04:27:47 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x0, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:47 executing program 2: capget(&(0x7f0000000540)={0x19980330}, 0x0) 04:27:48 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:48 executing program 0: 04:27:48 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:48 executing program 4: 04:27:48 executing program 2: 04:27:48 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x1, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 04:27:48 executing program 0: 04:27:48 executing program 4: 04:27:48 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:48 executing program 2: 04:27:48 executing program 4: 04:27:48 executing program 0: 04:27:48 executing program 4: 04:27:48 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7, 0x0, 0x295}) 04:27:48 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:48 executing program 0: open_by_handle_at(0xffffffffffffffff, &(0x7f0000001840)={0x8}, 0x0) 04:27:48 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:49 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x1, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 04:27:49 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:27:49 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7, 0x0, 0x295}) 04:27:49 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:27:49 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:49 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7, 0x0, 0x295}) 04:27:49 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:27:49 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:49 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:49 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7, 0x0, 0x295}) 04:27:49 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, 0x0) 04:27:49 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 153.589382][T11354] EXT4-fs (sda1): re-mounted. Opts: 04:27:50 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x1, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 04:27:50 executing program 2: io_uring_setup(0x0, &(0x7f0000000840)={0x0, 0x0, 0x7, 0x0, 0x295}) 04:27:50 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, 0x0) [ 153.936625][T11369] EXT4-fs (sda1): re-mounted. Opts: 04:27:50 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:27:50 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:27:50 executing program 2: io_uring_setup(0x0, &(0x7f0000000840)={0x0, 0x0, 0x7, 0x0, 0x295}) 04:27:50 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, 0x0) 04:27:50 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:50 executing program 2: io_uring_setup(0x0, &(0x7f0000000840)={0x0, 0x0, 0x7, 0x0, 0x295}) [ 154.448932][T11389] EXT4-fs (sda1): re-mounted. Opts: 04:27:50 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)) 04:27:50 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 04:27:51 executing program 2: io_uring_setup(0x6b2, 0x0) [ 154.702067][T11403] EXT4-fs (sda1): re-mounted. Opts: 04:27:51 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x1, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 04:27:51 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)) 04:27:51 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') [ 155.067000][T11419] EXT4-fs (sda1): re-mounted. Opts: 04:27:51 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:27:51 executing program 2: io_uring_setup(0x6b2, 0x0) 04:27:51 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 04:27:51 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)) 04:27:51 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:51 executing program 2: io_uring_setup(0x6b2, 0x0) [ 155.535073][T11434] EXT4-fs (sda1): re-mounted. Opts: 04:27:51 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 04:27:52 executing program 1: rt_sigtimedwait(&(0x7f0000000200), 0x0, 0x0, 0x8) 04:27:52 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x295}) 04:27:52 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x1, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 04:27:52 executing program 4: mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 04:27:52 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x295}) 04:27:52 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:27:52 executing program 4: mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 04:27:52 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x295}) 04:27:52 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:52 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:27:52 executing program 4: mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 04:27:53 executing program 4: mkdir(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 04:27:53 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)) 04:27:53 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x1, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 04:27:53 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:27:53 executing program 4: mkdir(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') [ 156.949612][T11497] EXT4-fs (sda1): re-mounted. Opts: 04:27:53 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:27:53 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:27:53 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)) 04:27:53 executing program 4: mkdir(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 04:27:53 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:27:53 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, &(0x7f0000000140), &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:54 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(0x0, 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 04:27:54 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) [ 157.615877][T11526] EXT4-fs (sda1): re-mounted. Opts: 04:27:54 executing program 3: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000140)={0x1, "ebf922cefd0645e450e148d151627506b6c29eeeab4eb122f5fe28b3055ea3c8"}) ppoll(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) 04:27:54 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)) 04:27:54 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(0x0, 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 04:27:54 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) [ 158.007202][T11543] EXT4-fs (sda1): re-mounted. Opts: 04:27:54 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(0x0, 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 04:27:55 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:27:55 executing program 2: io_uring_setup(0x0, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:27:55 executing program 1: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:55 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(0x0, &(0x7f0000000140)='./file0/file1\x00') 04:27:55 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, &(0x7f0000000140), &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:55 executing program 2: io_uring_setup(0x0, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:27:55 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:27:55 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2001000, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:55 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(0x0, &(0x7f0000000140)='./file0/file1\x00') 04:27:55 executing program 2: io_uring_setup(0x0, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:27:55 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(0x0, &(0x7f0000000140)='./file0/file1\x00') 04:27:55 executing program 2: io_uring_setup(0x6b2, 0x0) 04:27:56 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:27:56 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x104830, &(0x7f0000000080)={[{@init_itable_val={'init_itable'}}]}) 04:27:56 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:27:56 executing program 2: io_uring_setup(0x6b2, 0x0) 04:27:56 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, &(0x7f0000000140), &(0x7f0000000000), &(0x7f00000001c0), 0x0) 04:27:56 executing program 2: io_uring_setup(0x6b2, 0x0) 04:27:56 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:27:56 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:27:56 executing program 3: acct(&(0x7f0000000c40)='./file0\x00') 04:27:56 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)) 04:27:56 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', 0x0) 04:27:56 executing program 3: acct(&(0x7f0000000c40)='./file0\x00') 04:27:57 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)) 04:27:57 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:27:57 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) 04:27:57 executing program 3: acct(&(0x7f0000000c40)='./file0\x00') 04:27:57 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:57 executing program 3: acct(0x0) 04:27:57 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:27:57 executing program 2: io_uring_setup(0x6b2, &(0x7f0000000840)) 04:27:57 executing program 3: acct(0x0) 04:27:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x0, 0x0) 04:27:57 executing program 3: acct(0x0) [ 161.474214][T11672] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 04:27:58 executing program 3: ppoll(&(0x7f0000000100)=[{}], 0x8c, 0x0, 0x0, 0x0) 04:27:58 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:58 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:27:58 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000014e00), 0x0) 04:27:58 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:58 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:58 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:58 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:59 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:59 executing program 3: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 162.703718][ T24] audit: type=1326 audit(1562992079.088:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=11702 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c65a code=0x0 04:27:59 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:27:59 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:27:59 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) [ 163.210383][T11724] EXT4-fs (loop3): Can't read superblock on 2nd try 04:27:59 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:27:59 executing program 4: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="00062bbd7000fbdbdf250800000004000500380002000800010009000000080002000600000008000200fffeffff080001000a000000080002000800000004000400080002000200000044000900080002007f000000080002000000000008000100b23100000800010001000000080002000300000008000100010000800800010020000000080001002000000024000100100001007564703a73797a3200000000080003000600000008000300010000001c0009000800010004000000080002000100008008000200070000000c000900080001000300000034000100180001006574683a76657468315f746f5f68737200000000180001006574683a7465616d5f736c6176655f310000000060000500040002001c0002000800030001000100080001000b00000008000400020000003c00020008000400090000000800020008000000080003000104000008000400b53c000008000200080000000800020001800000080003007b4b0000"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000100), 0x4) 04:27:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 163.576533][T11736] EXT4-fs (loop3): Can't read superblock on 2nd try 04:28:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:28:00 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:28:00 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:00 executing program 4: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000100), 0x4) socket$tipc(0x1e, 0x2, 0x0) 04:28:00 executing program 1: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000100), 0x4) socket$tipc(0x1e, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) 04:28:00 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:28:00 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) [ 163.934622][T11749] EXT4-fs (loop3): Can't read superblock on 2nd try 04:28:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:28:00 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:28:00 executing program 4: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000100), 0x4) socket$tipc(0x1e, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) 04:28:00 executing program 1: mq_notify(0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="68010000", @ANYRES16, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x810}, 0x200008c0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffefa) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000000000000, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_yield() syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x400, 0x20a001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000100), 0x4) socket$tipc(0x1e, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) 04:28:00 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:28:01 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:28:01 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) 04:28:01 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:01 executing program 4 (fault-call:0 fault-nth:0): acct(&(0x7f0000000c40)='./file0\x00') 04:28:01 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) 04:28:01 executing program 1 (fault-call:0 fault-nth:0): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:01 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:28:01 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), 0x0, 0x0) [ 165.299679][T11816] FAULT_INJECTION: forcing a failure. [ 165.299679][T11816] name failslab, interval 1, probability 0, space 0, times 1 04:28:01 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0) [ 165.356062][T11820] FAULT_INJECTION: forcing a failure. [ 165.356062][T11820] name failslab, interval 1, probability 0, space 0, times 1 [ 165.386869][T11820] CPU: 1 PID: 11820 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 165.394639][T11820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.404716][T11820] Call Trace: [ 165.408023][T11820] dump_stack+0x172/0x1f0 [ 165.412384][T11820] should_fail.cold+0xa/0x15 [ 165.416998][T11820] ? fault_create_debugfs_attr+0x180/0x180 [ 165.422819][T11820] ? ___might_sleep+0x163/0x280 [ 165.427688][T11820] __should_failslab+0x121/0x190 [ 165.432633][T11820] should_failslab+0x9/0x14 [ 165.437136][T11820] kmem_cache_alloc_trace+0x2d3/0x790 [ 165.442515][T11820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 165.448746][T11820] ? ns_capable_common+0x93/0x100 [ 165.453759][T11820] io_uring_setup+0x257/0x1a60 [ 165.458506][T11820] ? io_uring_release+0x50/0x50 [ 165.463861][T11820] ? fput_many+0x12c/0x1a0 [ 165.468617][T11820] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 165.474055][T11820] ? do_syscall_64+0x26/0x6a0 [ 165.478832][T11820] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.484879][T11820] ? do_syscall_64+0x26/0x6a0 [ 165.489538][T11820] ? lockdep_hardirqs_on+0x418/0x5d0 [ 165.494807][T11820] __x64_sys_io_uring_setup+0x54/0x80 [ 165.500159][T11820] do_syscall_64+0xfd/0x6a0 [ 165.504643][T11820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.510616][T11820] RIP: 0033:0x459819 [ 165.514492][T11820] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 165.534075][T11820] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 165.542466][T11820] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 165.550603][T11820] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 165.558553][T11820] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 165.566589][T11820] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 165.574715][T11820] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 [ 165.592534][T11816] CPU: 1 PID: 11816 Comm: syz-executor.4 Not tainted 5.2.0+ #53 [ 165.600206][T11816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.610270][T11816] Call Trace: [ 165.613571][T11816] dump_stack+0x172/0x1f0 [ 165.617934][T11816] should_fail.cold+0xa/0x15 [ 165.622529][T11816] ? fault_create_debugfs_attr+0x180/0x180 [ 165.628348][T11816] ? ___might_sleep+0x163/0x280 [ 165.633210][T11816] __should_failslab+0x121/0x190 [ 165.638162][T11816] should_failslab+0x9/0x14 [ 165.642665][T11816] kmem_cache_alloc+0x2aa/0x710 [ 165.647521][T11816] ? selinux_capable+0x36/0x40 [ 165.652293][T11816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 165.658536][T11816] getname_flags+0xd6/0x5b0 [ 165.663124][T11816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 165.669378][T11816] getname+0x1a/0x20 [ 165.673273][T11816] __x64_sys_acct+0x74/0x200 [ 165.677866][T11816] do_syscall_64+0xfd/0x6a0 [ 165.682377][T11816] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.688267][T11816] RIP: 0033:0x459819 [ 165.692161][T11816] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 165.711764][T11816] RSP: 002b:00007fdd3d44ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 165.720180][T11816] RAX: ffffffffffffffda RBX: 00007fdd3d44ac90 RCX: 0000000000459819 [ 165.728554][T11816] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000c40 [ 165.736525][T11816] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 165.744497][T11816] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdd3d44b6d4 04:28:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:28:02 executing program 1 (fault-call:0 fault-nth:1): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) [ 165.752475][T11816] R13: 00000000004bf83f R14: 00000000004d1050 R15: 0000000000000003 04:28:02 executing program 4 (fault-call:0 fault-nth:1): acct(&(0x7f0000000c40)='./file0\x00') 04:28:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:28:02 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0), 0x0) [ 166.012304][T11836] FAULT_INJECTION: forcing a failure. [ 166.012304][T11836] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 166.025566][T11836] CPU: 0 PID: 11836 Comm: syz-executor.4 Not tainted 5.2.0+ #53 [ 166.033207][T11836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.043278][T11836] Call Trace: [ 166.046591][T11836] dump_stack+0x172/0x1f0 [ 166.050936][T11836] should_fail.cold+0xa/0x15 [ 166.055628][T11836] ? mark_lock+0xc0/0x11e0 [ 166.060064][T11836] ? fault_create_debugfs_attr+0x180/0x180 [ 166.065884][T11836] ? __kasan_check_read+0x11/0x20 [ 166.068203][T11837] FAULT_INJECTION: forcing a failure. [ 166.068203][T11837] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 166.070912][T11836] ? __lock_acquire+0x16f2/0x4690 [ 166.070936][T11836] should_fail_alloc_page+0x50/0x60 [ 166.070952][T11836] __alloc_pages_nodemask+0x1a1/0x900 [ 166.070967][T11836] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 166.070986][T11836] ? __alloc_pages_slowpath+0x25a0/0x25a0 [ 166.071000][T11836] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 166.071026][T11836] ? fault_create_debugfs_attr+0x180/0x180 [ 166.071047][T11836] cache_grow_begin+0x90/0xd20 [ 166.071062][T11836] ? getname_flags+0xd6/0x5b0 [ 166.071084][T11836] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 166.138480][T11836] kmem_cache_alloc+0x650/0x710 [ 166.143344][T11836] ? selinux_capable+0x36/0x40 [ 166.148124][T11836] getname_flags+0xd6/0x5b0 [ 166.152633][T11836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 166.158876][T11836] getname+0x1a/0x20 [ 166.162775][T11836] __x64_sys_acct+0x74/0x200 [ 166.167367][T11836] do_syscall_64+0xfd/0x6a0 [ 166.171866][T11836] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.171878][T11836] RIP: 0033:0x459819 [ 166.171892][T11836] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 166.171900][T11836] RSP: 002b:00007fdd3d44ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 166.171919][T11836] RAX: ffffffffffffffda RBX: 00007fdd3d44ac90 RCX: 0000000000459819 [ 166.171925][T11836] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000c40 [ 166.171931][T11836] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 166.171938][T11836] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdd3d44b6d4 [ 166.171944][T11836] R13: 00000000004bf83f R14: 00000000004d1050 R15: 0000000000000003 [ 166.182575][T11837] CPU: 0 PID: 11837 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 166.257868][T11837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.267923][T11837] Call Trace: [ 166.271217][T11837] dump_stack+0x172/0x1f0 [ 166.275556][T11837] should_fail.cold+0xa/0x15 [ 166.280157][T11837] ? fault_create_debugfs_attr+0x180/0x180 [ 166.286016][T11837] ? ___might_sleep+0x163/0x280 [ 166.290888][T11837] should_fail_alloc_page+0x50/0x60 [ 166.296094][T11837] __alloc_pages_nodemask+0x1a1/0x900 [ 166.301496][T11837] ? __alloc_pages_slowpath+0x25a0/0x25a0 [ 166.307235][T11837] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 166.313493][T11837] alloc_pages_current+0x107/0x210 [ 166.318610][T11837] ? lockdep_init_map+0x1be/0x6d0 [ 166.323649][T11837] __get_free_pages+0xc/0x40 [ 166.328241][T11837] io_mem_alloc+0x2b/0x30 [ 166.332575][T11837] io_uring_setup+0x79d/0x1a60 [ 166.337350][T11837] ? io_uring_release+0x50/0x50 [ 166.342222][T11837] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 166.347698][T11837] ? do_syscall_64+0x26/0x6a0 [ 166.352398][T11837] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.358466][T11837] ? do_syscall_64+0x26/0x6a0 [ 166.363148][T11837] ? lockdep_hardirqs_on+0x418/0x5d0 [ 166.368438][T11837] __x64_sys_io_uring_setup+0x54/0x80 [ 166.373823][T11837] do_syscall_64+0xfd/0x6a0 [ 166.378332][T11837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.384222][T11837] RIP: 0033:0x459819 [ 166.388123][T11837] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 166.407734][T11837] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 166.416158][T11837] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 166.424138][T11837] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 166.432204][T11837] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 166.440183][T11837] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 166.448158][T11837] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 04:28:03 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:03 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0), 0x0) 04:28:03 executing program 4 (fault-call:0 fault-nth:2): acct(&(0x7f0000000c40)='./file0\x00') 04:28:03 executing program 1 (fault-call:0 fault-nth:2): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 04:28:03 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), 0x0, 0x0) [ 166.901513][T11862] FAULT_INJECTION: forcing a failure. [ 166.901513][T11862] name failslab, interval 1, probability 0, space 0, times 0 04:28:03 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0), 0x0) [ 166.942790][T11865] FAULT_INJECTION: forcing a failure. [ 166.942790][T11865] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 166.957234][T11862] CPU: 0 PID: 11862 Comm: syz-executor.4 Not tainted 5.2.0+ #53 [ 166.964891][T11862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.975117][T11862] Call Trace: [ 166.978432][T11862] dump_stack+0x172/0x1f0 [ 166.982795][T11862] should_fail.cold+0xa/0x15 [ 166.987413][T11862] ? fault_create_debugfs_attr+0x180/0x180 [ 166.993248][T11862] ? ___might_sleep+0x163/0x280 [ 166.998118][T11862] __should_failslab+0x121/0x190 [ 167.003085][T11862] should_failslab+0x9/0x14 [ 167.007596][T11862] kmem_cache_alloc_trace+0x2d3/0x790 [ 167.012974][T11862] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 167.019218][T11862] ? strncpy_from_user+0x2ac/0x380 [ 167.024434][T11862] acct_on+0x5f/0x790 [ 167.028427][T11862] __x64_sys_acct+0xae/0x200 [ 167.033021][T11862] do_syscall_64+0xfd/0x6a0 [ 167.037530][T11862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 167.043422][T11862] RIP: 0033:0x459819 [ 167.047318][T11862] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 167.066926][T11862] RSP: 002b:00007fdd3d44ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 167.075342][T11862] RAX: ffffffffffffffda RBX: 00007fdd3d44ac90 RCX: 0000000000459819 [ 167.083318][T11862] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000c40 [ 167.091290][T11862] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 167.099266][T11862] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdd3d44b6d4 [ 167.107446][T11862] R13: 00000000004bf83f R14: 00000000004d1050 R15: 0000000000000003 [ 167.117087][T11865] CPU: 0 PID: 11865 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 167.124744][T11865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.134802][T11865] Call Trace: [ 167.134831][T11865] dump_stack+0x172/0x1f0 [ 167.134855][T11865] should_fail.cold+0xa/0x15 [ 167.134874][T11865] ? fault_create_debugfs_attr+0x180/0x180 [ 167.134891][T11865] ? ___might_sleep+0x163/0x280 [ 167.134912][T11865] should_fail_alloc_page+0x50/0x60 [ 167.134924][T11865] __alloc_pages_nodemask+0x1a1/0x900 [ 167.134940][T11865] ? __alloc_pages_slowpath+0x25a0/0x25a0 [ 167.157996][T11865] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 167.158016][T11865] alloc_pages_current+0x107/0x210 [ 167.158031][T11865] ? lockdep_init_map+0x1be/0x6d0 [ 167.158048][T11865] __get_free_pages+0xc/0x40 [ 167.158062][T11865] io_mem_alloc+0x2b/0x30 [ 167.158076][T11865] io_uring_setup+0x8b6/0x1a60 [ 167.158093][T11865] ? io_uring_release+0x50/0x50 [ 167.158106][T11865] ? fput_many+0x12c/0x1a0 [ 167.158133][T11865] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 167.158147][T11865] ? do_syscall_64+0x26/0x6a0 [ 167.158161][T11865] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 167.158171][T11865] ? do_syscall_64+0x26/0x6a0 [ 167.158190][T11865] ? lockdep_hardirqs_on+0x418/0x5d0 [ 167.241108][T11865] __x64_sys_io_uring_setup+0x54/0x80 [ 167.246667][T11865] do_syscall_64+0xfd/0x6a0 [ 167.251179][T11865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 167.257069][T11865] RIP: 0033:0x459819 [ 167.260968][T11865] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 167.280578][T11865] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 167.289094][T11865] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 167.297085][T11865] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 167.305069][T11865] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 167.313052][T11865] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 167.321142][T11865] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 04:28:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:28:03 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, 0x0, 0x0) 04:28:03 executing program 4 (fault-call:0 fault-nth:3): acct(&(0x7f0000000c40)='./file0\x00') 04:28:04 executing program 1 (fault-call:0 fault-nth:3): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) [ 167.587376][T11879] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:04 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) [ 167.687523][T11887] FAULT_INJECTION: forcing a failure. [ 167.687523][T11887] name failslab, interval 1, probability 0, space 0, times 0 [ 167.739297][T11888] FAULT_INJECTION: forcing a failure. [ 167.739297][T11888] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 167.768914][T11887] CPU: 1 PID: 11887 Comm: syz-executor.4 Not tainted 5.2.0+ #53 [ 167.777992][T11887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.788057][T11887] Call Trace: [ 167.791360][T11887] dump_stack+0x172/0x1f0 [ 167.795715][T11887] should_fail.cold+0xa/0x15 [ 167.800324][T11887] ? fault_create_debugfs_attr+0x180/0x180 [ 167.806150][T11887] ? ___might_sleep+0x163/0x280 [ 167.811134][T11887] __should_failslab+0x121/0x190 [ 167.816085][T11887] should_failslab+0x9/0x14 [ 167.820594][T11887] kmem_cache_alloc+0x2aa/0x710 [ 167.825454][T11887] ? is_bpf_text_address+0xd3/0x170 [ 167.830674][T11887] __alloc_file+0x27/0x300 [ 167.835094][T11887] alloc_empty_file+0x72/0x170 [ 167.839859][T11887] path_openat+0xef/0x46d0 [ 167.844280][T11887] ? stack_trace_save+0xac/0xe0 [ 167.849126][T11887] ? stack_trace_consume_entry+0x190/0x190 [ 167.854922][T11887] ? __kasan_check_read+0x11/0x20 [ 167.859947][T11887] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 167.865434][T11887] ? save_stack+0x5c/0x90 [ 167.869761][T11887] ? save_stack+0x23/0x90 [ 167.874089][T11887] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 167.879899][T11887] ? kasan_kmalloc+0x9/0x10 [ 167.884402][T11887] ? kmem_cache_alloc_trace+0x158/0x790 [ 167.889944][T11887] ? acct_on+0x5f/0x790 [ 167.894101][T11887] ? __x64_sys_acct+0xae/0x200 [ 167.898874][T11887] do_filp_open+0x1a1/0x280 [ 167.903380][T11887] ? may_open_dev+0x100/0x100 [ 167.908065][T11887] ? cache_grow_end+0xa4/0x190 [ 167.912831][T11887] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 167.918460][T11887] ? find_held_lock+0x35/0x130 [ 167.923227][T11887] ? __kasan_check_read+0x11/0x20 [ 167.928262][T11887] file_open_name+0x2c5/0x3b0 [ 167.932946][T11887] ? vfs_open+0xd0/0xd0 [ 167.937107][T11887] ? rcu_read_lock_sched_held+0x110/0x130 [ 167.942836][T11887] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 167.949115][T11887] ? strncpy_from_user+0x2ac/0x380 [ 167.954245][T11887] acct_on+0x7f/0x790 [ 167.958250][T11887] __x64_sys_acct+0xae/0x200 [ 167.962843][T11887] do_syscall_64+0xfd/0x6a0 [ 167.967351][T11887] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 167.973350][T11887] RIP: 0033:0x459819 [ 167.977246][T11887] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 167.996851][T11887] RSP: 002b:00007fdd3d44ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 168.005272][T11887] RAX: ffffffffffffffda RBX: 00007fdd3d44ac90 RCX: 0000000000459819 [ 168.013249][T11887] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000c40 [ 168.021224][T11887] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 168.029193][T11887] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdd3d44b6d4 [ 168.037170][T11887] R13: 00000000004bf83f R14: 00000000004d1050 R15: 0000000000000003 [ 168.045163][T11888] CPU: 0 PID: 11888 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 168.052810][T11888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.063046][T11888] Call Trace: [ 168.066353][T11888] dump_stack+0x172/0x1f0 [ 168.070716][T11888] should_fail.cold+0xa/0x15 [ 168.075324][T11888] ? fault_create_debugfs_attr+0x180/0x180 [ 168.081145][T11888] ? ___might_sleep+0x163/0x280 [ 168.086016][T11888] should_fail_alloc_page+0x50/0x60 [ 168.091225][T11888] __alloc_pages_nodemask+0x1a1/0x900 [ 168.096617][T11888] ? __alloc_pages_slowpath+0x25a0/0x25a0 [ 168.102358][T11888] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 168.108605][T11888] alloc_pages_current+0x107/0x210 [ 168.113727][T11888] ? lockdep_init_map+0x1be/0x6d0 [ 168.118758][T11888] __get_free_pages+0xc/0x40 [ 168.123346][T11888] io_mem_alloc+0x2b/0x30 [ 168.127677][T11888] io_uring_setup+0x900/0x1a60 [ 168.132449][T11888] ? io_uring_release+0x50/0x50 [ 168.137301][T11888] ? fput_many+0x12c/0x1a0 [ 168.141737][T11888] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 168.147196][T11888] ? do_syscall_64+0x26/0x6a0 [ 168.151875][T11888] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 168.157938][T11888] ? do_syscall_64+0x26/0x6a0 [ 168.162618][T11888] ? lockdep_hardirqs_on+0x418/0x5d0 [ 168.167906][T11888] __x64_sys_io_uring_setup+0x54/0x80 [ 168.173282][T11888] do_syscall_64+0xfd/0x6a0 [ 168.177789][T11888] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 168.183693][T11888] RIP: 0033:0x459819 [ 168.187587][T11888] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 168.207194][T11888] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 168.215609][T11888] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 168.223581][T11888] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 168.231550][T11888] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 168.239627][T11888] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 168.247598][T11888] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 04:28:04 executing program 0: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:28:04 executing program 1 (fault-call:0 fault-nth:4): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:04 executing program 4 (fault-call:0 fault-nth:4): acct(&(0x7f0000000c40)='./file0\x00') [ 168.482880][T11902] FAULT_INJECTION: forcing a failure. [ 168.482880][T11902] name failslab, interval 1, probability 0, space 0, times 0 [ 168.510352][T11903] FAULT_INJECTION: forcing a failure. [ 168.510352][T11903] name failslab, interval 1, probability 0, space 0, times 0 [ 168.518161][T11902] CPU: 0 PID: 11902 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 168.530874][T11902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.540942][T11902] Call Trace: [ 168.544518][T11902] dump_stack+0x172/0x1f0 [ 168.548874][T11902] should_fail.cold+0xa/0x15 [ 168.553472][T11902] ? fault_create_debugfs_attr+0x180/0x180 [ 168.559389][T11902] ? ___might_sleep+0x163/0x280 [ 168.564241][T11902] __should_failslab+0x121/0x190 [ 168.569182][T11902] should_failslab+0x9/0x14 [ 168.573686][T11902] kmem_cache_alloc_trace+0x2d3/0x790 [ 168.579051][T11902] ? lockdep_init_map+0x1be/0x6d0 [ 168.584074][T11902] ? io_submit_sqes+0x360/0x360 [ 168.588923][T11902] __kthread_create_on_node+0xf2/0x460 [ 168.594380][T11902] ? kthread_parkme+0xb0/0xb0 [ 168.599069][T11902] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 168.604701][T11902] ? __alloc_pages_nodemask+0x653/0x900 [ 168.610241][T11902] ? io_submit_sqes+0x360/0x360 [ 168.615089][T11902] kthread_create_on_node+0xbb/0xf0 [ 168.620285][T11902] ? __kthread_create_on_node+0x460/0x460 [ 168.626026][T11902] ? selinux_capable+0x36/0x40 [ 168.630789][T11902] ? security_capable+0x95/0xc0 [ 168.635635][T11902] ? io_submit_sqes+0x360/0x360 [ 168.640484][T11902] kthread_create_on_cpu+0x37/0x210 [ 168.645685][T11902] io_uring_setup+0x1525/0x1a60 [ 168.650538][T11902] ? io_uring_release+0x50/0x50 [ 168.655382][T11902] ? fput_many+0x12c/0x1a0 [ 168.659809][T11902] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 168.665265][T11902] ? do_syscall_64+0x26/0x6a0 [ 168.669936][T11902] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 168.675999][T11902] ? do_syscall_64+0x26/0x6a0 [ 168.680677][T11902] ? lockdep_hardirqs_on+0x418/0x5d0 [ 168.685963][T11902] __x64_sys_io_uring_setup+0x54/0x80 [ 168.691330][T11902] do_syscall_64+0xfd/0x6a0 [ 168.695921][T11902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 168.701807][T11902] RIP: 0033:0x459819 [ 168.705699][T11902] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 168.725801][T11902] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 168.734207][T11902] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 168.742176][T11902] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 168.750138][T11902] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 168.758099][T11902] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 168.770494][T11902] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 [ 168.778490][T11903] CPU: 1 PID: 11903 Comm: syz-executor.4 Not tainted 5.2.0+ #53 [ 168.786141][T11903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.796215][T11903] Call Trace: [ 168.799520][T11903] dump_stack+0x172/0x1f0 [ 168.803866][T11903] should_fail.cold+0xa/0x15 [ 168.808468][T11903] ? fault_create_debugfs_attr+0x180/0x180 [ 168.814288][T11903] ? ___might_sleep+0x163/0x280 [ 168.819153][T11903] __should_failslab+0x121/0x190 [ 168.824095][T11903] should_failslab+0x9/0x14 [ 168.828601][T11903] kmem_cache_alloc+0x2aa/0x710 [ 168.833451][T11903] ? __kasan_check_read+0x11/0x20 [ 168.838481][T11903] ? __lock_acquire+0x8a0/0x4690 [ 168.843421][T11903] ? __kasan_check_read+0x11/0x20 [ 168.848534][T11903] __d_alloc+0x2e/0x8c0 [ 168.852696][T11903] d_alloc+0x4d/0x280 [ 168.856683][T11903] d_alloc_parallel+0xf4/0x1c30 [ 168.861538][T11903] ? lock_downgrade+0x920/0x920 [ 168.866401][T11903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 168.872640][T11903] ? __kasan_check_read+0x11/0x20 [ 168.877660][T11903] ? __d_lookup_rcu+0x6c0/0x6c0 [ 168.882509][T11903] ? __d_lookup+0x42f/0x760 [ 168.887016][T11903] ? lookup_open+0x2c2/0x1a90 [ 168.892189][T11903] ? d_lookup+0xf9/0x260 [ 168.896432][T11903] ? lockdep_hardirqs_on+0x418/0x5d0 [ 168.901732][T11903] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 168.907462][T11903] ? d_lookup+0x19e/0x260 [ 168.911802][T11903] lookup_open+0x525/0x1a90 [ 168.916315][T11903] ? vfs_link+0xb90/0xb90 [ 168.920674][T11903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 168.926939][T11903] ? __mnt_want_write+0x1f1/0x2f0 [ 168.931977][T11903] path_openat+0x1eb2/0x46d0 [ 168.936586][T11903] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 168.941966][T11903] ? save_stack+0x5c/0x90 [ 168.946296][T11903] ? save_stack+0x23/0x90 [ 168.950625][T11903] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 168.956433][T11903] ? kasan_kmalloc+0x9/0x10 [ 168.961029][T11903] ? kmem_cache_alloc_trace+0x158/0x790 [ 168.966580][T11903] ? acct_on+0x5f/0x790 [ 168.970827][T11903] ? __x64_sys_acct+0xae/0x200 [ 168.975598][T11903] do_filp_open+0x1a1/0x280 [ 168.980100][T11903] ? may_open_dev+0x100/0x100 [ 168.984900][T11903] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 168.990535][T11903] ? find_held_lock+0x35/0x130 [ 168.995308][T11903] ? __kasan_check_read+0x11/0x20 [ 169.000326][T11903] file_open_name+0x2c5/0x3b0 [ 169.004982][T11903] ? vfs_open+0xd0/0xd0 [ 169.009116][T11903] ? rcu_read_lock_sched_held+0x110/0x130 [ 169.014818][T11903] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 169.021041][T11903] ? strncpy_from_user+0x2ac/0x380 [ 169.026137][T11903] acct_on+0x7f/0x790 [ 169.030099][T11903] __x64_sys_acct+0xae/0x200 [ 169.034670][T11903] do_syscall_64+0xfd/0x6a0 [ 169.039173][T11903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 169.045078][T11903] RIP: 0033:0x459819 [ 169.048990][T11903] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 169.068730][T11903] RSP: 002b:00007fdd3d44ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 169.077124][T11903] RAX: ffffffffffffffda RBX: 00007fdd3d44ac90 RCX: 0000000000459819 04:28:05 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000000), 0x0, 0x0) 04:28:05 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) [ 169.085077][T11903] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000c40 [ 169.093027][T11903] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 169.100976][T11903] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdd3d44b6d4 [ 169.108998][T11903] R13: 00000000004bf83f R14: 00000000004d1050 R15: 0000000000000003 [ 169.130661][T11900] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:05 executing program 0: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:05 executing program 1 (fault-call:0 fault-nth:5): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:05 executing program 4 (fault-call:0 fault-nth:5): acct(&(0x7f0000000c40)='./file0\x00') 04:28:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 169.417829][T11925] FAULT_INJECTION: forcing a failure. [ 169.417829][T11925] name failslab, interval 1, probability 0, space 0, times 0 [ 169.452995][T11924] FAULT_INJECTION: forcing a failure. [ 169.452995][T11924] name failslab, interval 1, probability 0, space 0, times 0 [ 169.489418][T11926] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 169.501212][T11924] CPU: 1 PID: 11924 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 169.508890][T11924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.518971][T11924] Call Trace: [ 169.522265][T11924] dump_stack+0x172/0x1f0 [ 169.526609][T11924] should_fail.cold+0xa/0x15 [ 169.531214][T11924] ? fault_create_debugfs_attr+0x180/0x180 [ 169.537154][T11924] ? ___might_sleep+0x163/0x280 [ 169.542016][T11924] __should_failslab+0x121/0x190 [ 169.546957][T11924] should_failslab+0x9/0x14 [ 169.551463][T11924] __kmalloc+0x2e0/0x780 [ 169.555708][T11924] ? lock_downgrade+0x920/0x920 [ 169.560561][T11924] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 169.566363][T11924] ? try_to_wake_up+0x70f/0x1a10 [ 169.571308][T11924] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 169.577127][T11924] ? lockdep_hardirqs_on+0x418/0x5d0 [ 169.582416][T11924] ? alloc_workqueue+0x166/0xf40 [ 169.587356][T11924] alloc_workqueue+0x166/0xf40 [ 169.592123][T11924] ? try_to_wake_up+0x70f/0x1a10 [ 169.597060][T11924] ? lockdep_hardirqs_on+0x418/0x5d0 [ 169.602350][T11924] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 169.608073][T11924] ? migrate_swap_stop+0x9b0/0x9b0 [ 169.613256][T11924] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 169.619073][T11924] io_uring_setup+0xbc7/0x1a60 [ 169.623839][T11924] ? io_uring_release+0x50/0x50 [ 169.628684][T11924] ? fput_many+0x12c/0x1a0 [ 169.633125][T11924] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 169.638581][T11924] ? do_syscall_64+0x26/0x6a0 [ 169.643251][T11924] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 169.649324][T11924] ? do_syscall_64+0x26/0x6a0 [ 169.654013][T11924] ? lockdep_hardirqs_on+0x418/0x5d0 [ 169.659310][T11924] __x64_sys_io_uring_setup+0x54/0x80 [ 169.664681][T11924] do_syscall_64+0xfd/0x6a0 [ 169.669186][T11924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 169.675076][T11924] RIP: 0033:0x459819 [ 169.678994][T11924] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 169.698600][T11924] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 169.707011][T11924] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 169.715069][T11924] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 169.723041][T11924] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 169.731284][T11924] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 04:28:06 executing program 0: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) [ 169.739369][T11924] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 [ 169.761994][T11925] CPU: 0 PID: 11925 Comm: syz-executor.4 Not tainted 5.2.0+ #53 [ 169.769669][T11925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.779729][T11925] Call Trace: [ 169.783040][T11925] dump_stack+0x172/0x1f0 [ 169.787372][T11925] should_fail.cold+0xa/0x15 [ 169.791967][T11925] ? fault_create_debugfs_attr+0x180/0x180 [ 169.797787][T11925] ? ___might_sleep+0x163/0x280 [ 169.802651][T11925] __should_failslab+0x121/0x190 [ 169.807600][T11925] should_failslab+0x9/0x14 [ 169.812106][T11925] kmem_cache_alloc+0x2aa/0x710 [ 169.816962][T11925] ? __kasan_check_read+0x11/0x20 [ 169.821990][T11925] ? __lock_acquire+0x8a0/0x4690 [ 169.826926][T11925] ? __kasan_check_read+0x11/0x20 [ 169.831951][T11925] __d_alloc+0x2e/0x8c0 [ 169.836117][T11925] d_alloc+0x4d/0x280 [ 169.840101][T11925] d_alloc_parallel+0xf4/0x1c30 [ 169.844956][T11925] ? lock_downgrade+0x920/0x920 [ 169.849812][T11925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 169.856100][T11925] ? __kasan_check_read+0x11/0x20 [ 169.861217][T11925] ? __d_lookup_rcu+0x6c0/0x6c0 [ 169.866079][T11925] ? __d_lookup+0x42f/0x760 [ 169.870587][T11925] ? lookup_open+0x2c2/0x1a90 [ 169.875260][T11925] ? d_lookup+0xf9/0x260 [ 169.879601][T11925] ? lockdep_hardirqs_on+0x418/0x5d0 [ 169.884898][T11925] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 169.890619][T11925] ? d_lookup+0x19e/0x260 [ 169.894947][T11925] lookup_open+0x525/0x1a90 [ 169.899452][T11925] ? vfs_link+0xb90/0xb90 [ 169.903803][T11925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 169.910043][T11925] ? __mnt_want_write+0x1f1/0x2f0 [ 169.915075][T11925] path_openat+0x1eb2/0x46d0 [ 169.919686][T11925] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 169.925060][T11925] ? save_stack+0x5c/0x90 [ 169.929388][T11925] ? save_stack+0x23/0x90 [ 169.933722][T11925] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 169.939529][T11925] ? kasan_kmalloc+0x9/0x10 [ 169.944036][T11925] ? kmem_cache_alloc_trace+0x158/0x790 [ 169.949581][T11925] ? acct_on+0x5f/0x790 [ 169.953733][T11925] ? __x64_sys_acct+0xae/0x200 [ 169.958504][T11925] do_filp_open+0x1a1/0x280 [ 169.963095][T11925] ? may_open_dev+0x100/0x100 [ 169.967785][T11925] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 169.973416][T11925] ? find_held_lock+0x35/0x130 [ 169.978371][T11925] ? __kasan_check_read+0x11/0x20 [ 169.983413][T11925] file_open_name+0x2c5/0x3b0 [ 169.988093][T11925] ? vfs_open+0xd0/0xd0 [ 169.992248][T11925] ? rcu_read_lock_sched_held+0x110/0x130 [ 169.997948][T11925] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 170.004167][T11925] ? strncpy_from_user+0x2ac/0x380 [ 170.009262][T11925] acct_on+0x7f/0x790 [ 170.013400][T11925] __x64_sys_acct+0xae/0x200 [ 170.017991][T11925] do_syscall_64+0xfd/0x6a0 [ 170.022496][T11925] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 170.028368][T11925] RIP: 0033:0x459819 [ 170.032242][T11925] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 170.052004][T11925] RSP: 002b:00007fdd3d44ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 170.060405][T11925] RAX: ffffffffffffffda RBX: 00007fdd3d44ac90 RCX: 0000000000459819 [ 170.068357][T11925] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000c40 [ 170.076307][T11925] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 170.084256][T11925] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdd3d44b6d4 [ 170.092204][T11925] R13: 00000000004bf83f R14: 00000000004d1050 R15: 0000000000000003 04:28:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 04:28:06 executing program 1 (fault-call:0 fault-nth:6): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:06 executing program 4 (fault-call:0 fault-nth:6): acct(&(0x7f0000000c40)='./file0\x00') 04:28:06 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:06 executing program 5: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) [ 170.348235][T11943] FAULT_INJECTION: forcing a failure. [ 170.348235][T11943] name failslab, interval 1, probability 0, space 0, times 0 [ 170.378137][T11943] CPU: 1 PID: 11943 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 170.385821][T11943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.395889][T11943] Call Trace: [ 170.399242][T11943] dump_stack+0x172/0x1f0 [ 170.403602][T11943] should_fail.cold+0xa/0x15 [ 170.408217][T11943] ? fault_create_debugfs_attr+0x180/0x180 [ 170.414046][T11943] ? ___might_sleep+0x163/0x280 [ 170.418916][T11943] __should_failslab+0x121/0x190 [ 170.423877][T11943] should_failslab+0x9/0x14 [ 170.428399][T11943] kmem_cache_alloc_trace+0x2d3/0x790 [ 170.433786][T11943] ? __kmalloc+0x60a/0x780 [ 170.438214][T11943] ? lock_downgrade+0x920/0x920 [ 170.443100][T11943] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 170.448917][T11943] ? try_to_wake_up+0x70f/0x1a10 [ 170.453863][T11943] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 170.459693][T11943] alloc_workqueue_attrs+0x3d/0xc0 [ 170.464815][T11943] alloc_workqueue+0x18b/0xf40 [ 170.469588][T11943] ? try_to_wake_up+0x70f/0x1a10 [ 170.474528][T11943] ? lockdep_hardirqs_on+0x418/0x5d0 [ 170.479819][T11943] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 170.485547][T11943] ? migrate_swap_stop+0x9b0/0x9b0 [ 170.490698][T11943] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 170.496526][T11943] io_uring_setup+0xbc7/0x1a60 [ 170.501299][T11943] ? io_uring_release+0x50/0x50 [ 170.506152][T11943] ? fput_many+0x12c/0x1a0 [ 170.510591][T11943] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 170.516060][T11943] ? do_syscall_64+0x26/0x6a0 [ 170.520738][T11943] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 170.526805][T11943] ? do_syscall_64+0x26/0x6a0 [ 170.531487][T11943] ? lockdep_hardirqs_on+0x418/0x5d0 [ 170.536899][T11943] __x64_sys_io_uring_setup+0x54/0x80 [ 170.542279][T11943] do_syscall_64+0xfd/0x6a0 [ 170.546789][T11943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 170.552765][T11943] RIP: 0033:0x459819 [ 170.556664][T11943] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 170.576273][T11943] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 170.584698][T11943] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 170.592675][T11943] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 170.600649][T11943] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 170.608801][T11943] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 170.616775][T11943] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 04:28:07 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) [ 170.642475][T11941] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:07 executing program 4: acct(&(0x7f0000000c40)='./file0\x00') 04:28:07 executing program 1 (fault-call:0 fault-nth:7): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 04:28:07 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:07 executing program 5: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:07 executing program 4: acct(&(0x7f0000000200)='./file0\x00') r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x2000000000000406, r0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000180)={r2, 0x9, &(0x7f0000000080)=[0x9, 0x9, 0x2, 0x7, 0x80000001, 0x3f, 0x9c, 0x6, 0x40], &(0x7f00000000c0)=[0x5, 0x1, 0xa19, 0xffff, 0x3, 0xfbd, 0x6, 0x80, 0x2, 0x55], 0x4, 0x2, 0x1f, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x8]}) 04:28:07 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) [ 170.985492][T11967] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 171.015812][T11971] FAULT_INJECTION: forcing a failure. [ 171.015812][T11971] name failslab, interval 1, probability 0, space 0, times 0 [ 171.098496][T11971] CPU: 0 PID: 11971 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 171.106186][T11971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.116242][T11971] Call Trace: [ 171.116270][T11971] dump_stack+0x172/0x1f0 [ 171.123891][T11971] should_fail.cold+0xa/0x15 [ 171.128520][T11971] ? fault_create_debugfs_attr+0x180/0x180 [ 171.134340][T11971] ? ___might_sleep+0x163/0x280 [ 171.134366][T11971] __should_failslab+0x121/0x190 [ 171.144224][T11971] should_failslab+0x9/0x14 [ 171.148742][T11971] __kmalloc_track_caller+0x2dc/0x770 [ 171.154122][T11971] ? pointer+0x750/0x750 [ 171.158375][T11971] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 171.164005][T11971] ? find_held_lock+0x35/0x130 [ 171.168768][T11971] ? kasprintf+0xbb/0xf0 [ 171.173016][T11971] kvasprintf+0xc8/0x170 [ 171.177264][T11971] ? bust_spinlocks+0xe0/0xe0 [ 171.181953][T11971] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 171.187678][T11971] ? find_next_bit+0x107/0x130 [ 171.192449][T11971] kasprintf+0xbb/0xf0 [ 171.196528][T11971] ? kvasprintf_const+0x190/0x190 [ 171.201569][T11971] ? __kasan_check_read+0x11/0x20 [ 171.206607][T11971] alloc_workqueue+0x46c/0xf40 [ 171.211381][T11971] ? lockdep_hardirqs_on+0x418/0x5d0 [ 171.216687][T11971] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 171.222508][T11971] ? migrate_swap_stop+0x9b0/0x9b0 [ 171.227626][T11971] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 171.233548][T11971] io_uring_setup+0xbc7/0x1a60 [ 171.238330][T11971] ? io_uring_release+0x50/0x50 [ 171.243161][T11971] ? fput_many+0x12c/0x1a0 04:28:07 executing program 4: acct(&(0x7f0000000000)='./file0\x00') 04:28:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 04:28:07 executing program 5: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) [ 171.247562][T11971] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 171.253013][T11971] ? do_syscall_64+0x26/0x6a0 [ 171.257697][T11971] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.263767][T11971] ? do_syscall_64+0x26/0x6a0 [ 171.268452][T11971] ? lockdep_hardirqs_on+0x418/0x5d0 [ 171.273753][T11971] __x64_sys_io_uring_setup+0x54/0x80 [ 171.279131][T11971] do_syscall_64+0xfd/0x6a0 [ 171.283731][T11971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 171.289624][T11971] RIP: 0033:0x459819 [ 171.293523][T11971] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 171.313132][T11971] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 171.321557][T11971] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 171.329534][T11971] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 171.337503][T11971] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:28:07 executing program 4: acct(&(0x7f0000000100)='./file0\x00') [ 171.345464][T11971] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 171.345472][T11971] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 [ 171.543788][T11993] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:08 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:08 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:08 executing program 1 (fault-call:0 fault-nth:8): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:08 executing program 5: poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:28:08 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x1, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000040)=0x4, &(0x7f0000000080)=0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000000c0)={'veth0_to_team\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}) acct(&(0x7f0000000c40)='./file0\x00') 04:28:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x0, 0x0) [ 171.989190][T12010] FAULT_INJECTION: forcing a failure. [ 171.989190][T12010] name failslab, interval 1, probability 0, space 0, times 0 04:28:08 executing program 5: poll(0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:28:08 executing program 4: acct(&(0x7f0000000c40)='./file0\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) rt_tgsigqueueinfo(r0, r1, 0x11, &(0x7f0000000080)={0x13, 0x6, 0x100}) [ 172.038337][T12013] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:08 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) [ 172.100300][T12010] CPU: 0 PID: 12010 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 172.107986][T12010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.118051][T12010] Call Trace: [ 172.121360][T12010] dump_stack+0x172/0x1f0 [ 172.125708][T12010] should_fail.cold+0xa/0x15 [ 172.130309][T12010] ? fault_create_debugfs_attr+0x180/0x180 [ 172.136130][T12010] ? ___might_sleep+0x163/0x280 [ 172.140993][T12010] __should_failslab+0x121/0x190 [ 172.145935][T12010] should_failslab+0x9/0x14 [ 172.150440][T12010] __kmalloc+0x2e0/0x780 [ 172.154690][T12010] ? apply_wqattrs_prepare+0xae/0x970 [ 172.160065][T12010] apply_wqattrs_prepare+0xae/0x970 [ 172.165274][T12010] apply_workqueue_attrs_locked+0xcb/0x140 [ 172.171101][T12010] alloc_workqueue+0x5f3/0xf40 [ 172.175869][T12010] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 172.181594][T12010] ? migrate_swap_stop+0x9b0/0x9b0 [ 172.186712][T12010] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 172.192526][T12010] io_uring_setup+0xbc7/0x1a60 [ 172.197460][T12010] ? io_uring_release+0x50/0x50 [ 172.202318][T12010] ? fput_many+0x12c/0x1a0 [ 172.206742][T12010] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 172.212199][T12010] ? do_syscall_64+0x26/0x6a0 [ 172.216878][T12010] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.222941][T12010] ? do_syscall_64+0x26/0x6a0 [ 172.227621][T12010] ? lockdep_hardirqs_on+0x418/0x5d0 [ 172.232915][T12010] __x64_sys_io_uring_setup+0x54/0x80 [ 172.238309][T12010] do_syscall_64+0xfd/0x6a0 [ 172.242826][T12010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 172.248719][T12010] RIP: 0033:0x459819 [ 172.252614][T12010] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 172.272224][T12010] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 172.280643][T12010] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 172.288617][T12010] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 172.296591][T12010] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 172.304564][T12010] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 172.312536][T12010] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 04:28:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x0, 0x0) 04:28:08 executing program 4: acct(&(0x7f0000000c40)='./file0\x00') r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x600000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000180)={r1, &(0x7f00000000c0)=""/190}) 04:28:08 executing program 5: move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) [ 172.557282][T12034] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:09 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:28:09 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:09 executing program 1 (fault-call:0 fault-nth:9): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x6, &(0x7f0000000400)=[{&(0x7f0000000080)="cec16cae5adbfe959b1da69ce6c8211b907173fab0210a4f48c992e4c5a4ec02380b0b980e3b1b80ccb6996d8bffd4ecbd04930de03b1ea6d9d76ba8ec637af521b05bbdf0450e4d795fd3784fc308449d8e96828251f95b3f05138e05ade2b81c776aedd1a60da22a5967bd614a4c38a6c42c3d2e0f609bb14800cb0d0c5da6f4187e019211abb423ebbc3fd89acc72714bdc066501f63d4b5eb08bb95894", 0x9f, 0x5dc}, {&(0x7f0000000140)="d55f9b358ef64a4a48585527fda3bc10eda65350ed3be6c25260c27a664c22cbecaece084542a0ae287977181a91e29d671ed6734a23893c943215fea27209dcbc84b72db84f44158e0a302a3dcb9ded3a16eea1f5d20cbf184216762a21d4a8d52e14d882eb7c0e6f", 0x69, 0x45}, {&(0x7f00000001c0)="f8b1eddfb944d8569db263721b02cd51e245e6da6df8556d7668b9ba840bff567075c88587aa6e27d4de11bbde7afb535a3c74b8213c65d816f9c7fc658dd4a6c7bd77381b17a7b1e530e5aa54f8b4ebb3e4ca4cef87cd53d1d0a73ba9d27ac06b46d4a81c3fe4b648982555857dab", 0x6f, 0x4}, {&(0x7f0000000240)="6a8e4959c9f208074c04fa26b26a85752f2fb1cab3c3cbafa26a9985db04bfa103ee9c401f68932239b3f51fafb94f71518e6b44a992c4107b67ff171bd825d5031c37f6c100bb0072b167d860db6530", 0x50, 0x100000000}, {&(0x7f00000002c0)="96a3797b5aa1072ec7a7e9e760b8ac969f3386c1c50eb95dbf5cd6ab145bda3d5184f3cd2fe53b15261a1cdaa4adc72287705002d99aca00804c350aaff5b5b80417a4fec520fe1518d94676f75cc617f5b69e6c0ef85101f4553f90673842b3f9608580201eb06922a50e3399d5038723e598651387e3a91432f2f75c988234718c90de92c88d8aa261063b", 0x8c, 0x3}, {&(0x7f0000000380)="d1cc84fa9265610dec27085f6ce84b6a1bc16621d3f19783b7cb2f5ce953439642847621ac277e8f68176c67dbc454be2ef708140cb1b202c40f03d0c3306f47679320360cf0bf434ec293ec8af715406be75f149e8ebc7a", 0x58, 0xffff}], 0x80, &(0x7f00000004c0)={[{@space_cache_v1='space_cache=v1'}], [{@audit='audit'}]}) acct(&(0x7f0000000c40)='./file0\x00') r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000600)='/dev/full\x00', 0x0, 0x0) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x2) 04:28:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x0, 0x0) 04:28:09 executing program 5: move_pages(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:28:09 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:09 executing program 5: move_pages(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000001c0), 0x0) [ 172.929621][T12056] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 172.951680][T12061] FAULT_INJECTION: forcing a failure. [ 172.951680][T12061] name failslab, interval 1, probability 0, space 0, times 0 [ 172.998400][T12061] CPU: 0 PID: 12061 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 173.006091][T12061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.016167][T12061] Call Trace: [ 173.019481][T12061] dump_stack+0x172/0x1f0 [ 173.023841][T12061] should_fail.cold+0xa/0x15 [ 173.028452][T12061] ? fault_create_debugfs_attr+0x180/0x180 [ 173.034278][T12061] ? ___might_sleep+0x163/0x280 [ 173.039143][T12061] __should_failslab+0x121/0x190 [ 173.044092][T12061] should_failslab+0x9/0x14 [ 173.048601][T12061] kmem_cache_alloc_trace+0x2d3/0x790 [ 173.053977][T12061] ? __kmalloc+0x60a/0x780 [ 173.058411][T12061] alloc_workqueue_attrs+0x3d/0xc0 [ 173.063522][T12061] apply_wqattrs_prepare+0xb6/0x970 [ 173.068736][T12061] apply_workqueue_attrs_locked+0xcb/0x140 [ 173.074541][T12061] alloc_workqueue+0x5f3/0xf40 [ 173.079313][T12061] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 173.085038][T12061] ? migrate_swap_stop+0x9b0/0x9b0 [ 173.090152][T12061] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 173.095972][T12061] io_uring_setup+0xbc7/0x1a60 [ 173.100742][T12061] ? io_uring_release+0x50/0x50 [ 173.105591][T12061] ? fput_many+0x12c/0x1a0 [ 173.110022][T12061] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 173.115482][T12061] ? do_syscall_64+0x26/0x6a0 [ 173.120160][T12061] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.126225][T12061] ? do_syscall_64+0x26/0x6a0 [ 173.130910][T12061] ? lockdep_hardirqs_on+0x418/0x5d0 [ 173.136723][T12061] __x64_sys_io_uring_setup+0x54/0x80 [ 173.142099][T12061] do_syscall_64+0xfd/0x6a0 [ 173.146608][T12061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.152495][T12061] RIP: 0033:0x459819 [ 173.156382][T12061] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 173.175992][T12061] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 173.184413][T12061] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 04:28:09 executing program 4: acct(&(0x7f0000000c40)='./file0\x00') r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x20c0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000180)={0x0, 0x80000, 0xffffffffffffff9c}) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000140)=':em0md5sum!keyring!cgrouplocgroupuser^cpuset\x00', 0x0, r1) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/144, 0x90) [ 173.192367][T12061] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 173.200320][T12061] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 173.208286][T12061] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 173.216248][T12061] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 04:28:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x0, 0x0) 04:28:09 executing program 1 (fault-call:0 fault-nth:10): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:09 executing program 5: move_pages(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000001c0), 0x0) [ 173.538076][T12083] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 173.577801][T12089] FAULT_INJECTION: forcing a failure. [ 173.577801][T12089] name failslab, interval 1, probability 0, space 0, times 0 [ 173.644671][T12089] CPU: 0 PID: 12089 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 173.652447][T12089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.662509][T12089] Call Trace: [ 173.665814][T12089] dump_stack+0x172/0x1f0 [ 173.670161][T12089] should_fail.cold+0xa/0x15 [ 173.674886][T12089] ? fault_create_debugfs_attr+0x180/0x180 [ 173.680708][T12089] ? ___might_sleep+0x163/0x280 [ 173.685577][T12089] __should_failslab+0x121/0x190 [ 173.690528][T12089] should_failslab+0x9/0x14 [ 173.695045][T12089] kmem_cache_alloc_trace+0x2d3/0x790 [ 173.700423][T12089] ? __kmalloc+0x60a/0x780 [ 173.704853][T12089] alloc_workqueue_attrs+0x3d/0xc0 [ 173.709974][T12089] apply_wqattrs_prepare+0xbe/0x970 [ 173.715189][T12089] apply_workqueue_attrs_locked+0xcb/0x140 [ 173.721021][T12089] alloc_workqueue+0x5f3/0xf40 [ 173.726291][T12089] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 173.732020][T12089] ? migrate_swap_stop+0x9b0/0x9b0 [ 173.737135][T12089] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 173.742954][T12089] io_uring_setup+0xbc7/0x1a60 [ 173.747727][T12089] ? io_uring_release+0x50/0x50 [ 173.752577][T12089] ? fput_many+0x12c/0x1a0 [ 173.757015][T12089] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 173.763709][T12089] ? do_syscall_64+0x26/0x6a0 [ 173.769081][T12089] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.775152][T12089] ? do_syscall_64+0x26/0x6a0 [ 173.779923][T12089] ? lockdep_hardirqs_on+0x418/0x5d0 [ 173.785222][T12089] __x64_sys_io_uring_setup+0x54/0x80 [ 173.790611][T12089] do_syscall_64+0xfd/0x6a0 [ 173.795124][T12089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.801104][T12089] RIP: 0033:0x459819 [ 173.804999][T12089] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 173.824607][T12089] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 173.833028][T12089] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 173.841093][T12089] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 173.849062][T12089] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 173.857036][T12089] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 173.865011][T12089] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 04:28:10 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:28:10 executing program 4: r0 = msgget(0x2, 0x20) msgctl$IPC_RMID(r0, 0x0) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/50) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) write$capi20_data(r1, &(0x7f0000000080)={{0x10, 0x2, 0x8, 0x82, 0x454, 0x3}, 0x4a, "0fafc5f1e297ad1907b7bc77153993561bee89ddc1667ef7940eadf53ee9e9882744cae627e1d029c3ef63430e0260e51136cc9c5e783ca97d70acb7d73c6c2a487ce1bec5709be799cf"}, 0x5c) acct(&(0x7f0000000100)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x20000, 0x0) 04:28:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x0, 0x0) 04:28:10 executing program 5: move_pages(0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:28:10 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:10 executing program 1 (fault-call:0 fault-nth:11): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:10 executing program 5: move_pages(0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:28:10 executing program 4: acct(0xffffffffffffffff) [ 174.070191][T12107] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x0, 0x0) 04:28:10 executing program 4: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) acct(&(0x7f0000000080)='./file0\x00') getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) 04:28:10 executing program 5: move_pages(0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), &(0x7f00000001c0), 0x0) [ 174.301860][T12122] FAULT_INJECTION: forcing a failure. [ 174.301860][T12122] name failslab, interval 1, probability 0, space 0, times 0 [ 174.349305][T12122] CPU: 1 PID: 12122 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 174.356993][T12122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.367059][T12122] Call Trace: [ 174.370363][T12122] dump_stack+0x172/0x1f0 [ 174.374707][T12122] should_fail.cold+0xa/0x15 [ 174.379313][T12122] ? fault_create_debugfs_attr+0x180/0x180 [ 174.385136][T12122] ? ___might_sleep+0x163/0x280 [ 174.390006][T12122] __should_failslab+0x121/0x190 [ 174.394954][T12122] should_failslab+0x9/0x14 [ 174.399463][T12122] kmem_cache_alloc_node+0x268/0x740 [ 174.404760][T12122] alloc_unbound_pwq+0x4c5/0xcf0 [ 174.409711][T12122] apply_wqattrs_prepare+0x354/0x970 [ 174.415015][T12122] apply_workqueue_attrs_locked+0xcb/0x140 [ 174.420911][T12122] alloc_workqueue+0x5f3/0xf40 [ 174.425695][T12122] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 174.431419][T12122] ? migrate_swap_stop+0x9b0/0x9b0 [ 174.436536][T12122] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 174.442441][T12122] io_uring_setup+0xbc7/0x1a60 [ 174.447207][T12122] ? io_uring_release+0x50/0x50 [ 174.452054][T12122] ? fput_many+0x12c/0x1a0 [ 174.456484][T12122] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 174.462119][T12122] ? do_syscall_64+0x26/0x6a0 [ 174.466798][T12122] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.473221][T12122] ? do_syscall_64+0x26/0x6a0 [ 174.477898][T12122] ? lockdep_hardirqs_on+0x418/0x5d0 [ 174.483187][T12122] __x64_sys_io_uring_setup+0x54/0x80 [ 174.488563][T12122] do_syscall_64+0xfd/0x6a0 [ 174.493069][T12122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.498956][T12122] RIP: 0033:0x459819 [ 174.502848][T12122] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.522454][T12122] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 174.530869][T12122] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 174.538847][T12122] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 174.546821][T12122] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 174.554878][T12122] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 174.562851][T12122] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 [ 174.622962][T12127] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:11 executing program 5: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:28:11 executing program 2: move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:28:11 executing program 4: acct(&(0x7f0000000000)='./file0\x00') acct(&(0x7f0000000c40)='./file0\x00') 04:28:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001", 0x1d, 0x400}], 0x0, 0x0) 04:28:11 executing program 1 (fault-call:0 fault-nth:12): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) [ 174.963064][T12150] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:11 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:11 executing program 4: acct(&(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000040)=0x2800, 0x2) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) 04:28:11 executing program 2: move_pages(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:28:11 executing program 5: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) [ 175.014936][T12154] FAULT_INJECTION: forcing a failure. [ 175.014936][T12154] name failslab, interval 1, probability 0, space 0, times 0 [ 175.120990][T12154] CPU: 0 PID: 12154 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 175.128771][T12154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.138840][T12154] Call Trace: [ 175.142156][T12154] dump_stack+0x172/0x1f0 [ 175.146510][T12154] should_fail.cold+0xa/0x15 [ 175.151119][T12154] ? fault_create_debugfs_attr+0x180/0x180 [ 175.157142][T12154] ? ___might_sleep+0x163/0x280 [ 175.162010][T12154] __should_failslab+0x121/0x190 [ 175.166958][T12154] ? sock_free_inode+0x30/0x30 [ 175.171728][T12154] should_failslab+0x9/0x14 [ 175.176246][T12154] kmem_cache_alloc+0x2aa/0x710 [ 175.181108][T12154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 175.187357][T12154] ? selinux_socket_create+0x2b2/0x610 [ 175.192828][T12154] ? sock_free_inode+0x30/0x30 [ 175.197597][T12154] sock_alloc_inode+0x1c/0x1d0 [ 175.202363][T12154] alloc_inode+0x68/0x1e0 [ 175.206695][T12154] new_inode_pseudo+0x19/0xf0 [ 175.211372][T12154] sock_alloc+0x41/0x270 [ 175.215615][T12154] __sock_create+0xc2/0x730 [ 175.220115][T12154] ? migrate_swap_stop+0x9b0/0x9b0 [ 175.225318][T12154] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 175.231129][T12154] sock_create_kern+0x3b/0x50 [ 175.235819][T12154] io_uring_setup+0xc23/0x1a60 [ 175.240588][T12154] ? io_uring_release+0x50/0x50 [ 175.245434][T12154] ? fput_many+0x12c/0x1a0 [ 175.249871][T12154] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 175.255338][T12154] ? do_syscall_64+0x26/0x6a0 [ 175.260205][T12154] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.267864][T12154] ? do_syscall_64+0x26/0x6a0 [ 175.272541][T12154] ? lockdep_hardirqs_on+0x418/0x5d0 [ 175.277834][T12154] __x64_sys_io_uring_setup+0x54/0x80 [ 175.283210][T12154] do_syscall_64+0xfd/0x6a0 [ 175.287719][T12154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.293605][T12154] RIP: 0033:0x459819 [ 175.297503][T12154] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:28:11 executing program 5: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) [ 175.317109][T12154] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 175.325524][T12154] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 175.333499][T12154] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 175.341470][T12154] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 175.349445][T12154] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 175.357417][T12154] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 04:28:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001", 0x1d, 0x400}], 0x0, 0x0) [ 175.370426][T12154] socket: no more sockets 04:28:11 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0xfd, 0x9, 0xfffffffffffffffb, 0x2b50, 0x294a}, 0x14) acct(&(0x7f0000000c40)='./file0\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 04:28:11 executing program 5: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), 0x0, 0x0) 04:28:11 executing program 1 (fault-call:0 fault-nth:13): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:11 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:11 executing program 2: move_pages(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000001c0), 0x0) [ 175.495899][T12174] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001", 0x1d, 0x400}], 0x0, 0x0) 04:28:12 executing program 4: acct(&(0x7f0000000c40)='./file0\x00') eventfd2(0x7fffffff, 0x0) [ 175.624729][T12185] FAULT_INJECTION: forcing a failure. [ 175.624729][T12185] name failslab, interval 1, probability 0, space 0, times 0 [ 175.688516][T12185] CPU: 1 PID: 12185 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 175.697008][T12185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.707076][T12185] Call Trace: [ 175.710494][T12185] dump_stack+0x172/0x1f0 [ 175.714845][T12185] should_fail.cold+0xa/0x15 [ 175.719454][T12185] ? fault_create_debugfs_attr+0x180/0x180 [ 175.725793][T12185] ? ___might_sleep+0x163/0x280 [ 175.730655][T12185] __should_failslab+0x121/0x190 [ 175.735597][T12185] should_failslab+0x9/0x14 [ 175.740103][T12185] kmem_cache_alloc+0x2aa/0x710 [ 175.744954][T12185] ? __put_user_ns+0x70/0x70 [ 175.749554][T12185] security_inode_alloc+0x39/0x160 [ 175.754666][T12185] inode_init_always+0x56e/0xb50 [ 175.759736][T12185] alloc_inode+0x89/0x1e0 [ 175.764071][T12185] new_inode_pseudo+0x19/0xf0 [ 175.768755][T12185] sock_alloc+0x41/0x270 [ 175.773005][T12185] __sock_create+0xc2/0x730 [ 175.777510][T12185] ? migrate_swap_stop+0x9b0/0x9b0 [ 175.782627][T12185] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 175.788437][T12185] sock_create_kern+0x3b/0x50 [ 175.793122][T12185] io_uring_setup+0xc23/0x1a60 [ 175.797890][T12185] ? io_uring_release+0x50/0x50 [ 175.802741][T12185] ? fput_many+0x12c/0x1a0 [ 175.807436][T12185] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 175.812980][T12185] ? do_syscall_64+0x26/0x6a0 [ 175.817677][T12185] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.823746][T12185] ? do_syscall_64+0x26/0x6a0 [ 175.828545][T12185] ? lockdep_hardirqs_on+0x418/0x5d0 [ 175.833840][T12185] __x64_sys_io_uring_setup+0x54/0x80 [ 175.839224][T12185] do_syscall_64+0xfd/0x6a0 [ 175.843742][T12185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.849631][T12185] RIP: 0033:0x459819 [ 175.853530][T12185] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.873144][T12185] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 175.881570][T12185] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 04:28:12 executing program 2: move_pages(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:28:12 executing program 5: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), 0x0, 0x0) [ 175.889552][T12185] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 175.897531][T12185] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 175.905515][T12185] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 175.913498][T12185] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 [ 175.968118][T12185] socket: no more sockets 04:28:12 executing program 1 (fault-call:0 fault-nth:14): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:12 executing program 5: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), 0x0, 0x0) 04:28:12 executing program 2: move_pages(0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:28:12 executing program 4: acct(&(0x7f0000000040)='./file0\x00') stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getgid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x11, 0xffffffffffffffee, 0xff, 0x3, 0x63, 0xffffffffffffff9c, 0x4, [], 0x0, 0xffffffffffffff9c, 0x4, 0x1}, 0x3c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000680)=':&vmnet1system\x00', 0xffffffffffffff9c}, 0x10) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000700)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) fstat(r2, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000010001000000000002000500", @ANYRES32=r0, @ANYBLOB="040003000000000008000000", @ANYRES32=r1, @ANYBLOB="08000400", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="075f9e188e0dde5400", @ANYRES32=r5, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r6, @ANYBLOB="10000400000000002000060000000000"], 0x54, 0x1) [ 176.100860][T12197] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000", 0x2c, 0x400}], 0x0, 0x0) [ 176.276345][ T24] audit: type=1400 audit(1562992092.658:47): avc: denied { map_create } for pid=12207 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 04:28:12 executing program 2: move_pages(0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), &(0x7f00000001c0), 0x0) [ 176.325548][T12218] FAULT_INJECTION: forcing a failure. [ 176.325548][T12218] name failslab, interval 1, probability 0, space 0, times 0 [ 176.378296][T12218] CPU: 0 PID: 12218 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 176.385987][T12218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.396056][T12218] Call Trace: [ 176.399376][T12218] dump_stack+0x172/0x1f0 [ 176.403734][T12218] should_fail.cold+0xa/0x15 [ 176.408434][T12218] ? fault_create_debugfs_attr+0x180/0x180 [ 176.414429][T12218] ? ___might_sleep+0x163/0x280 [ 176.419303][T12218] __should_failslab+0x121/0x190 [ 176.424259][T12218] should_failslab+0x9/0x14 [ 176.428771][T12218] kmem_cache_alloc+0x2aa/0x710 [ 176.433637][T12218] ? __sock_create+0x382/0x730 [ 176.438418][T12218] sk_prot_alloc+0x67/0x310 [ 176.442945][T12218] sk_alloc+0x39/0xf70 [ 176.447031][T12218] unix_create1+0xc2/0x530 [ 176.451463][T12218] unix_create+0x103/0x1e0 [ 176.455898][T12218] __sock_create+0x3d8/0x730 [ 176.460495][T12218] ? migrate_swap_stop+0x9b0/0x9b0 [ 176.465620][T12218] sock_create_kern+0x3b/0x50 [ 176.470307][T12218] io_uring_setup+0xc23/0x1a60 [ 176.475078][T12218] ? io_uring_release+0x50/0x50 [ 176.479927][T12218] ? fput_many+0x12c/0x1a0 [ 176.484362][T12218] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 176.489828][T12218] ? do_syscall_64+0x26/0x6a0 [ 176.494514][T12218] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.500589][T12218] ? do_syscall_64+0x26/0x6a0 [ 176.505280][T12218] ? lockdep_hardirqs_on+0x418/0x5d0 [ 176.510577][T12218] __x64_sys_io_uring_setup+0x54/0x80 [ 176.515959][T12218] do_syscall_64+0xfd/0x6a0 [ 176.520468][T12218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.526363][T12218] RIP: 0033:0x459819 [ 176.530261][T12218] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.549872][T12218] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 176.558297][T12218] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 176.566390][T12218] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 04:28:13 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:13 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:13 executing program 2: move_pages(0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), &(0x7f00000001c0), 0x0) 04:28:13 executing program 4: acct(&(0x7f0000000c40)='./file0\x00') syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x4, &(0x7f0000000400)=[{&(0x7f0000000080)="3e35bd92cf9837412b44931fab021783c6c59a1faeccf528eb02904d5f79597a5a19551777726c114b990a5a8b9f3c478ca2c84578058f6f73e37e9431eacd2851eb0ca74039ed13bd9e6da438f82abffec1a86b6109ca229917a56cca389d5f11286dc8c32121b2e9777448fc0a385508079229e247df0927033970c0a02bcf15", 0x81, 0x7}, {&(0x7f0000000140)="c9f6664bfba302b7f6ba966737e91c05f1f9320aa153f10234c5dbeaf16e56483e81830f46ac77eb84e35a7c594ad7f752338d22197a3172a847905113cc0b7aaa30b591c276008188b4d2a78f234132425d4feb1be0590a4dbe0ebf79cacec82a02fdb1a32e369834dae40c9db82d172a2b29dc762a3e2ef60ed919a7e2a3fc50f1ac8963786c4f10c58dbe88c8f791ec7aed8e550d6df630c64b476355a646afc1094dababa52009032aae4d78e87244c0d75f881e61c6c72b5a25", 0xbc}, {&(0x7f0000000200)="20734ca90b51d60daea1987baa7f997e8994d9efc6962e0c30518695e7a0b0aa8167cc560d38b8f4285c98009075c72155bfd4fbf3837ede991b26baf5f1ced9a74e8301e1c3ba96af99342945ac0c49e27f29b485e9c26b208a9c39e021686f97d89fe3f5711a3d2041b4c7d5e8096373aa566cdfdbd4d22a546fb671a092775439eab458bd3a35f96fec62057674e4a18aafc6540f5f27de2e2c90fc9d56a29541ab9f4016d27dda29c3c6309f17d051878baf89f76896261272ccd00f5f8be69f1d16b0a3f96d8019d7e6a7221be56641867e206ed1539a9cdcd6478d029fdf315b17176b22", 0xe7}, {&(0x7f0000000300)="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", 0xfc, 0x4}], 0x1042080, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) [ 176.574365][T12218] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 176.582346][T12218] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 176.590404][T12218] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 [ 176.663692][T12223] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:13 executing program 1 (fault-call:0 fault-nth:15): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:13 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:28:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000", 0x2c, 0x400}], 0x0, 0x0) 04:28:13 executing program 4: r0 = accept(0xffffffffffffff9c, &(0x7f0000000100)=@xdp, &(0x7f0000000180)=0x80) getsockname(r0, &(0x7f00000001c0)=@ethernet={0x0, @random}, &(0x7f0000000240)=0x80) acct(&(0x7f0000000c40)='./file0\x00') stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast1, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000980)={0x0, 0x0}, &(0x7f00000009c0)=0xc) fstat(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000a80)=0x0, &(0x7f0000000ac0), &(0x7f0000000b00)) getresgid(&(0x7f0000000b40), &(0x7f0000000b80)=0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000c80)={{}, {0x1, 0x4}, [{0x2, 0x5, r1}, {0x2, 0x7, r2}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x1, r5}], {0x4, 0x7}, [{0x8, 0x6, r6}, {0x8, 0x5, r7}, {0x8, 0x5, r8}], {0x10, 0x7}, {0x20, 0x4}}, 0x64, 0x2) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) open_tree(r9, &(0x7f00000000c0)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x108, 0x2) [ 176.920987][T12250] FAULT_INJECTION: forcing a failure. [ 176.920987][T12250] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 176.934246][T12250] CPU: 1 PID: 12250 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 176.942007][T12250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.952079][T12250] Call Trace: [ 176.955391][T12250] dump_stack+0x172/0x1f0 [ 176.959743][T12250] should_fail.cold+0xa/0x15 [ 176.964347][T12250] ? mark_lock+0xc0/0x11e0 [ 176.968783][T12250] ? fault_create_debugfs_attr+0x180/0x180 [ 176.974597][T12250] ? rcu_read_unlock+0x16/0x60 [ 176.979375][T12250] ? find_held_lock+0x35/0x130 [ 176.984153][T12250] should_fail_alloc_page+0x50/0x60 [ 176.989361][T12250] __alloc_pages_nodemask+0x1a1/0x900 [ 176.994739][T12250] ? lock_downgrade+0x920/0x920 [ 176.999603][T12250] ? __alloc_pages_slowpath+0x25a0/0x25a0 [ 177.005339][T12250] ? rcu_read_unlock+0x33/0x60 [ 177.010115][T12250] cache_grow_begin+0x90/0xd20 [ 177.014883][T12250] ? sk_prot_alloc+0x67/0x310 [ 177.019567][T12250] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 177.025818][T12250] kmem_cache_alloc+0x650/0x710 [ 177.030687][T12250] sk_prot_alloc+0x67/0x310 [ 177.035193][T12250] sk_alloc+0x39/0xf70 [ 177.039273][T12250] unix_create1+0xc2/0x530 [ 177.043784][T12250] unix_create+0x103/0x1e0 [ 177.048204][T12250] __sock_create+0x3d8/0x730 [ 177.052792][T12250] ? migrate_swap_stop+0x9b0/0x9b0 [ 177.057908][T12250] sock_create_kern+0x3b/0x50 [ 177.062587][T12250] io_uring_setup+0xc23/0x1a60 [ 177.067360][T12250] ? io_uring_release+0x50/0x50 [ 177.072215][T12250] ? fput_many+0x12c/0x1a0 [ 177.076678][T12250] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 177.082144][T12250] ? do_syscall_64+0x26/0x6a0 [ 177.086831][T12250] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.092904][T12250] ? do_syscall_64+0x26/0x6a0 [ 177.097591][T12250] ? lockdep_hardirqs_on+0x418/0x5d0 [ 177.102888][T12250] __x64_sys_io_uring_setup+0x54/0x80 [ 177.108266][T12250] do_syscall_64+0xfd/0x6a0 [ 177.112775][T12250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.118662][T12250] RIP: 0033:0x459819 [ 177.122558][T12250] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 177.142162][T12250] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 177.150582][T12250] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 177.158560][T12250] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 177.166529][T12250] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 177.174499][T12250] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 177.182472][T12250] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 04:28:13 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) [ 177.222244][T12254] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:13 executing program 4: acct(&(0x7f0000000040)='./file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400, 0x0) 04:28:13 executing program 1 (fault-call:0 fault-nth:16): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000", 0x2c, 0x400}], 0x0, 0x0) [ 177.588968][T12273] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 177.625286][T12277] FAULT_INJECTION: forcing a failure. [ 177.625286][T12277] name failslab, interval 1, probability 0, space 0, times 0 [ 177.646411][T12277] CPU: 0 PID: 12277 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 177.654091][T12277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.664142][T12277] Call Trace: [ 177.667428][T12277] dump_stack+0x172/0x1f0 [ 177.671750][T12277] should_fail.cold+0xa/0x15 [ 177.676323][T12277] ? fault_create_debugfs_attr+0x180/0x180 [ 177.682115][T12277] ? ___might_sleep+0x163/0x280 [ 177.686951][T12277] __should_failslab+0x121/0x190 [ 177.691873][T12277] should_failslab+0x9/0x14 [ 177.696462][T12277] kmem_cache_alloc+0x2aa/0x710 [ 177.701293][T12277] ? find_held_lock+0x35/0x130 [ 177.706041][T12277] ? __alloc_fd+0x487/0x620 [ 177.710527][T12277] __d_alloc+0x2e/0x8c0 [ 177.714664][T12277] d_alloc_pseudo+0x1e/0x70 [ 177.719146][T12277] alloc_file_pseudo+0xe2/0x280 [ 177.724460][T12277] ? alloc_file+0x4d0/0x4d0 [ 177.728950][T12277] ? _raw_spin_unlock+0x2d/0x50 [ 177.733783][T12277] ? __alloc_fd+0x487/0x620 [ 177.738270][T12277] anon_inode_getfile+0xda/0x200 [ 177.743189][T12277] io_uring_setup+0xc78/0x1a60 [ 177.747934][T12277] ? io_uring_release+0x50/0x50 [ 177.752764][T12277] ? fput_many+0x12c/0x1a0 [ 177.757166][T12277] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 177.762602][T12277] ? do_syscall_64+0x26/0x6a0 [ 177.767614][T12277] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.773660][T12277] ? do_syscall_64+0x26/0x6a0 [ 177.778322][T12277] ? lockdep_hardirqs_on+0x418/0x5d0 [ 177.783589][T12277] __x64_sys_io_uring_setup+0x54/0x80 [ 177.788943][T12277] do_syscall_64+0xfd/0x6a0 [ 177.793428][T12277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.799300][T12277] RIP: 0033:0x459819 [ 177.803177][T12277] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 177.822760][T12277] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 177.831152][T12277] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 177.839101][T12277] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 177.847050][T12277] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 177.855014][T12277] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 177.862966][T12277] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 04:28:14 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:14 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f00000001c0), 0x0) 04:28:14 executing program 4: acct(&(0x7f0000000c40)='./file0\x00') socket$inet_dccp(0x2, 0x6, 0x0) 04:28:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000", 0x2c, 0x400}], 0x0, 0x0) 04:28:14 executing program 1 (fault-call:0 fault-nth:17): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x0, 0x0) 04:28:14 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), 0x0, 0x0) [ 178.177533][T12287] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 04:28:14 executing program 4: acct(&(0x7f0000000c40)='./file0\x00') r0 = socket$unix(0x1, 0x7, 0x0) accept4$unix(r0, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x20e50f6824be6fd2, 0x800) [ 178.230416][T12298] FAULT_INJECTION: forcing a failure. [ 178.230416][T12298] name failslab, interval 1, probability 0, space 0, times 0 [ 178.256068][T12298] CPU: 0 PID: 12298 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 178.263732][T12298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.273783][T12298] Call Trace: [ 178.277088][T12298] dump_stack+0x172/0x1f0 [ 178.281437][T12298] should_fail.cold+0xa/0x15 [ 178.286043][T12298] ? fault_create_debugfs_attr+0x180/0x180 [ 178.291866][T12298] ? ___might_sleep+0x163/0x280 [ 178.296724][T12298] __should_failslab+0x121/0x190 [ 178.301668][T12298] should_failslab+0x9/0x14 [ 178.306177][T12298] kmem_cache_alloc+0x2aa/0x710 [ 178.311028][T12298] ? find_held_lock+0x35/0x130 [ 178.315802][T12298] ? __alloc_fd+0x487/0x620 [ 178.320319][T12298] __d_alloc+0x2e/0x8c0 [ 178.324565][T12298] d_alloc_pseudo+0x1e/0x70 [ 178.329071][T12298] alloc_file_pseudo+0xe2/0x280 [ 178.333919][T12298] ? alloc_file+0x4d0/0x4d0 [ 178.338536][T12298] ? _raw_spin_unlock+0x2d/0x50 [ 178.343391][T12298] ? __alloc_fd+0x487/0x620 [ 178.347902][T12298] anon_inode_getfile+0xda/0x200 [ 178.352846][T12298] io_uring_setup+0xc78/0x1a60 [ 178.357612][T12298] ? io_uring_release+0x50/0x50 [ 178.362458][T12298] ? fput_many+0x12c/0x1a0 [ 178.366887][T12298] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 178.372345][T12298] ? do_syscall_64+0x26/0x6a0 [ 178.377021][T12298] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.383093][T12298] ? do_syscall_64+0x26/0x6a0 [ 178.387767][T12298] ? lockdep_hardirqs_on+0x418/0x5d0 [ 178.393110][T12298] __x64_sys_io_uring_setup+0x54/0x80 [ 178.398474][T12298] do_syscall_64+0xfd/0x6a0 [ 178.402958][T12298] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.408842][T12298] RIP: 0033:0x459819 [ 178.412714][T12298] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 178.432292][T12298] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 178.440683][T12298] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 178.448647][T12298] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 178.456596][T12298] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 178.464553][T12298] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 178.472503][T12298] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 [ 178.524950][T12297] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:14 executing program 1 (fault-call:0 fault-nth:18): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:15 executing program 5: r0 = accept(0xffffffffffffff9c, &(0x7f0000000100)=@xdp, &(0x7f0000000180)=0x80) getsockname(r0, &(0x7f00000001c0)=@ethernet={0x0, @random}, &(0x7f0000000240)=0x80) acct(&(0x7f0000000c40)='./file0\x00') stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast1, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000980)={0x0, 0x0}, &(0x7f00000009c0)=0xc) fstat(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000a80)=0x0, &(0x7f0000000ac0), &(0x7f0000000b00)) getresgid(&(0x7f0000000b40), &(0x7f0000000b80)=0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000c80)={{}, {0x1, 0x4}, [{0x2, 0x5, r1}, {0x2, 0x7, r2}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x1, r5}], {0x4, 0x7}, [{0x8, 0x6, r6}, {0x8, 0x5, r7}, {0x8, 0x5, r8}], {0x10, 0x7}, {0x20, 0x4}}, 0x64, 0x2) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) open_tree(r9, &(0x7f00000000c0)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x108, 0x2) 04:28:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x0, 0x0) 04:28:15 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), 0x0, 0x0) [ 178.755502][T12313] FAULT_INJECTION: forcing a failure. [ 178.755502][T12313] name failslab, interval 1, probability 0, space 0, times 0 [ 178.848144][T12313] CPU: 1 PID: 12313 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 178.855957][T12313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.866017][T12313] Call Trace: [ 178.869327][T12313] dump_stack+0x172/0x1f0 [ 178.873676][T12313] should_fail.cold+0xa/0x15 [ 178.878281][T12313] ? fault_create_debugfs_attr+0x180/0x180 [ 178.884190][T12313] ? ___might_sleep+0x163/0x280 [ 178.889049][T12313] __should_failslab+0x121/0x190 [ 178.894520][T12313] should_failslab+0x9/0x14 [ 178.899037][T12313] kmem_cache_alloc+0x2aa/0x710 [ 178.903894][T12313] ? rcu_read_lock_sched_held+0x110/0x130 [ 178.909615][T12313] ? kmem_cache_alloc+0x364/0x710 [ 178.914644][T12313] security_file_alloc+0x39/0x170 [ 178.919672][T12313] __alloc_file+0xac/0x300 [ 178.924087][T12313] alloc_empty_file+0x72/0x170 [ 178.928861][T12313] alloc_file+0x5e/0x4d0 [ 178.933109][T12313] alloc_file_pseudo+0x189/0x280 [ 178.938045][T12313] ? alloc_file+0x4d0/0x4d0 [ 178.942548][T12313] ? _raw_spin_unlock+0x2d/0x50 [ 178.947412][T12313] anon_inode_getfile+0xda/0x200 [ 178.952357][T12313] io_uring_setup+0xc78/0x1a60 [ 178.957123][T12313] ? io_uring_release+0x50/0x50 [ 178.961974][T12313] ? fput_many+0x12c/0x1a0 [ 178.966406][T12313] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 178.971876][T12313] ? do_syscall_64+0x26/0x6a0 [ 178.976565][T12313] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.982643][T12313] ? do_syscall_64+0x26/0x6a0 [ 178.987330][T12313] ? lockdep_hardirqs_on+0x418/0x5d0 [ 178.992714][T12313] __x64_sys_io_uring_setup+0x54/0x80 [ 178.998096][T12313] do_syscall_64+0xfd/0x6a0 [ 179.002621][T12313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.008515][T12313] RIP: 0033:0x459819 [ 179.012412][T12313] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 179.032019][T12313] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 179.040437][T12313] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 [ 179.048413][T12313] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 179.056391][T12313] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 179.064412][T12313] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 179.072390][T12313] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 [ 179.124245][T12323] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:15 executing program 5: r0 = accept(0xffffffffffffff9c, &(0x7f0000000100)=@xdp, &(0x7f0000000180)=0x80) getsockname(r0, &(0x7f00000001c0)=@ethernet={0x0, @random}, &(0x7f0000000240)=0x80) acct(&(0x7f0000000c40)='./file0\x00') stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast1, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000980)={0x0, 0x0}, &(0x7f00000009c0)=0xc) fstat(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000a80)=0x0, &(0x7f0000000ac0), &(0x7f0000000b00)) getresgid(&(0x7f0000000b40), &(0x7f0000000b80)=0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000c80)={{}, {0x1, 0x4}, [{0x2, 0x5, r1}, {0x2, 0x7, r2}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x1, r5}], {0x4, 0x7}, [{0x8, 0x6, r6}, {0x8, 0x5, r7}, {0x8, 0x5, r8}], {0x10, 0x7}, {0x20, 0x4}}, 0x64, 0x2) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) open_tree(r9, &(0x7f00000000c0)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x108, 0x2) 04:28:15 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:15 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080), 0x0, 0x0) 04:28:15 executing program 1 (fault-call:0 fault-nth:19): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:15 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x20400082}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x78, r1, 0x101, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8349}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xef5}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000a80)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x80d08a26}, 0xc, &(0x7f0000000a40)={&(0x7f0000000900)={0x10c, r1, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x120000000000}]}, @TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4000}, 0x4008810) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x208}, 0xc, &(0x7f0000000480)={&(0x7f00000000c0)={0x3a8, r1, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x11c, 0x4, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x14800000000000}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4d8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x632}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x85f}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2900000000000}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x940}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffff001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}]}, @TIPC_NLA_LINK={0xc0, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1d}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x93ccc6f4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffe}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_BEARER={0xa8, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf0e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1f}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x400, @mcast2, 0x3}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x1, @rand_addr="b7463405ad724cf3d6baba17f3149740", 0x268}}}}]}]}, 0x3a8}, 0x1, 0x0, 0x0, 0x4000000}, 0x8004) acct(&(0x7f0000000c40)='./file0\x00') write$P9_RAUTH(r0, &(0x7f0000000b00)={0x14, 0x67, 0x2, {0x82, 0x3, 0x2}}, 0x14) link(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)='./file0\x00') rename(&(0x7f0000000c00)='./file0/file0\x00', &(0x7f0000000c80)='./file0\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000ac0)={r0, 0x0, 0x4, 0x2, 0xfffffffffffffffc}) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0x94, r2, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x42fd800000}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x8014}, 0x4008010) mkdir(&(0x7f0000000880)='./file0\x00', 0x3) 04:28:15 executing program 5: r0 = accept(0xffffffffffffff9c, &(0x7f0000000100)=@xdp, &(0x7f0000000180)=0x80) getsockname(r0, &(0x7f00000001c0)=@ethernet={0x0, @random}, &(0x7f0000000240)=0x80) acct(&(0x7f0000000c40)='./file0\x00') stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast1, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000980)={0x0, 0x0}, &(0x7f00000009c0)=0xc) fstat(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000a80)=0x0, &(0x7f0000000ac0), &(0x7f0000000b00)) getresgid(&(0x7f0000000b40), &(0x7f0000000b80)=0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000c80)={{}, {0x1, 0x4}, [{0x2, 0x5, r1}, {0x2, 0x7, r2}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x1, r5}], {0x4, 0x7}, [{0x8, 0x6, r6}, {0x8, 0x5, r7}, {0x8, 0x5, r8}], {0x10, 0x7}, {0x20, 0x4}}, 0x64, 0x2) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) open_tree(r9, &(0x7f00000000c0)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x108, 0x2) 04:28:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x0, 0x0) [ 179.294479][T12336] FAULT_INJECTION: forcing a failure. [ 179.294479][T12336] name failslab, interval 1, probability 0, space 0, times 0 [ 179.404510][T12336] CPU: 1 PID: 12336 Comm: syz-executor.1 Not tainted 5.2.0+ #53 [ 179.412194][T12336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.422261][T12336] Call Trace: [ 179.425572][T12336] dump_stack+0x172/0x1f0 [ 179.429926][T12336] should_fail.cold+0xa/0x15 [ 179.434539][T12336] ? fault_create_debugfs_attr+0x180/0x180 [ 179.440370][T12336] ? ___might_sleep+0x163/0x280 [ 179.445241][T12336] __should_failslab+0x121/0x190 [ 179.450187][T12336] should_failslab+0x9/0x14 [ 179.454695][T12336] kmem_cache_alloc+0x2aa/0x710 [ 179.459552][T12336] ? rcu_read_lock_sched_held+0x110/0x130 [ 179.465268][T12336] ? kmem_cache_alloc+0x364/0x710 [ 179.470484][T12336] security_file_alloc+0x39/0x170 [ 179.475522][T12336] __alloc_file+0xac/0x300 [ 179.479943][T12336] alloc_empty_file+0x72/0x170 [ 179.484710][T12336] alloc_file+0x5e/0x4d0 [ 179.488954][T12336] alloc_file_pseudo+0x189/0x280 [ 179.493890][T12336] ? alloc_file+0x4d0/0x4d0 [ 179.498393][T12336] ? _raw_spin_unlock+0x2d/0x50 [ 179.503258][T12336] anon_inode_getfile+0xda/0x200 [ 179.508200][T12336] io_uring_setup+0xc78/0x1a60 [ 179.512963][T12336] ? io_uring_release+0x50/0x50 [ 179.517901][T12336] ? fput_many+0x12c/0x1a0 [ 179.522330][T12336] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 179.527785][T12336] ? do_syscall_64+0x26/0x6a0 [ 179.532468][T12336] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.538543][T12336] ? do_syscall_64+0x26/0x6a0 [ 179.543231][T12336] ? lockdep_hardirqs_on+0x418/0x5d0 [ 179.548525][T12336] __x64_sys_io_uring_setup+0x54/0x80 [ 179.553903][T12336] do_syscall_64+0xfd/0x6a0 [ 179.558409][T12336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.564297][T12336] RIP: 0033:0x459819 [ 179.568191][T12336] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 179.587871][T12336] RSP: 002b:00007f139c2ebc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 179.596348][T12336] RAX: ffffffffffffffda RBX: 00007f139c2ebc90 RCX: 0000000000459819 04:28:16 executing program 2: acct(&(0x7f0000000c40)='./file0\x00') syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x4, &(0x7f0000000400)=[{&(0x7f0000000080)="3e35bd92cf9837412b44931fab021783c6c59a1faeccf528eb02904d5f79597a5a19551777726c114b990a5a8b9f3c478ca2c84578058f6f73e37e9431eacd2851eb0ca74039ed13bd9e6da438f82abffec1a86b6109ca229917a56cca389d5f11286dc8c32121b2e9777448fc0a385508079229e247df0927033970c0a02bcf15", 0x81, 0x7}, {&(0x7f0000000140)="c9f6664bfba302b7f6ba966737e91c05f1f9320aa153f10234c5dbeaf16e56483e81830f46ac77eb84e35a7c594ad7f752338d22197a3172a847905113cc0b7aaa30b591c276008188b4d2a78f234132425d4feb1be0590a4dbe0ebf79cacec82a02fdb1a32e369834dae40c9db82d172a2b29dc762a3e2ef60ed919a7e2a3fc50f1ac8963786c4f10c58dbe88c8f791ec7aed8e550d6df630c64b476355a646afc1094dababa52009032aae4d78e87244c0d75f881e61c6c72b5a25", 0xbc}, {&(0x7f0000000200)="20734ca90b51d60daea1987baa7f997e8994d9efc6962e0c30518695e7a0b0aa8167cc560d38b8f4285c98009075c72155bfd4fbf3837ede991b26baf5f1ced9a74e8301e1c3ba96af99342945ac0c49e27f29b485e9c26b208a9c39e021686f97d89fe3f5711a3d2041b4c7d5e8096373aa566cdfdbd4d22a546fb671a092775439eab458bd3a35f96fec62057674e4a18aafc6540f5f27de2e2c90fc9d56a29541ab9f4016d27dda29c3c6309f17d051878baf89f76896261272ccd00f5f8be69f1d16b0a3f96d8019d7e6a7221be56641867e206ed1539a9cdcd6478d029fdf315b17176b22", 0xe7}, {&(0x7f0000000300)="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", 0xfc, 0x4}], 0x1042080, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 04:28:16 executing program 4: acct(&(0x7f0000000c40)='./file0\x00') r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) [ 179.604519][T12336] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 00000000000006b2 [ 179.612473][T12336] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 179.620429][T12336] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f139c2ec6d4 [ 179.628515][T12336] R13: 00000000004c0c1a R14: 00000000004d3a68 R15: 0000000000000003 04:28:16 executing program 1 (fault-call:0 fault-nth:20): io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:16 executing program 5: r0 = accept(0xffffffffffffff9c, &(0x7f0000000100)=@xdp, &(0x7f0000000180)=0x80) getsockname(r0, &(0x7f00000001c0)=@ethernet={0x0, @random}, &(0x7f0000000240)=0x80) acct(&(0x7f0000000c40)='./file0\x00') stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast1, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000980)={0x0, 0x0}, &(0x7f00000009c0)=0xc) fstat(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000a80)=0x0, &(0x7f0000000ac0), &(0x7f0000000b00)) getresgid(&(0x7f0000000b40), &(0x7f0000000b80)=0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000c80)={{}, {0x1, 0x4}, [{0x2, 0x5, r1}, {0x2, 0x7, r2}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x1, r5}], {0x4, 0x7}, [{0x8, 0x6, r6}, {0x8, 0x5, r7}, {0x8, 0x5, r8}], {0x10, 0x7}, {0x20, 0x4}}, 0x64, 0x2) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) open_tree(r9, &(0x7f00000000c0)='./file0\x00', 0x0) [ 179.770636][T12353] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:16 executing program 4: acct(&(0x7f0000000000)='./file0\x00') r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x401, 0x80c40) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) 04:28:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x0, 0x0) [ 180.167417][T12379] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:16 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) 04:28:16 executing program 1: io_uring_setup(0x6b2, &(0x7f0000000840)={0x0, 0x0, 0x7}) 04:28:16 executing program 2: acct(&(0x7f0000000c40)='./file0\x00') syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x4, &(0x7f0000000400)=[{&(0x7f0000000080)="3e35bd92cf9837412b44931fab021783c6c59a1faeccf528eb02904d5f79597a5a19551777726c114b990a5a8b9f3c478ca2c84578058f6f73e37e9431eacd2851eb0ca74039ed13bd9e6da438f82abffec1a86b6109ca229917a56cca389d5f11286dc8c32121b2e9777448fc0a385508079229e247df0927033970c0a02bcf15", 0x81, 0x7}, {&(0x7f0000000140)="c9f6664bfba302b7f6ba966737e91c05f1f9320aa153f10234c5dbeaf16e56483e81830f46ac77eb84e35a7c594ad7f752338d22197a3172a847905113cc0b7aaa30b591c276008188b4d2a78f234132425d4feb1be0590a4dbe0ebf79cacec82a02fdb1a32e369834dae40c9db82d172a2b29dc762a3e2ef60ed919a7e2a3fc50f1ac8963786c4f10c58dbe88c8f791ec7aed8e550d6df630c64b476355a646afc1094dababa52009032aae4d78e87244c0d75f881e61c6c72b5a25", 0xbc}, {&(0x7f0000000200)="20734ca90b51d60daea1987baa7f997e8994d9efc6962e0c30518695e7a0b0aa8167cc560d38b8f4285c98009075c72155bfd4fbf3837ede991b26baf5f1ced9a74e8301e1c3ba96af99342945ac0c49e27f29b485e9c26b208a9c39e021686f97d89fe3f5711a3d2041b4c7d5e8096373aa566cdfdbd4d22a546fb671a092775439eab458bd3a35f96fec62057674e4a18aafc6540f5f27de2e2c90fc9d56a29541ab9f4016d27dda29c3c6309f17d051878baf89f76896261272ccd00f5f8be69f1d16b0a3f96d8019d7e6a7221be56641867e206ed1539a9cdcd6478d029fdf315b17176b22", 0xe7}, {&(0x7f0000000300)="f6740bcf2b3d5cb53dee48a9044454c487e4dba59949d0684d81cff95bd423ef0aa474a114cde7400e68dc46d9d9a6ef13b82a8cab5cb58c314ebbfc46ae81e930fd09fac047b0278dd06c9ac8a94c298021acf5fc1c88954cc4569eaa952dd870630b911bac53cccf62d7e98748e7e41ab182daa9e9b247912dcc2954bfd3f8c6d439cf76fff41edee300416267b04d5c51607de2ab74e76efdb5713379dd74d90238f565b9c9f03536dce0e2a82bfbddbfe0448c67bd0fa5c75ec84b3181f5d06144e932add406f2bc6f497f0b05b1232716fdfe77336d52e5f070e9691f039c81a460d090bff7344b814d245291d8d8ada7dc410806d44178e3be", 0xfc, 0x4}], 0x1042080, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 04:28:16 executing program 5: r0 = accept(0xffffffffffffff9c, &(0x7f0000000100)=@xdp, &(0x7f0000000180)=0x80) getsockname(r0, &(0x7f00000001c0)=@ethernet={0x0, @random}, &(0x7f0000000240)=0x80) acct(&(0x7f0000000c40)='./file0\x00') stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast1, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000980)={0x0, 0x0}, &(0x7f00000009c0)=0xc) fstat(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000a80)=0x0, &(0x7f0000000ac0), &(0x7f0000000b00)) getresgid(&(0x7f0000000b40), &(0x7f0000000b80)=0x0, &(0x7f0000000bc0)) lsetxattr$system_posix_acl(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000c80)={{}, {0x1, 0x4}, [{0x2, 0x5, r1}, {0x2, 0x7, r2}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x1, r5}], {0x4, 0x7}, [{0x8, 0x6, r6}, {0x8, 0x5, r7}, {0x8, 0x5, r8}], {0x10, 0x7}, {0x20, 0x4}}, 0x64, 0x2) open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 04:28:16 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x40000008001, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e24, @local}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}], 0x20) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0xbf, 0x4) acct(&(0x7f0000000c40)='./file0\x00') 04:28:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x0, 0x0) 04:28:16 executing program 5: r0 = accept(0xffffffffffffff9c, &(0x7f0000000100)=@xdp, &(0x7f0000000180)=0x80) getsockname(r0, &(0x7f00000001c0)=@ethernet={0x0, @random}, &(0x7f0000000240)=0x80) acct(&(0x7f0000000c40)='./file0\x00') stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast1, @in6=@ipv4={[], [], @empty}}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@remote, @in=@local}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) fstat(r0, &(0x7f0000000a00)) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getresgid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 04:28:16 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x298b}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x7, 0x6, 0x200, 0x0, 0x10040000000000}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={r1, 0x0, 0x1, 0x9, 0x6, 0xd191, 0x80000000, 0x1, {r2, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x8ea5, 0x3, 0x3b222adf, 0x9, 0x2}}, &(0x7f00000002c0)=0xb0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='[\\![vboxnet1,nodev\x00') acct(&(0x7f0000000c40)='./file0\x00') 04:28:16 executing program 2: acct(&(0x7f0000000c40)='./file0\x00') syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x4, &(0x7f0000000400)=[{&(0x7f0000000080)="3e35bd92cf9837412b44931fab021783c6c59a1faeccf528eb02904d5f79597a5a19551777726c114b990a5a8b9f3c478ca2c84578058f6f73e37e9431eacd2851eb0ca74039ed13bd9e6da438f82abffec1a86b6109ca229917a56cca389d5f11286dc8c32121b2e9777448fc0a385508079229e247df0927033970c0a02bcf15", 0x81, 0x7}, {&(0x7f0000000140)="c9f6664bfba302b7f6ba966737e91c05f1f9320aa153f10234c5dbeaf16e56483e81830f46ac77eb84e35a7c594ad7f752338d22197a3172a847905113cc0b7aaa30b591c276008188b4d2a78f234132425d4feb1be0590a4dbe0ebf79cacec82a02fdb1a32e369834dae40c9db82d172a2b29dc762a3e2ef60ed919a7e2a3fc50f1ac8963786c4f10c58dbe88c8f791ec7aed8e550d6df630c64b476355a646afc1094dababa52009032aae4d78e87244c0d75f881e61c6c72b5a25", 0xbc}, {&(0x7f0000000200)="20734ca90b51d60daea1987baa7f997e8994d9efc6962e0c30518695e7a0b0aa8167cc560d38b8f4285c98009075c72155bfd4fbf3837ede991b26baf5f1ced9a74e8301e1c3ba96af99342945ac0c49e27f29b485e9c26b208a9c39e021686f97d89fe3f5711a3d2041b4c7d5e8096373aa566cdfdbd4d22a546fb671a092775439eab458bd3a35f96fec62057674e4a18aafc6540f5f27de2e2c90fc9d56a29541ab9f4016d27dda29c3c6309f17d051878baf89f76896261272ccd00f5f8be69f1d16b0a3f96d8019d7e6a7221be56641867e206ed1539a9cdcd6478d029fdf315b17176b22", 0xe7}, {&(0x7f0000000300)="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", 0xfc, 0x4}], 0x1042080, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) [ 180.586908][T12406] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:17 executing program 5: r0 = accept(0xffffffffffffff9c, &(0x7f0000000100)=@xdp, &(0x7f0000000180)=0x80) getsockname(r0, &(0x7f00000001c0)=@ethernet={0x0, @random}, &(0x7f0000000240)=0x80) acct(&(0x7f0000000c40)='./file0\x00') stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast1, @in6=@ipv4={[], [], @empty}}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000700)={{{@in=@remote, @in=@local}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) fstat(r0, &(0x7f0000000a00)) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 04:28:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x0, 0x0) 04:28:17 executing program 4: acct(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x4) [ 180.901800][T12424] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 04:28:17 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) move_pages(0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), &(0x7f00000001c0), 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x2, {0xa0, 0x2}}, 0x14) [ 327.928373][ T1049] INFO: task syz-executor.1:12389 blocked for more than 143 seconds. [ 327.936793][ T1049] Not tainted 5.2.0+ #53 [ 327.942121][ T1049] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 327.950954][ T1049] syz-executor.1 D28152 12389 9426 0x00004004 [ 327.957294][ T1049] Call Trace: [ 327.960717][ T1049] __schedule+0x755/0x1580 [ 327.965317][ T1049] ? __sched_text_start+0x8/0x8 [ 327.970242][ T1049] ? __kasan_check_read+0x11/0x20 [ 327.975366][ T1049] ? __lock_acquire+0x16f2/0x4690 [ 327.980673][ T1049] schedule+0xa8/0x270 [ 327.985009][ T1049] schedule_timeout+0x717/0xc50 [ 327.989973][ T1049] ? find_held_lock+0x35/0x130 [ 327.994779][ T1049] ? usleep_range+0x170/0x170 [ 327.999575][ T1049] ? lock_downgrade+0x920/0x920 [ 328.004476][ T1049] ? _raw_spin_unlock_irq+0x28/0x90 [ 328.009857][ T1049] ? wait_for_completion+0x294/0x440 [ 328.015225][ T1049] ? _raw_spin_unlock_irq+0x28/0x90 [ 328.020712][ T1049] ? lockdep_hardirqs_on+0x418/0x5d0 [ 328.026075][ T1049] ? trace_hardirqs_on+0x67/0x240 [ 328.031256][ T1049] ? __kasan_check_read+0x11/0x20 [ 328.036336][ T1049] wait_for_completion+0x29c/0x440 [ 328.041526][ T1049] ? try_to_wake_up+0xde/0x1a10 [ 328.046505][ T1049] ? wait_for_completion_interruptible+0x470/0x470 [ 328.053275][ T1049] ? wake_up_q+0xf0/0xf0 [ 328.057728][ T1049] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 328.063779][ T1049] kthread_stop+0x131/0x730 [ 328.069363][ T1049] io_finish_async+0x73/0x140 [ 328.074095][ T1049] io_ring_ctx_wait_and_kill+0x133/0x600 [ 328.080060][ T1049] io_uring_release+0x42/0x50 [ 328.084811][ T1049] __fput+0x2ff/0x890 [ 328.088905][ T1049] ? io_ring_ctx_wait_and_kill+0x600/0x600 [ 328.094786][ T1049] ____fput+0x16/0x20 [ 328.098883][ T1049] task_work_run+0x145/0x1c0 [ 328.103532][ T1049] exit_to_usermode_loop+0x316/0x380 [ 328.109076][ T1049] do_syscall_64+0x5a9/0x6a0 [ 328.113753][ T1049] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.119939][ T1049] RIP: 0033:0x413501 [ 328.123933][ T1049] Code: 39 0f 87 d1 03 00 00 49 89 f2 45 31 db 45 31 e4 eb 27 4d 8d 6b 08 44 0f b6 36 49 89 cf 4c 89 d9 49 d3 e6 48 83 f9 40 4c 89 f9 <4d> 19 ff 4d 21 f7 4d 09 fc 48 ff c6 4d 89 eb 4d 39 cb 72 d4 4c 89 [ 328.143665][ T1049] RSP: 002b:00007fff0146e030 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 328.152201][ T1049] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413501 [ 328.160317][ T1049] RDX: 0000001b30d20000 RSI: 0000000000000000 RDI: 0000000000000003 [ 328.168400][ T1049] RBP: 0000000000000001 R08: 0000001b31d20000 R09: 00007f139e2ed3e8 [ 328.176492][ T1049] R10: 0000000000000001 R11: 0000000000000293 R12: 000000000075bf20 [ 328.184715][ T1049] R13: 000000000002c0a1 R14: 00000000007604b0 R15: ffffffffffffffff [ 328.192822][ T1049] [ 328.192822][ T1049] Showing all locks held in the system: [ 328.201622][ T1049] 3 locks held by kworker/u4:1/21: [ 328.206809][ T1049] #0: 000000005532b085 (&rq->lock){-.-.}, at: pick_next_task_fair+0xc44/0x1a60 [ 328.216093][ T1049] #1: 00000000ede0504c (rcu_read_lock){....}, at: __update_idle_core+0x45/0x3f0 [ 328.225329][ T1049] #2: 0000000043c68db9 (&base->lock){..-.}, at: lock_timer_base+0x56/0x1b0 [ 328.234190][ T1049] 1 lock held by khungtaskd/1049: [ 328.239340][ T1049] #0: 00000000ede0504c (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 328.248823][ T1049] 3 locks held by rs:main Q:Reg/9257: [ 328.254323][ T1049] 1 lock held by rsyslogd/9259: [ 328.259285][ T1049] 2 locks held by getty/9381: [ 328.263995][ T1049] #0: 000000008dc53839 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 328.273142][ T1049] #1: 000000003e69e89d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 328.282825][ T1049] 2 locks held by getty/9382: [ 328.287560][ T1049] #0: 000000006fafaf07 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 328.296671][ T1049] #1: 000000006496ef85 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 328.306457][ T1049] 2 locks held by getty/9383: [ 328.311255][ T1049] #0: 00000000f01bece9 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 328.320573][ T1049] #1: 000000000fca06ba (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 328.330937][ T1049] 2 locks held by getty/9384: [ 328.335670][ T1049] #0: 00000000aff2ae29 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 328.344771][ T1049] #1: 00000000a4d948b1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 328.354468][ T1049] 2 locks held by getty/9385: [ 328.359341][ T1049] #0: 00000000ebcd573b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 328.368538][ T1049] #1: 0000000088f61173 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 328.378241][ T1049] 2 locks held by getty/9386: [ 328.382957][ T1049] #0: 00000000baeda5ac (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 328.392113][ T1049] #1: 00000000b167d432 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 328.401823][ T1049] 2 locks held by getty/9387: [ 328.406535][ T1049] #0: 00000000cf8fa0dd (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 328.415715][ T1049] #1: 000000001f94c855 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 328.425440][ T1049] [ 328.427809][ T1049] ============================================= [ 328.427809][ T1049] [ 328.436376][ T1049] NMI backtrace for cpu 1 [ 328.440840][ T1049] CPU: 1 PID: 1049 Comm: khungtaskd Not tainted 5.2.0+ #53 [ 328.448031][ T1049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.458076][ T1049] Call Trace: [ 328.461416][ T1049] dump_stack+0x172/0x1f0 [ 328.465735][ T1049] nmi_cpu_backtrace.cold+0x70/0xb2 [ 328.470930][ T1049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.477198][ T1049] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 328.482821][ T1049] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 328.488778][ T1049] arch_trigger_cpumask_backtrace+0x14/0x20 [ 328.494651][ T1049] watchdog+0x9d0/0xef0 [ 328.498802][ T1049] kthread+0x361/0x430 [ 328.502849][ T1049] ? reset_hung_task_detector+0x30/0x30 [ 328.508420][ T1049] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 328.514768][ T1049] ret_from_fork+0x24/0x30 [ 328.519373][ T1049] Sending NMI from CPU 1 to CPUs 0: [ 328.524698][ C0] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0xe/0x10 [ 328.526565][ T1049] Kernel panic - not syncing: hung_task: blocked tasks [ 328.539767][ T1049] CPU: 1 PID: 1049 Comm: khungtaskd Not tainted 5.2.0+ #53 [ 328.546942][ T1049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.556974][ T1049] Call Trace: [ 328.560248][ T1049] dump_stack+0x172/0x1f0 [ 328.564571][ T1049] panic+0x2dc/0x755 [ 328.568443][ T1049] ? add_taint.cold+0x16/0x16 [ 328.573486][ T1049] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 328.579120][ T1049] ? ___preempt_schedule+0x16/0x18 [ 328.584208][ T1049] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 328.590342][ T1049] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 328.596475][ T1049] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 328.602618][ T1049] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 328.608805][ T1049] watchdog+0x9e1/0xef0 [ 328.612966][ T1049] kthread+0x361/0x430 [ 328.617012][ T1049] ? reset_hung_task_detector+0x30/0x30 [ 328.622535][ T1049] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 328.628759][ T1049] ret_from_fork+0x24/0x30 [ 328.634553][ T1049] Kernel Offset: disabled [ 328.638878][ T1049] Rebooting in 86400 seconds..