xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xe000000}) 21:20:56 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@discard='discard'}, {@loccookie='loccookie'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ntfs\x00'}}, {@obj_user={'obj_user'}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'em1'}}]}) 21:20:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x30}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 920.013521][ T3015] gfs2: invalid mount option: smackfstransmute=ntfs [ 920.053697][ T3015] gfs2: can't parse mount arguments 21:20:56 executing program 5: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:20:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:20:57 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@discard='discard'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ntfs\x00'}}, {@obj_user={'obj_user'}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'em1'}}]}) [ 920.320786][ T27] audit: type=1800 audit(1556832057.050:855): pid=3008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16570 res=0 [ 920.447580][ T3027] gfs2: invalid mount option: smackfstransmute=ntfs [ 920.475204][ T3027] gfs2: can't parse mount arguments 21:20:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', &(0x7f00000004c0)='./file0/../file0\x00') syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:20:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:20:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000180)={0x0, @bt={0x9, 0x100000001, 0x0, 0x2, 0x6, 0x1000, 0x3, 0xfffffffffffffff8, 0x81, 0x10001, 0x7, 0x4000, 0x4, 0x7, 0x8, 0x3}}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xdd, @null, @bpq0='bpq0\x00', 0x2, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 21:20:57 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ntfs\x00'}}, {@obj_user={'obj_user'}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'em1'}}]}) 21:20:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xf000000}) 21:20:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x12}) 21:20:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x44}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 921.378504][ T3043] gfs2: invalid mount option: smackfstransmute=ntfs [ 921.412093][ T3043] gfs2: can't parse mount arguments 21:20:58 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ntfs\x00'}}, {@obj_user={'obj_user'}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'em1'}}]}) 21:20:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x48}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 921.732508][ T3052] gfs2: invalid mount option: smackfstransmute=ntfs [ 921.783022][ T3052] gfs2: can't parse mount arguments [ 922.356582][ T3059] IPVS: ftp: loaded support on port[0] = 21 [ 922.898854][ T3059] chnl_net:caif_netlink_parms(): no params data found [ 923.053290][ T3059] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.060417][ T3059] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.068798][ T3059] device bridge_slave_0 entered promiscuous mode [ 923.077434][ T3059] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.084756][ T3059] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.093015][ T3059] device bridge_slave_1 entered promiscuous mode [ 923.100709][T31111] device bridge_slave_1 left promiscuous mode [ 923.108961][T31111] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.173192][T31111] device bridge_slave_0 left promiscuous mode [ 923.179500][T31111] bridge0: port 1(bridge_slave_0) entered disabled state [ 927.135982][T31111] device hsr_slave_1 left promiscuous mode [ 927.197841][T31111] device hsr_slave_0 left promiscuous mode [ 927.257160][T31111] team0 (unregistering): Port device team_slave_1 removed [ 927.281405][T31111] team0 (unregistering): Port device team_slave_0 removed [ 927.311186][T31111] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 927.399782][T31111] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 927.588970][T31111] bond0 (unregistering): Released all slaves [ 927.754270][ T3063] IPVS: ftp: loaded support on port[0] = 21 [ 927.760785][ T3059] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 927.780937][ T3059] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 927.828395][ T3059] team0: Port device team_slave_0 added [ 927.845910][ T3059] team0: Port device team_slave_1 added [ 927.955125][ T3059] device hsr_slave_0 entered promiscuous mode [ 927.992435][ T3059] device hsr_slave_1 entered promiscuous mode [ 928.309030][ T3063] chnl_net:caif_netlink_parms(): no params data found [ 928.394873][ T3063] bridge0: port 1(bridge_slave_0) entered blocking state [ 928.412068][ T3063] bridge0: port 1(bridge_slave_0) entered disabled state [ 928.420290][ T3063] device bridge_slave_0 entered promiscuous mode [ 928.429657][ T3063] bridge0: port 2(bridge_slave_1) entered blocking state [ 928.437550][ T3063] bridge0: port 2(bridge_slave_1) entered disabled state [ 928.446311][ T3063] device bridge_slave_1 entered promiscuous mode [ 928.485471][ T3063] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 928.510237][ T3063] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 928.569396][ T3059] 8021q: adding VLAN 0 to HW filter on device bond0 [ 928.602692][ T3063] team0: Port device team_slave_0 added [ 928.610395][ T3063] team0: Port device team_slave_1 added [ 928.637296][T28703] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 928.660493][T28703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 928.678222][T28703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 928.710198][ T3059] 8021q: adding VLAN 0 to HW filter on device team0 [ 928.777622][ T3063] device hsr_slave_0 entered promiscuous mode [ 928.853279][ T3063] device hsr_slave_1 entered promiscuous mode [ 928.918790][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 928.946686][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 928.975572][ T3163] bridge0: port 1(bridge_slave_0) entered blocking state [ 928.983690][ T3163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 929.019621][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 929.028768][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 929.044785][ T3163] bridge0: port 2(bridge_slave_1) entered blocking state [ 929.052125][ T3163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 929.068074][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 929.079757][T28703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 929.117137][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 929.147471][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 929.176305][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 929.206902][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 929.229912][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 929.262934][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 929.299417][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 929.322345][ T3059] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 929.341229][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 929.370018][T28654] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 929.378888][T28654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 929.406925][T28654] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 929.497769][ T3059] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 929.519116][ T3063] 8021q: adding VLAN 0 to HW filter on device bond0 [ 929.559796][T28703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 929.579839][T28703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 929.604412][ T3063] 8021q: adding VLAN 0 to HW filter on device team0 [ 929.625638][T28703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 929.643964][T28703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 929.669121][T28703] bridge0: port 1(bridge_slave_0) entered blocking state [ 929.676400][T28703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 929.732052][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 929.740275][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 929.779824][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 929.791406][ T3163] bridge0: port 2(bridge_slave_1) entered blocking state [ 929.798688][ T3163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 929.807621][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 929.817363][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 929.827043][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 929.836792][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 929.863677][T28703] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 929.865494][ T3074] gfs2: not a GFS2 filesystem [ 929.879789][T28703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 929.891451][T28703] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 929.908293][T28703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 929.919039][T28703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 929.938483][ T3063] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 929.960542][ T3063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 929.972636][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 21:21:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x6100}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x80000, 0x83}) 21:21:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4b}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:06 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ntfs\x00'}}, {@obj_user={'obj_user'}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'em1'}}]}) 21:21:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x10000000}) [ 929.989194][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 930.090676][ T3063] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 930.114222][ T3090] gfs2: invalid mount option: smackfstransmute=ntfs [ 930.121187][ T3090] gfs2: can't parse mount arguments 21:21:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0xb}) 21:21:06 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ntfs\x00'}}, {@obj_user={'obj_user'}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'em1'}}]}) [ 930.217437][ T27] audit: type=1800 audit(1556832066.950:856): pid=3085 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17131 res=0 21:21:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0xb}) 21:21:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x100) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) write$ppp(r1, &(0x7f0000000100)="0d5f2ce7d76b42420f8bf13ae4f1b625584e48dd5220a53b2ddb5979aa0a0066be048cd36c875408889aedd4bdcaa55e42a058171cdca865257686c3d563581e6818f6d832f9b408fd06b5ca5e6bf83612d257f7ef4b1062bbef2023731ac521f315caa3c314b46c28669b48d49f785de289df180119a6f182ea4e7f6107ae7aa2f0a803461e33416d2770b063f524da862f2993cff5afdb12fab63f60f5a69ed4aaf2f8359cfa985d349ce8ff5cc04adcbb93ed506352ceedeae5aecb22011e", 0xc0) 21:21:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4f}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:07 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ntfs\x00'}}, {@obj_user={'obj_user'}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'em1'}}]}) 21:21:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x10010000}) [ 930.916120][ T3130] gfs2: invalid mount option: smackfstransmute=ntfs [ 930.926264][ T3130] gfs2: can't parse mount arguments 21:21:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x50}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:07 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ntfs\x00'}}, {@obj_user={'obj_user'}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@dont_hash='dont_hash'}]}) 21:21:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x53}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 931.243031][ T27] audit: type=1800 audit(1556832067.980:857): pid=3121 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17149 res=0 21:21:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x11000000}) [ 931.322984][ T3145] gfs2: invalid mount option: smackfstransmute=ntfs 21:21:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0xb}) [ 931.382154][ T3145] gfs2: can't parse mount arguments 21:21:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x54}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:08 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ntfs\x00'}}, {@obj_user={'obj_user'}}, {@pcr={'pcr', 0x3d, 0x1e}}]}) [ 931.899500][ T27] audit: type=1800 audit(1556832068.630:858): pid=3150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17139 res=0 21:21:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0x5000000}) 21:21:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x58}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x4) fallocate(r1, 0x0, 0x0, 0x2000002) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) 21:21:08 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ntfs\x00'}}, {@obj_user={'obj_user'}}, {@pcr={'pcr', 0x3d, 0x1e}}]}) 21:21:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x11010000}) 21:21:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) [ 932.134954][ T3187] gfs2: invalid mount option: smackfstransmute=ntfs [ 932.141623][ T3187] gfs2: can't parse mount arguments 21:21:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x60}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:09 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ntfs\x00'}}, {@obj_user={'obj_user'}}]}) [ 932.417908][ T27] audit: type=1800 audit(1556832069.150:859): pid=3177 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17141 res=0 21:21:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x1, 0xe55, 0x3, 0x9, 0x0, 0xffffffff, 0x208, 0x1, 0x10cc, 0x6, 0xa81b, 0x717d4b4e, 0x2, 0xcb91, 0x80, 0x81a, 0x7f, 0x80000000, 0x6, 0x8, 0x4, 0x4, 0x9f3, 0x6000000000000000, 0x10000, 0x0, 0x3, 0x20, 0x20, 0x3a4, 0x7, 0x7f, 0x9, 0x101000000000000, 0x5, 0x7ff, 0x0, 0x100000000, 0x1, @perf_bp={&(0x7f0000000000), 0x7}, 0x4000, 0x9, 0x2, 0x8, 0x5, 0xffffffffffff8000}, r2, 0x10, r0, 0x3) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) [ 932.553337][ T3204] gfs2: invalid mount option: smackfstransmute=ntfs [ 932.592716][ T3204] gfs2: can't parse mount arguments 21:21:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0x3000000}) 21:21:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x61}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:09 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ntfs\x00'}}]}) 21:21:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x63}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 932.903588][ T3221] gfs2: invalid mount option: smackfstransmute=ntfs [ 932.971232][ T27] audit: type=1800 audit(1556832069.700:860): pid=3188 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17164 res=0 [ 932.993936][ T3221] gfs2: can't parse mount arguments 21:21:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x12000000}) 21:21:09 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 933.142917][ T27] audit: type=1800 audit(1556832069.870:861): pid=3211 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17148 res=0 21:21:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x64}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000000)={0x1, 0x0, 0x2, 0x1, {0x7, 0xa5931f6, 0x8, 0x9}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x80000000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x3, 0x100000001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) 21:21:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 21:21:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x68}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:10 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x11010000}) [ 933.653201][ T3252] gfs2: not a GFS2 filesystem 21:21:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 933.819240][ T27] audit: type=1800 audit(1556832070.550:862): pid=3246 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17155 res=0 21:21:10 executing program 4: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000240)='./file1\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, 0x0) 21:21:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f0000000100)={0x4, 0xd, 0x8, "0324c7cd5c52e91911b211d773fde5b32d06920522ae84c7919a5685dc5509f62b3003e9f56f47e8fd959cae933a3a915090bdfe8dd1daeb5b163816", 0x1a, "e4003eb5173e9bf266d2f039fabfd9450a29b0d3b3ed9ba37a5850824dfedab2ab3ccabae8e1bd37c2efc8c8618261a3108b26a0832d0a77a57dafd7", 0x80}) 21:21:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 934.029656][ T3268] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:21:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x13000000}) [ 934.110276][ T3268] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:21:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x71}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 934.212043][ T3268] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:21:11 executing program 4: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000240)='./file1\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, 0x0) 21:21:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x73}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 21:21:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x1a00000000000000}) 21:21:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x74}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x1600000000000000}) 21:21:11 executing program 3: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000240)='./file1\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, 0x0) 21:21:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x14000000}) 21:21:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0xbb}, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000100)=r1) fallocate(r1, 0x20, 0xfffffffffffffffd, 0x1ffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x3a5a, 0x3, 0x3, 0x7, 0x8}) fallocate(r1, 0x22, 0x0, 0x100000000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) r2 = semget$private(0x0, 0x2, 0x135) semctl$IPC_RMID(r2, 0x0, 0x0) unlink(&(0x7f0000000180)='./file1\x00') 21:21:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0xc00000000000000}) 21:21:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f0000000100)={0x4, 0xd, 0x8, "0324c7cd5c52e91911b211d773fde5b32d06920522ae84c7919a5685dc5509f62b3003e9f56f47e8fd959cae933a3a915090bdfe8dd1daeb5b163816", 0x1a, "e4003eb5173e9bf266d2f039fabfd9450a29b0d3b3ed9ba37a5850824dfedab2ab3ccabae8e1bd37c2efc8c8618261a3108b26a0832d0a77a57dafd7", 0x80}) 21:21:11 executing program 5: syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000240)='./file1\x00', 0x2a00000000000000, 0x0, 0x0, 0x0, 0x0) 21:21:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x83}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa}) [ 935.261678][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 935.261698][ T27] audit: type=1800 audit(1556832071.990:864): pid=3308 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17156 res=0 21:21:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11o4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\x066\x92k\xf7\xf6^\xe9=~YC\xb6q\x16m\xff\x89\fY\x8f\xb5}W\\\xd1\xadJ;P\bn\xdc\x88l\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) sendto$isdn(r1, &(0x7f0000000000)={0x0, 0x9, "4ec5cc625284812dcbdd08ab3bdccdf9054164e983768e3c4c42ce20c01e80bd1e53a46ec089501ca74dfa30"}, 0x34, 0x4000080, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)=0x80020) getsockname$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000140)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000400)=@newtaction={0x2ac, 0x30, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [{0x40, 0x1, @m_sample={0x3c, 0xe, {{0xc, 0x1, 'sample\x00'}, {0x14, 0x2, [@TCA_SAMPLE_RATE={0x8, 0x3, 0x1}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x20}]}, {0x14, 0x6, "fea5c964c273f39ef4299ff24b06"}}}}, {0x40, 0x1, @m_connmark={0x3c, 0x1b, {{0x10, 0x1, 'connmark\x00'}, {0x20, 0x2, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0xfffffffffffffd07, 0x20000008, 0x0, 0x7}, 0x9}}}, {0x4}}}}, {0xe8, 0x1, @m_csum={0xe4, 0x17, {{0xc, 0x1, 'csum\x00'}, {0x20, 0x2, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xff, 0x736, 0x7, 0x7fff, 0x6}}}}, {0xb0, 0x6, "a98511881323c67ee8dffc6815b1a8cc55764a8ad379e7436a72c4439bb78f94b83e0e5f963bd5694032e2d3a0d5e7b4126c8adae4d7b5479c3b12abb1f1d0a912fef13c513abcbf393e90df9ca292bf5518d793857d167b041ba13c8105d7cbbbfae9f27678ca1df4e63e5484c1e0cf063fa0f2912176ea6f97f90b8c080b61b6168c7da6069ab4bcb4a704e8731ce8d2fae630cfbdd17cf4f25b74b4ef574516c8322bcd0d8b250a99a5"}}}}, {0xbc, 0x1, @m_connmark={0xb8, 0x14, {{0x10, 0x1, 'connmark\x00'}, {0x20, 0x2, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7f, 0x0, 0x10000008, 0x5}, 0x4}}}, {0x80, 0x6, "b445080a8855a7210b7f521e8562670e5c324e6a8450125e2300ff42131772e0a13bc87f9c5b72bbcfff39eb65e1f7971fc4b89c2ecda754401147906d745a2ec3858fb82a6d125b0543abe1ca94ea7a6f178d040a2f39398080bff8e59a9fb6b8774c1e5583b6cef05c96b5dd7aebbe9814a71045e2254e111e"}}}}, {0x74, 0x1, @m_gact={0x70, 0x10, {{0xc, 0x1, 'gact\x00'}, {0x34, 0x2, [@TCA_GACT_PARMS={0x18, 0x2, {0x6, 0x81, 0x20000000, 0x81, 0x3bf5}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x248, 0xffffffffffffffff}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x2282, 0xffffffffffffffff}}]}, {0x28, 0x6, "5ef6866affe354f0e2f9703f06dd1142601da79a6ec56ef13184b4a9eeaa557691ca1c"}}}}]}, 0x2ac}, 0x1, 0x0, 0x0, 0x4000890}, 0x80) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={@remote={[], 0x0}, 0xd, 'rose0\x00'}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f00000001c0)={0x4, 0x5, 0x8b2a, 0x1, 'syz0\x00', 0x3ff}) [ 935.321143][ T3331] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:21:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x15000000}) [ 935.388458][ T3331] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 935.437111][ T3331] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 21:21:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x84}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0x8}) 21:21:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x20000000000000}) 21:21:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000100)="723d6de64ab671481c1ccfaa4b55f66dc07c71ac666bd3f08bedebbd2b4e43d17883f5dcc3e574f3e0074112d3ec42b9a2bda8f23f07fff45f88d23b7587441b32559fa5212464813f43b8f1bb0d8a114304aed9bf4b9dbe830d8ecb44586f123960a7fe5bf59ad22961515708a9d75a4e4132f5e95b045959d02aefede326cd6a9ff2d1f7962ffb", 0x88) 21:21:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x88}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 935.855173][ T27] audit: type=1800 audit(1556832072.590:865): pid=3345 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17170 res=0 21:21:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0xffffffff00000000}) 21:21:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xf, r1}) 21:21:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x16000000}) 21:21:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:12 executing program 4: ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f0000000000)={0x1, 0x3}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xffffff15) fallocate(r0, 0x2, 0x8, 0x2000002) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0xe8d84bd2fe3a0887) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r1, 0x4, 0x3, 0x110001) fanotify_init(0x20, 0x1000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x2, 0x4, 0xddc, 0x5aa1}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) 21:21:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x1, 0x3}) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xffffff15) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$smack_current(r0, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00', 0x48) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) [ 936.183689][T31111] device bridge_slave_1 left promiscuous mode [ 936.190158][T31111] bridge0: port 2(bridge_slave_1) entered disabled state [ 936.253676][T31111] device bridge_slave_0 left promiscuous mode [ 936.259996][T31111] bridge0: port 1(bridge_slave_0) entered disabled state 21:21:13 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8f}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)=0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xc, 0x110, r1, 0x8000000) 21:21:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660e, &(0x7f0000000040)={0xa, r1}) 21:21:13 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x90}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x1000, 0xa, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x6) 21:21:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x97}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x17000000}) 21:21:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x1, 0x3}) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xffffff15) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000100)=0x7fff) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 21:21:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xf, r1}) 21:21:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x98}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 938.092645][ T27] audit: type=1800 audit(1556832074.830:866): pid=3396 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17210 res=0 21:21:14 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0xff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r2, 0x25, 0xfffffffffffffffc, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xa, r1}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000000)) 21:21:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9f}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x1, 0x3}) write$cgroup_type(r0, &(0x7f0000000400)='threaded\x00', 0x9) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xffffff15) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000140)={0x4, 0x8, @name="e845d5a6657b069c8166931c75929da321e5a0762f80b37121b09f759d71c3f9"}) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000100)={0x1e, 0x8, 0x800000007, 0x2, 0x7ffffffffffffffd, 0x1d, 0xa, "94951e6d9cbd9ae2c90012c7fa34380f97b78e40", "5de2da49fdf3e510cf808b1317835e557fbbd05f"}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x3ff, 0x2}) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0xddf) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000004c0)={r0}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e22, @broadcast}}, [0x80000001, 0x20, 0x20, 0x10000, 0x80, 0x3, 0x400, 0x7f, 0x1, 0x92, 0x1ff, 0x101, 0x8, 0x800, 0x81]}, &(0x7f0000000180)=0x100) getsockopt$sock_int(r1, 0x1, 0x1, &(0x7f0000000440), &(0x7f0000000480)=0x4) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300)={r2, @in={{0x2, 0x4e22, @loopback}}}, &(0x7f00000003c0)=0x84) [ 940.745201][T31111] device hsr_slave_1 left promiscuous mode [ 940.787906][T31111] device hsr_slave_0 left promiscuous mode [ 940.857324][T31111] team0 (unregistering): Port device team_slave_1 removed [ 940.885125][T31111] team0 (unregistering): Port device team_slave_0 removed [ 940.906586][T31111] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 940.968852][T31111] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 941.131334][T31111] bond0 (unregistering): Released all slaves 21:21:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa0}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0286602, &(0x7f0000000040)={0xa, r1}) 21:21:18 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x240100, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) bind$packet(r0, &(0x7f0000000180)={0x11, 0xf5, r1, 0x1, 0xfffffffffffff8fa}, 0x14) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x140) fallocate(r3, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xa, r3}) 21:21:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x1c000000, r1}) 21:21:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x1b000000, r1}) 21:21:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x18000000}) 21:21:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x4}) 21:21:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa3}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x1, 0x3}) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xffffff15) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x801c581f, &(0x7f0000000040)={0x0, r1}) 21:21:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa4}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 941.726721][ T27] audit: type=1800 audit(1556832078.460:867): pid=3418 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17240 res=0 21:21:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x19000000}) 21:21:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x801c581f, &(0x7f0000000040)={0xa, r1}) 21:21:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x800c6613, &(0x7f0000000040)={0xa, r1}) 21:21:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa8}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40286608, &(0x7f0000000040)={0xa, r1}) 21:21:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x1, 0x3}) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xffffff15) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40087602, &(0x7f0000000040)={0x0, r1}) 21:21:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x1b000000, r1}) 21:21:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xaf}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 942.486579][ T3450] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 10 (only 16 groups) [ 942.565726][ T27] audit: type=1800 audit(1556832079.300:868): pid=3436 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17221 res=0 21:21:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1a000000}) 21:21:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x1, 0x3}) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xffffff15) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6609, &(0x7f0000000040)={0x0, r1}) 21:21:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfa}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x26) fallocate(r1, 0x0, 0x0, 0x2000002) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20110004}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa8, r2, 0x201, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1677}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4}, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) 21:21:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x1, 0x3}) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xffffff15) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086604, &(0x7f0000000040)={0x0, r1}) 21:21:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086607, &(0x7f0000000040)={0xa, r1}) 21:21:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xb000000, r1}) 21:21:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x500}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5452, &(0x7f0000000040)={0xa, r1}) [ 943.049332][ T3470] EXT4-fs warning (device sda1): ext4_group_extend:1769: can't shrink FS - resize aborted 21:21:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086607, &(0x7f0000000040)={0xa, r1}) [ 943.108258][ T27] audit: type=1800 audit(1556832079.840:869): pid=3465 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17238 res=0 21:21:19 executing program 0: r0 = request_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00', 0xfffffffffffffffe) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000400), &(0x7f0000000440)) keyctl$chown(0x4, r0, r1, r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x2000002) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000004c0)={0x5, 0x1, 0xc4, 0x678, 0x80, 0x7fffffff}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000000)=0x3, 0x4) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x200000, 0x0) fallocate(r5, 0x0, 0x8, 0x510001) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0xa, r4}) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000480)=0x530) [ 943.331671][ T3483] EXT4-fs warning (device sda1): ext4_group_extend:1769: can't shrink FS - resize aborted [ 943.422780][ T27] audit: type=1800 audit(1556832080.160:870): pid=3466 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17246 res=0 21:21:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1b000000}) 21:21:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x600}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x1, 0x3}) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xffffff15) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5421, &(0x7f0000000040)={0x0, r1}) 21:21:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x1, 0x3}) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xffffff15) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x541b, &(0x7f0000000040)={0x0, r1}) 21:21:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) fallocate(r1, 0x0, 0x0, 0x2000002) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000140)={r2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0xfffffffffffffffa, 0x54, 0x82, 0x0, 0x9e0, 0x4}, 0xe00000}, 0xa) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) 21:21:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1a000000}) 21:21:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x700}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:20 executing program 4 (fault-call:1 fault-nth:0): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socket$inet6(0xa, 0x7, 0x3000000) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) 21:21:20 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) [ 943.774126][ T3507] FAULT_INJECTION: forcing a failure. [ 943.774126][ T3507] name failslab, interval 1, probability 0, space 0, times 0 [ 943.856398][ T3507] CPU: 0 PID: 3507 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 943.864350][ T3507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.874424][ T3507] Call Trace: [ 943.877747][ T3507] dump_stack+0x172/0x1f0 [ 943.883777][ T3507] should_fail.cold+0xa/0x15 [ 943.888396][ T3507] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 943.894228][ T3507] ? ___might_sleep+0x163/0x280 [ 943.899232][ T3507] __should_failslab+0x121/0x190 [ 943.904194][ T3507] should_failslab+0x9/0x14 [ 943.908712][ T3507] __kmalloc+0x2dc/0x740 [ 943.913087][ T3507] ? fput_many+0x12c/0x1a0 [ 943.917621][ T3507] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 943.923884][ T3507] ? strnlen_user+0x1f0/0x280 [ 943.928608][ T3507] ? __x64_sys_memfd_create+0x13c/0x470 [ 943.934173][ T3507] __x64_sys_memfd_create+0x13c/0x470 [ 943.939558][ T3507] ? memfd_fcntl+0x1550/0x1550 [ 943.944424][ T3507] ? do_syscall_64+0x26/0x610 [ 943.949128][ T3507] ? lockdep_hardirqs_on+0x418/0x5d0 [ 943.954452][ T3507] ? trace_hardirqs_on+0x67/0x230 [ 943.959491][ T3507] do_syscall_64+0x103/0x610 [ 943.964127][ T3507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.970071][ T3507] RIP: 0033:0x458da9 [ 943.973986][ T3507] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 943.993627][ T3507] RSP: 002b:00007faa42150a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 21:21:20 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) [ 943.993646][ T3507] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458da9 [ 943.993653][ T3507] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 943.993659][ T3507] RBP: 000000000073bfa0 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 943.993666][ T3507] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faa421516d4 [ 943.993673][ T3507] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000005 21:21:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 943.994297][ T27] audit: type=1800 audit(1556832080.710:871): pid=3498 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17215 res=0 21:21:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1c000000}) 21:21:20 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0x7, 0x0, 0x638) 21:21:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:21 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6, @in6=@local}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xa, r2}) [ 944.324155][ T27] audit: type=1800 audit(1556832080.920:872): pid=3504 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17229 res=0 21:21:21 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x121040) ioctl$CAPI_GET_ERRCODE(r1, 0x80024321, &(0x7f0000000040)) openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x10000, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r2 = semget$private(0x0, 0x4, 0x8) semtimedop(r2, &(0x7f0000000080)=[{0x2, 0x3ff, 0x800}, {0x1, 0x4, 0x1800}], 0x2, &(0x7f00000000c0)) 21:21:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1a000000}) 21:21:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:21 executing program 4 (fault-call:1 fault-nth:1): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:21 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x3, 0x8001, 0x1f}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x583100, 0x0) getdents(r1, &(0x7f0000000100), 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="6f7332b13cfe"]) [ 944.775322][ T27] audit: type=1800 audit(1556832081.510:873): pid=3523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17252 res=0 [ 944.923726][ T3543] FAULT_INJECTION: forcing a failure. [ 944.923726][ T3543] name failslab, interval 1, probability 0, space 0, times 0 [ 944.962351][ T3543] CPU: 0 PID: 3543 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 944.970300][ T3543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.980373][ T3543] Call Trace: [ 944.983715][ T3543] dump_stack+0x172/0x1f0 [ 944.988083][ T3543] should_fail.cold+0xa/0x15 [ 944.992702][ T3543] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 944.992732][ T3543] ? ___might_sleep+0x163/0x280 [ 944.992755][ T3543] __should_failslab+0x121/0x190 [ 944.992776][ T3543] ? shmem_destroy_callback+0xc0/0xc0 [ 944.992794][ T3543] should_failslab+0x9/0x14 [ 944.992812][ T3543] kmem_cache_alloc+0x2b2/0x6f0 [ 944.992833][ T3543] ? __alloc_fd+0x44d/0x560 [ 944.992855][ T3543] ? shmem_destroy_callback+0xc0/0xc0 [ 944.992880][ T3543] shmem_alloc_inode+0x1c/0x50 [ 945.013858][ T3543] alloc_inode+0x66/0x190 [ 945.013877][ T3543] new_inode_pseudo+0x19/0xf0 [ 945.013893][ T3543] new_inode+0x1f/0x40 [ 945.013908][ T3543] shmem_get_inode+0x84/0x7e0 [ 945.013927][ T3543] __shmem_file_setup.part.0+0x7e/0x2b0 [ 945.013946][ T3543] shmem_file_setup+0x66/0x90 [ 945.013962][ T3543] __x64_sys_memfd_create+0x2a2/0x470 [ 945.013975][ T3543] ? memfd_fcntl+0x1550/0x1550 [ 945.013989][ T3543] ? do_syscall_64+0x26/0x610 [ 945.014005][ T3543] ? lockdep_hardirqs_on+0x418/0x5d0 [ 945.014022][ T3543] ? trace_hardirqs_on+0x67/0x230 [ 945.014043][ T3543] do_syscall_64+0x103/0x610 [ 945.095779][ T3543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.101723][ T3543] RIP: 0033:0x458da9 21:21:21 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='sessionid\x00') ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x1, {0x3c, 0x19, 0x10, 0x1, 0x5, 0x200, 0x6, 0x5a, 0xffffffffffffffff}}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0xfd98) 21:21:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1d000000}) 21:21:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 945.105638][ T3543] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 945.125290][ T3543] RSP: 002b:00007faa42150a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 945.133753][ T3543] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458da9 [ 945.141749][ T3543] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 945.149740][ T3543] RBP: 000000000073bfa0 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 945.157732][ T3543] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faa421516d4 [ 945.157742][ T3543] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000005 21:21:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1018}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 945.300511][ T27] audit: type=1800 audit(1556832082.030:874): pid=3551 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17230 res=0 21:21:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x18, 0x0, &(0x7f0000000000)=[@request_death={0x400c630e, 0x0, 0x2}, @acquire={0x40046305, 0x2}], 0x69, 0x0, &(0x7f0000000100)="df1a7d7c6e94d903b6c5033fefd0e8ff0db942d69f96c20e9f14784e9f34cd6753a0210af3b30adfb8cb55c031c2e18f43195b89eb32ae71f2cd59ef70be9f311a66f3b2a6621dc099c7b77b547d66261c376611071f9e5201f3b5ca6971eba0852f322df1e6517461"}) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000001c0)={0x60000000}) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) 21:21:22 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x5) 21:21:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:22 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) [ 945.966202][ T27] audit: type=1800 audit(1556832082.700:875): pid=3549 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17248 res=0 21:21:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1a000000}) 21:21:22 executing program 4 (fault-call:1 fault-nth:2): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:22 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) setsockopt$sock_void(r0, 0x1, 0x20, 0x0, 0x0) r1 = accept4(r0, &(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @loopback}}, &(0x7f00000000c0)=0xfffffffffffffcd5, 0x80000) socket$bt_rfcomm(0x1f, 0x1, 0x3) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}]}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x80300, 0x0) r3 = accept4$nfc_llcp(r1, &(0x7f0000000280), &(0x7f0000000000)=0x60, 0x800) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000300)=0x800) syncfs(r0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000200)=0xffff) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000240)=0xffffffffffffffff, 0xffffffffffffffd5) 21:21:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1e000000}) 21:21:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xa, r2}) [ 946.059637][ T27] audit: type=1800 audit(1556832082.740:876): pid=3559 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17230 res=0 [ 946.171468][ T3586] FAULT_INJECTION: forcing a failure. [ 946.171468][ T3586] name failslab, interval 1, probability 0, space 0, times 0 21:21:22 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x5, [0x5, 0x75, 0x9, 0x40, 0xfffffffffffffff8]}, &(0x7f0000000080)=0x12) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x3, 0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r1, 0xfffffffffffffff8, 0x20}, 0xc) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0xfffffffffffffd9b) 21:21:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1810}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 946.292737][ T3586] CPU: 0 PID: 3586 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 946.300727][ T3586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.310990][ T3586] Call Trace: [ 946.314323][ T3586] dump_stack+0x172/0x1f0 [ 946.318687][ T3586] should_fail.cold+0xa/0x15 [ 946.323309][ T3586] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 946.329147][ T3586] ? ___might_sleep+0x163/0x280 [ 946.334123][ T3586] __should_failslab+0x121/0x190 [ 946.339166][ T3586] should_failslab+0x9/0x14 [ 946.343686][ T3586] kmem_cache_alloc+0x2b2/0x6f0 [ 946.348550][ T3586] ? current_time+0x6b/0x140 [ 946.353200][ T3586] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 946.353219][ T3586] ? lockdep_hardirqs_on+0x418/0x5d0 [ 946.353233][ T3586] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 946.353245][ T3586] ? timespec64_trunc+0xf0/0x180 [ 946.353259][ T3586] __d_alloc+0x2e/0x8c0 [ 946.353275][ T3586] d_alloc_pseudo+0x1e/0x30 [ 946.353288][ T3586] alloc_file_pseudo+0xe2/0x280 [ 946.353302][ T3586] ? alloc_file+0x4d0/0x4d0 [ 946.353318][ T3586] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 946.353344][ T3586] __shmem_file_setup.part.0+0x108/0x2b0 [ 946.353365][ T3586] shmem_file_setup+0x66/0x90 [ 946.375692][ T3586] __x64_sys_memfd_create+0x2a2/0x470 [ 946.375710][ T3586] ? memfd_fcntl+0x1550/0x1550 [ 946.375733][ T3586] ? do_syscall_64+0x26/0x610 [ 946.389255][ T3586] ? lockdep_hardirqs_on+0x418/0x5d0 [ 946.389276][ T3586] ? trace_hardirqs_on+0x67/0x230 [ 946.389298][ T3586] do_syscall_64+0x103/0x610 [ 946.420799][ T3586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.420814][ T3586] RIP: 0033:0x458da9 [ 946.420830][ T3586] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 946.420839][ T3586] RSP: 002b:00007faa42150a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 946.420853][ T3586] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458da9 [ 946.420869][ T3586] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 946.494758][ T3586] RBP: 000000000073bfa0 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 946.502781][ T3586] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faa421516d4 [ 946.510775][ T3586] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000005 21:21:23 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200000, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000040)) 21:21:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=@random={'btrfs.', 'stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00'}, &(0x7f0000000180)=""/182, 0xb6) fallocate(r1, 0x0, 0x0, 0x2000002) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000002c0)={0x1, 0x0, 0x0, 0x1ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x1, 0x9}) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) 21:21:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1f000000}) 21:21:23 executing program 3: r0 = inotify_init1(0x0) r1 = getpid() fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) kcmp(r1, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 21:21:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:23 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r1 = getpgrp(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) 21:21:23 executing program 4 (fault-call:1 fault-nth:3): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x20000000}) [ 947.282795][ T3620] FAULT_INJECTION: forcing a failure. [ 947.282795][ T3620] name failslab, interval 1, probability 0, space 0, times 0 [ 947.322197][ T3620] CPU: 0 PID: 3620 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 947.331343][ T3620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.343347][ T3620] Call Trace: [ 947.346690][ T3620] dump_stack+0x172/0x1f0 [ 947.351077][ T3620] should_fail.cold+0xa/0x15 [ 947.357113][ T3620] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 947.363405][ T3620] ? ___might_sleep+0x163/0x280 [ 947.368822][ T3620] __should_failslab+0x121/0x190 [ 947.374007][ T3620] should_failslab+0x9/0x14 [ 947.379006][ T3620] kmem_cache_alloc+0x2b2/0x6f0 [ 947.384255][ T3620] ? current_time+0x6b/0x140 [ 947.389862][ T3620] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 947.395715][ T3620] ? lockdep_hardirqs_on+0x418/0x5d0 [ 947.401220][ T3620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 947.407523][ T3620] ? timespec64_trunc+0xf0/0x180 [ 947.412813][ T3620] __d_alloc+0x2e/0x8c0 [ 947.417020][ T3620] d_alloc_pseudo+0x1e/0x30 [ 947.421686][ T3620] alloc_file_pseudo+0xe2/0x280 [ 947.427481][ T3620] ? alloc_file+0x4d0/0x4d0 [ 947.432277][ T3620] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 947.438939][ T3620] __shmem_file_setup.part.0+0x108/0x2b0 [ 947.445877][ T3620] shmem_file_setup+0x66/0x90 [ 947.451811][ T3620] __x64_sys_memfd_create+0x2a2/0x470 [ 947.458509][ T3620] ? memfd_fcntl+0x1550/0x1550 [ 947.464638][ T3620] ? do_syscall_64+0x26/0x610 [ 947.471322][ T3620] ? lockdep_hardirqs_on+0x418/0x5d0 [ 947.478390][ T3620] ? trace_hardirqs_on+0x67/0x230 [ 947.483447][ T3620] do_syscall_64+0x103/0x610 [ 947.488072][ T3620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.493985][ T3620] RIP: 0033:0x458da9 [ 947.498173][ T3620] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 947.517902][ T3620] RSP: 002b:00007faa42150a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 21:21:24 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x60, 0x2) [ 947.526466][ T3620] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458da9 [ 947.534545][ T3620] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 947.542543][ T3620] RBP: 000000000073bfa0 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 947.550542][ T3620] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faa421516d4 [ 947.558559][ T3620] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000005 21:21:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000440)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000340)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x400000000001, 0x81) r1 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 21:21:24 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$mouse(&(0x7f0000001e80)='/dev/input/mouse#\x00', 0x4, 0x0) accept$inet6(r1, &(0x7f0000001ec0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000001f00)=0x1c) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:21:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x39, {{0xa, 0x4e23, 0x3, @empty, 0x8}}}, 0x88) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) 21:21:24 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x50003) ioctl(r0, 0x81, &(0x7f0000000080)="861113a5e4e6f9b0b8c72096f575ad7bc1e1b524d700d9250a82386d14077299e6d563dea70241bda2d48c2cc3227b429410ed2c2714ce0076ef2ab0157ed95fa28aaa390e6bd685a3f31c7180cb486a74dacfebe958721d12f2d929a463b570c14867980dc4d3f723b7aab55ae505d1e59652824a69514781bc6988231f44fd4c249014320e7e83b3b6ef1fb5dc825ca9091106f2ad29b19ced44476e2f407125f5913cfda8ab969d6896d6e2fa7f5116bc49fb") fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U-', 0x6}, 0x28, 0x2) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000040)=0xffffffffffffef95) 21:21:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 948.105470][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 948.105489][ T27] audit: type=1800 audit(1556832084.840:879): pid=3645 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17231 res=0 21:21:24 executing program 4 (fault-call:1 fault-nth:4): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:24 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000740)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 21:21:24 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:21:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xe4ffffff}) 21:21:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000740)='./file0\x00', &(0x7f0000000a80)=ANY=[@ANYRESOCT=r0], &(0x7f00000007c0)=""/170, 0xaa) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000880)={0x0, @reserved}) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) mknod(&(0x7f0000000940)='./file0\x00', 0xc000, 0x5) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000500)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}}}, &(0x7f0000000600)=0xe8) mount$9p_xen(&(0x7f0000000200)='\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1000, &(0x7f0000000640)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}, {@access_uid={'access', 0x3d, r3}}, {@mmap='mmap'}, {@dfltuid={'dfltuid', 0x3d, r4}}, {@version_L='version=9p2000.L'}, {@version_u='version=9p2000.u'}, {@posixacl='posixacl'}, {@mmap='mmap'}, {@loose='loose'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, 'wlan0'}}]}}) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x7, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x2000, 0x0) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000140)={0x1ff, 0x6, 0x1}) mknodat(r0, &(0x7f0000000980)='./file0\x00', 0xc000, 0x31a6) ioctl$TIOCGPKT(r5, 0x80045438, &(0x7f0000000700)) open_by_handle_at(r5, &(0x7f00000009c0)={0xa4, 0x1f, "6ed4513edc5191bdcf6cb91f6d82c30b9670a8c9d7ac78f9a579feda907b9ab291d46b0c0526807bb5a18001b03b1ea4574b0d7d134715ab20503cf05aeae31177f71101092f752c4ae16072d1f05b2b77103110df5a7b30726efa2f31fb34592d84f7fadd95261d04f4d8bba1229509581848d86550a2d465583cefd85d8418e87750ffe1c51514d4c439de92e5ccd47f2065b43758f5ce51fd1ccc"}, 0x40) fcntl$notify(r1, 0x402, 0x24) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0xa, r5, 0x0, 0x0, 0x0, 0xfffffffffffffffd}) 21:21:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:25 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) ptrace$setsig(0x4203, r0, 0xa4, &(0x7f0000000040)={0x26, 0xb10, 0x94}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x800) bind$ax25(r2, &(0x7f0000000100)={{0x3, @null, 0x6}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:21:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x5) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x400002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 21:21:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x0, 0xfffffffffffffffd, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) 21:21:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:25 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0xfffffffffffffe94) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xfffffffffffffe12) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x2, 0x200) bind$bt_hci(r1, &(0x7f00000000c0)={0x1f, r2}, 0xc) 21:21:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 948.616504][ T27] audit: type=1800 audit(1556832085.350:880): pid=3681 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17729 res=0 [ 948.628623][ T3697] FAULT_INJECTION: forcing a failure. [ 948.628623][ T3697] name failslab, interval 1, probability 0, space 0, times 0 21:21:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) keyctl$session_to_parent(0x12) [ 949.172100][ T3697] CPU: 0 PID: 3697 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 949.180066][ T3697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.190139][ T3697] Call Trace: [ 949.193456][ T3697] dump_stack+0x172/0x1f0 [ 949.197810][ T3697] should_fail.cold+0xa/0x15 [ 949.202414][ T3697] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 949.208428][ T3697] ? ___might_sleep+0x163/0x280 [ 949.213294][ T3697] __should_failslab+0x121/0x190 [ 949.218245][ T3697] should_failslab+0x9/0x14 [ 949.222759][ T3697] kmem_cache_alloc+0x2b2/0x6f0 [ 949.227634][ T3697] __alloc_file+0x27/0x300 [ 949.232068][ T3697] alloc_empty_file+0x72/0x170 [ 949.236845][ T3697] alloc_file+0x5e/0x4d0 [ 949.241100][ T3697] alloc_file_pseudo+0x189/0x280 [ 949.246081][ T3697] ? alloc_file+0x4d0/0x4d0 [ 949.250610][ T3697] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 949.256901][ T3697] __shmem_file_setup.part.0+0x108/0x2b0 [ 949.262556][ T3697] shmem_file_setup+0x66/0x90 [ 949.267262][ T3697] __x64_sys_memfd_create+0x2a2/0x470 [ 949.272644][ T3697] ? memfd_fcntl+0x1550/0x1550 [ 949.277418][ T3697] ? do_syscall_64+0x26/0x610 [ 949.282105][ T3697] ? lockdep_hardirqs_on+0x418/0x5d0 [ 949.287399][ T3697] ? trace_hardirqs_on+0x67/0x230 [ 949.292434][ T3697] do_syscall_64+0x103/0x610 [ 949.297037][ T3697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.302935][ T3697] RIP: 0033:0x458da9 [ 949.306835][ T3697] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 949.326452][ T3697] RSP: 002b:00007faa42150a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 949.334935][ T3697] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458da9 [ 949.342914][ T3697] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 949.350900][ T3697] RBP: 000000000073bfa0 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 949.358901][ T3697] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faa421516d4 21:21:26 executing program 4 (fault-call:1 fault-nth:5): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x89e2, &(0x7f0000000040)="84c8d8c3b3b2e608b7e5db8ea8ebf9c3f08fdcc179b8c8e4b4472a63fca347e414b02210367f6ef3721b282e036e97cf1910ed604c4eaec514cdc957889455e8dfa9c6b770da069dc37117e31e05dc7c21ee0406c2fd1b0330b57894a4515e791b7653d1aaa1675ce7e3fd7600405cf841c2ed9c22c6202e4085861bde58bb94d5d401cd340edc120ff58757191a520fb6a3263a3f0b3e443c62f7000000de66c9020a6084f20c728c259d53f07f8b07f64aec22") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x402602) ioctl$LOOP_CLR_FD(r2, 0x4c01) 21:21:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:26 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000040)={0x1}) 21:21:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) fallocate(r1, 0x0, 0x0, 0x2000002) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000200)=r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) getsockname(r0, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x80) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) 21:21:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xf0ffffff}) [ 949.366886][ T3697] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000003 21:21:26 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000400)={0x0, 0x2}) 21:21:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:26 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000040)=0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req={0x1, 0x3ff, 0x6, 0x7}, 0x10) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:21:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f143c123f319bd070") ioctl(r2, 0x8, &(0x7f0000000100)="5ce7a3fe9d06bffc91f6a5da7c4c1c63176dc98dc3c47aeca7d6fed4d2b7773f1a3d938ef569a4c4b801ae67953d47eca7f315e2fda73d8f48829193cd8ce0540a5ffb65a2a4dbf8168e9f75de8b33a656ddd115a594defbc5690262ffe27726d36010b17fe7144c16943d0ed3c41ff9d273cbdd5515e02b8dfa830841e0ef2032e37a174e72edf5534ad834c05d0ed71edc28bad0f43b847eb6329926c7a3a052b676b87cadddc327d0cd4305497b6546314ea670c95e2eb998ecad50d18ddd4f51c6a2b03cc102d76ccdf8b9fb94fb1e2819baa00f2690a4") r4 = socket(0x11, 0x2, 0x40000000000) fallocate(r3, 0x10, 0xc9b, 0x937) write(r4, &(0x7f00000002c0)="1f00000054000d0000000000fc07ff1b070404001200000007000100010039", 0x527d) fcntl$setpipe(r3, 0x407, 0x1000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r1}) 21:21:26 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, 0x0, &(0x7f0000000540)="0cc1f5edfd9105083af433118c7d8543a4a07d6e80647be43f6939c2a69f57168d2c227ead241febcf3c9224fdfb017a99472f0a61f75b0b212d7814f9ba3ffe0b07482b3ade722987372fdeb5b480ac9994f8c0cc456693d98f4ab71e9f455a664b0152b53b9ecfecc31577c6787526d9a084fa0502bce05956465405e669a6dd63b3ce7af22b5f6b135b84"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 21:21:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 949.902674][ T3722] FAULT_INJECTION: forcing a failure. [ 949.902674][ T3722] name failslab, interval 1, probability 0, space 0, times 0 [ 949.918086][ T3738] device nr0 entered promiscuous mode [ 949.950347][ T3722] CPU: 0 PID: 3722 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 949.958318][ T3722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.968397][ T3722] Call Trace: [ 949.971729][ T3722] dump_stack+0x172/0x1f0 [ 949.976096][ T3722] should_fail.cold+0xa/0x15 [ 949.980715][ T3722] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 949.986551][ T3722] ? ___might_sleep+0x163/0x280 [ 949.991441][ T3722] __should_failslab+0x121/0x190 [ 949.996403][ T3722] should_failslab+0x9/0x14 [ 950.000935][ T3722] kmem_cache_alloc+0x2b2/0x6f0 [ 950.005820][ T3722] ? rcu_read_lock_sched_held+0x110/0x130 [ 950.011599][ T3722] ? kmem_cache_alloc+0x32e/0x6f0 [ 950.016674][ T3722] security_file_alloc+0x39/0x170 [ 950.021732][ T3722] __alloc_file+0xac/0x300 [ 950.026178][ T3722] alloc_empty_file+0x72/0x170 [ 950.031072][ T3722] alloc_file+0x5e/0x4d0 [ 950.035350][ T3722] alloc_file_pseudo+0x189/0x280 [ 950.040318][ T3722] ? alloc_file+0x4d0/0x4d0 [ 950.044850][ T3722] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 950.051224][ T3722] __shmem_file_setup.part.0+0x108/0x2b0 [ 950.056988][ T3722] shmem_file_setup+0x66/0x90 [ 950.061784][ T3722] __x64_sys_memfd_create+0x2a2/0x470 [ 950.067192][ T3722] ? memfd_fcntl+0x1550/0x1550 [ 950.072617][ T3722] ? do_syscall_64+0x26/0x610 [ 950.077600][ T3722] ? lockdep_hardirqs_on+0x418/0x5d0 [ 950.082935][ T3722] ? trace_hardirqs_on+0x67/0x230 [ 950.088022][ T3722] do_syscall_64+0x103/0x610 [ 950.092660][ T3722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.098621][ T3722] RIP: 0033:0x458da9 [ 950.102723][ T3722] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 950.122344][ T3722] RSP: 002b:00007faa42150a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 950.130783][ T3722] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458da9 [ 950.138786][ T3722] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 950.146786][ T3722] RBP: 000000000073bfa0 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 950.154779][ T3722] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faa421516d4 [ 950.162769][ T3722] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000003 21:21:26 executing program 4 (fault-call:1 fault-nth:6): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:26 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:21:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:27 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000000)=0x5004) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:21:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xfeffffff}) 21:21:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4b00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:27 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0xfffffffffffffd26) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) sendmmsg$alg(r1, &(0x7f0000005a00)=[{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000080)="1eabe08ac287d394c0d1", 0xa}, {&(0x7f00000000c0)="05e2c0e568c466de175f884a8733648463336102b053e9f625ce91b9649b72c33447cd4b10e6c76d806626552348010091aac4627cbd9ccd89bbbca22fdcb00456f7a2db0de8c9dc481df16f51f0cf8a5bc21176e5b9762ee4c509c59dbd6559338773df3d29980b6733053c1547123926ae50763d2f2f1150e2a0bb9839191e9069b2bb118d45fb30d7a4b813ed8d4467059de00abd3a53248726c3de3746124bdcdb694a381927a43b839ad18f182c4f96e7ee705ca42dcdf4ee5fb4bc4b20250715f3ddbb72488bd73a7f796c4367", 0xd0}, {&(0x7f00000001c0)="39b7b6b2c5eb78bd92ad99542e9ea61a38648822b429c2b8a2f86d58c65eafe4f4d8433cf56de04b8e55f4a8f4a3e4232621db9602562c33e7641a4e2fa1b084284150a8645517a0e442c8f5522186f98230f1d86f1104264d4e396f73916856a95d1fdb4fc499817964daeb273bd0b603a6b91f94c25c333ce00bb94d07ea8a8936232899a587a8a9556872aef025c51bd76aac83a071eba7188e3df16129d16002878d8c5df1cffac4d6bfb5334e99f0afc7a6c4c19f9d075ea04aaae49dba8cb97f4b5711f97b6ea4d75760c267033d81ba8cd65bdddef2a6c19cdeed39915373812e39d8ad", 0xe7}, {&(0x7f00000002c0)="aced6ac9266bd465e8473d24f0aa77b000", 0x11}, {&(0x7f0000000300)="a1c42e2852b90557bdfb721f93ef4709b74b2bfa6e0216d95f27744a14c892c50f872bad0763867d5184844320f3bafc671788b32a8287f8d3d2174a99593651cfef2a50400371998ec18c79a9a9b2986c74c9bfde0d1db350f5202783064f1eab256dd71bc412935e14b3fc4ee0af7d7fa3d5733ca99e957672553255780d4d46ef61e4317ba767571d0414bc", 0x8d}, {&(0x7f00000003c0)="c8cff34e9d0240f82dd12fdcb9edd6e15227766ec061d151312a4f428a5272392e75e246caf50ef38447f242c5d75160", 0x30}, {&(0x7f0000000400)="ae4c9530807d42cde40fa5a1a28678c875825c9375", 0x15}, {&(0x7f0000000440)="5e7461b323d3dee9f6f8e8719b64a27bb00b1bcf666019ce7d0c8c956cddeab4db24e51319199da80495fa9720c4ac43b1c91e0772405cd6bc6e4deaddfb750f5facd7574ca79855e835c2269e002206ac9026146ea078d164c62f08c100eb55145b4d4351e45687e457574f7ce63287d496b97f3e67c2cde5c3888e48d30e3af8bc11484e7fa52b8071a3f99671e3a3ba7cb2a5f538e48af6fad0edd54b010c2054143f5e62737b19af32167ee105c74adb491bf2706c113c7a33d2d39b3e811f62ec7c6fb5f01143f70158", 0xcc}], 0x8, &(0x7f00000005c0)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x7}, @assoc={0x18, 0x117, 0x4, 0x4}, @assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0xffff}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @op={0x18}], 0x10f0, 0x4000081}, {0x0, 0x0, &(0x7f0000001880)=[{&(0x7f00000016c0)="5c42c009887044b8ec9fdf41baf1d12e64cf56fcaa6ce9e4b94ba520bc8fc432725195dab2a05f91c0b901d436085655de5ad181c832be3066cd794b5d08fb84c875379fede5dbebd2e739ba9b4a1beda4ed76214e94c05e3b9429479bea984ce82ab432502fd56d1cef7a8545e9ea248606ac239457c60995afc5c167941964cadbb3d0c1aaf0564d36840d045be08c2cf5fec1327d791ee1ba73487f6d498da76e61a2978093e2eeca99d7bfb77ccd8004f0f9c01d91bac544e71d9d4d9e684e6f361ab482cfd6a7ee2cb8379b96da983f190de2adf745b7a8f4ff4604cb1f3ec320069bf69379cfb97de535f290a3b46b3a", 0xf3}, {&(0x7f00000017c0)="c8851604d476dd7045dd79cba4ef9d6f2282d706fe355a2b4f461b9fc219cb391489ccafd325ca0e759943f04e543909ae853ef676e45db5c087dd082e4aa804c047bd8223d87015fadf40cad3114aee19927b6341f5c93a9cf49756bb87deab06f2652aba0ed18fa59c58bfd995475dfcc767336c4ff8028f271f38b1355bdf4699214448e8ed848a70c2618c3341ef313b33d92726e3831b972374e4e52f", 0x9f}], 0x2, &(0x7f00000018c0)=[@assoc={0x18, 0x117, 0x4, 0x5e}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18, 0x117, 0x3, 0x1}], 0x78, 0x40000}, {0x0, 0x0, &(0x7f0000001940), 0x0, &(0x7f0000001980)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, {0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f00000019c0)="364bff65a75fcfe677730ae02076f31f34a2b8053dfdb98e6dc26dc163bc2eeb703d26b5fd82826d4ff07a901654e3652e1dd67502fd550171ab3fa5466cce4db5186e194fe97c646cca21f27bcdb7b246dd7814a0d7308288a4af762c5eb41668a9f05f39070b6bd6f3126aa7b3d7dc4229db9f0e21e909920b5ed3835db3268d54c2e738cbf412f1594a0bf457d25a69f68e2ef936575f43f72363f291456b74ffa3be096baebc84013042b6130d5328debd350278b51364d5", 0xba}, {&(0x7f0000001a80)="5322197ff044d9", 0x7}, {&(0x7f0000001ac0)="e25565ff209808ac24842ede07e30d5a13d1ca0b61ad546b468b82f706cd65b00a9e44e48d5176fe18d034d703a8748760bc3ddfb95425d63801502db2466cae0d70217cd5968aef7122ca6563308312a0a72263612e56fa01249082443232fc7ac1ea3c8ca21d30766bdd87b45d6ce32404cf845d7ee1eebb24e59aa3f507ed4ec28e3df96a8a53ebea03b6d767be1f9719ee99", 0x94}, {&(0x7f0000001b80)="fa70e9e27353ace0f13d65369cf52dd552b45c6c75109efd281107cc878b396131bd1134b97f547a5c8c8431d4e3ea87312a04fd9a9f610370e4b0607bcde2fb5507b49546d54998f8702a7d0cac30a2646b3583743c02faba03f58db0b680ad8af1b1de9e45130ba700", 0x6a}, {&(0x7f0000001c00)="032e8a77fa8a95eb2419349ea62d447e919cfc4aa1edbfcbd39f39c8e1f27dd1fdc7d70e79171b27935f8d3f4552fb41acf584e24d11d3c4ff22e125bdbc9c8378db986ebf2586db9e75a7f8e14e6053b8086fb11654a5e5fc87a467f8d01dfdd093b94632dc3dbafb7e1a82ac9eefff1e6174527ab5229dd1878bd8f12e5107bab8319d55fdb2a5ffa4dee3b7058d8e18231a458937", 0x96}, {&(0x7f0000001cc0)="3637a5970a23cfba6e8d892f13a1e7b150656e5e00d3f7ffb15bc1c2f283227293206a7702825d9de01dc65fdae8a9bc7ca97ccd37c4d61a4fb8d4e7437217e988dd67ddaed253f79b9aad9ce42da9e6ad791b8115daf3380ae5b8cc1525", 0x5e}, {&(0x7f0000001d40)="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", 0x1000}, {&(0x7f0000002d40)="06dd675e787aa4b7dc95fec5a97588344b811d2f280765e5b56390576f8116804aece84a4808417438f3f3b1dcb52db390016679a4af408f2c762440de5789d3140d1ae12747159534dac0272e311e7090c00892ed8f3efadd6f296eed307a9a5dcdb443bda96c76c2e7a24036424dbfd5479523cf1c7f8aff4a4f8c8aad05d0b7a15bd8f45e770878d7b70b5cd5f89451baf95b1712b78314354934bed42315b04a4d9a69c0760c6b339f34439662462bebef17e677848fd34ce7c8e42ce9cde00658e6c0ce7fd72265bc77ba789f73c27fba5215cc2acd6c8e3b8e3279e43667ab41", 0xe3}, {&(0x7f0000002e40)}, {&(0x7f0000002e80)="f451c4ab5112ddcd18561aa75238ae773c193dee8794e58173f816a1d7d7ac37786c45056a9b90867a2f257981766f703d3d9b022f9411d336c8ec26182f079427377dcd2b67ad3d39216eb20f21117bc87baaf225a576b682dff0ee550ae184263e0360eb95220fb92cad9a906842fa4b62b119c764eb7530309c228905963d9b820b525a852a77b006861df3c0", 0x8e}], 0xa, &(0x7f0000003000)=[@iv={0x68, 0x117, 0x2, 0x52, "79a174c4604316c2ce783144c584b614abc315e9189a865d3b17f4385d9ea0f6384805ee0e4fa008f85d248534d2f56384766abc1d71b4511bfc1f8be57a6c8394140d5756d03d392c8be49e6c1b5b845851"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x108, 0x117, 0x2, 0xf4, "6fb18ce71a268c3487440dada204e68c4c4fef39739b083aedd30ca2768f72298d59c234cdc0106e11da92a8eeb3c147573544adb6f3bc19e8fb8741d5ac98208d9802ab38efbb258121a716274b06bbbe74d63f4b35c5d8f98da5b097cb9d618aa798b54e23a12fd0a9f76129dbd503326a3aeefdced7eaf12a800cc5e5eb7e0dcbcf9cff7717a4273e4844d7f9110b27a2fbaf6c926058a4886fbaf9cef2f18c69dad0175ffa4f8f5e67f872a048d445802d31752bdae8c6035ea5a76805620d9d7ed72204fac1ce73d04ccef984ccd114a8d9c6f6a13c2f47f23a93afa2c026dd1fd43870612f5dbe92bf062d26b0afd053e9"}, @iv={0x90, 0x117, 0x2, 0x79, "a05ab9b68b2eedf9a608892909bffb32ac6fbb89cf2e25ba07c96746dea11382a4463ec722e3ec39a5616f65a084c13671fb63df78d515c3b5bff09fed1fbdd8f7e6956a65f5d57ba673400225b30eda7de768d3a9a7912352982c0bc52bf342d1f2acee14a462d93834a3aa3eeb8d27f9d8a31333a5e88f49"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x98, 0x117, 0x2, 0x82, "09586e9e4219c48bc650bc62f6e478c2c9d6b885322bf1e9a95c55172f9c90259eaeb8811594133bbbb3cfe6357f8670d38f04e1314bc01df417180939cdad5fb070e3c0ed4b3bf9ebf6e3b3551cc83ed0e4e2cce66c664ea3c08e904eb1945236b5cb9731aa9d9436001d09f693c4c635dd30d616baf51aab0796843ef67e221d3d"}], 0x2e0}, {0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000003300)="184a99033b6fd2eafb51b3a30d51cc9f12225a828fe787b0c22dccc6b03f126d34ecf0b48a9ca4634d56b5e19c2ad8da21bdf575888cf8836b5d4f824749d3fef743f0fb11", 0x45}, {&(0x7f0000003380)="08d1113000ffc55ea27f6b1f1efd3fc0425852869204251426ebb827c915005a90188aef258823dd1edaf3c814cce5458ac317111da274d25225de134f2314b14621608a70f9cf7406b01f0fcd744a0bab641d52b889eb559444d2541eb2cdb4d50488d0538812fbff05ac0d7914168327cf7f92d667b5a9653b", 0x7a}, {&(0x7f0000003400)="5656119abf96f17ea634daf4b28b400df2bfddaac7b7647a311d40bf05a7f2d9d39a7a8dc4a83dd13f90e56db0694f374c36efd7fec908475ef57b1ff57f8e85dd8a16afdf9fd304f85782bb442482c93ecd7892635616b1abcfa3c1171c1b5002b8d37fbbb19998c5e7eb342b8d2de3d28fdff6fcf976077a49ac12921f25d3471eb78a98830031189dbd53e4bc9055cadafda9f5cbb7398928ce1e9eb1", 0x9e}, {&(0x7f00000034c0)="860fef6712594ffa4a03b63a6e5c6e08dd223d7c52305195eec361df1065c478ac5d1a9f87cdd10d4262f10ffdd5f9e48d79a71c9d06feb0fcf427158b9cf73547f4b23d8870ebe595b1808786a447cba0e15938ddc105f73350e68c2ca5e61c274a280f5ec94573eb1a770979f3eba8aec5b0ddd85a7c45f6f13cea960303d6c97762dcf2a84d238e7257eea23818778153fca259bc788df35fcca22ff0c00bdc3ad1084a89253b760d8558c32cee364e6dd69c2adacdefef3b361060ecc09a23af4478d0bd64546b5e340fc8b06d87b7836bb0664f2dcec605", 0xda}], 0x4, &(0x7f0000003600)=[@iv={0x30, 0x117, 0x2, 0x19, "afbfb50cb7ee90b381e03151899e48f1845d0e8957fc2a825d"}, @iv={0x108, 0x117, 0x2, 0xed, "e8f8ff27b5d54f5c99d90805293bf0782140ff168b483cbb2dc29961677ff0a6eef8f9136b2a78f35eee5a29700f81575498f2bcfc17bb6922ce17a50b3aa6e10a0ffa6c5e964bb84c9e06c30f9f739334aa9936f5894c04c31a7410f9bb9c38af4fb9472531fae427034a28d4512ada554172cc61b10e40217c6cba453d40561dc816ff5af4e7106748534cb9fca15cf964784de275dc802fab32397823b62a43c1eae52c57578473ac448b88f26578b0a805d68e0309509b20f0dae4db492fc162824447e92c6d8ea88001cae3edc1516ddf7f78ce77fcdd4aee81952a63dc02a1840802454813ed388fbdb4"}, @assoc={0x18, 0x117, 0x4, 0x8000}, @op={0x18}], 0x168, 0x40000}, {0x0, 0x0, &(0x7f0000004bc0)=[{&(0x7f0000003780)="7cd207333cad5c5bf4820518fa2b6f", 0xf}, {&(0x7f00000037c0)="a04739a5724a84d8a9ea520d947143b8e90a03ed55c588814c9baa7ed4d2cb89f2612671696668a4d683a1a17c28df117486b03e6a54e7b4625f1e63725fdad46a078b176f86282e922e3d25abc4852045e5f15e5e1315bf14aff60b941e58966963ae4c14799938ec35303b4019ba1f297c51950df28aae1d374c3e2c17ada4790110851765f95040e1112cf8f099bf4194b264f01a90c7eaf9ab3dce8a8c8bc68590344678a377db6f7f911e97c52c21b7126819e193dcf55ce5c222ac0a310af8c605c70aed76f206cd84", 0xcc}, {&(0x7f00000038c0)="a8f7daaa6aa52b6e7df3ec1906141a19065bfee7a1d066c5821d80d6e54f3a017a64d98f08083a39c393b4fa99dcce45cb40ded06787294be3bd3b295a18304c5b7ce4c0", 0x44}, {&(0x7f0000003940)="9ff037ddfa1bbd02f8fa3c54ba693d82944e8641c669d0c8eb7a48a86edd60fa19ea8407d52b3fc419646f8210073a95d6446b694d075b71868faab96325f0788b516982a75e66abda106982a01f21f8757c3e0456e4048e31c3c1e2560c3b6fa209476e8d85d432d5b637e5e57464249795e8c319564d26830b3bc5b95d231d2908efb47446d692278f498e99767f652a898387315a8d88d2b2bcc169b83790a178c9064ad4d3906327de2ff834e5869bd81936b2028b39ac6426f1082e4d1b56a6729462c6e83da2261dd35bd915d765e7a0aa175c", 0xd6}, {&(0x7f0000003a40)="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", 0x1000}, {&(0x7f0000004a40)="67aec5ac6287fad0147d165fbbfe77f89126a4b886124ed8e110b1aad95b1906e455ef641f4f1674c3621a7cccbd6e96925b70bc6c5a7957965cf17eeed2e48887e74a4571b1880ce8c64207423795acb265eea1e52b86cd82ef55704edd5fd2cab19a300b1dd293db9fb7963d464b255d414b8fad6031a29e8460e20c184f1aeb45e1ea3ecb5efe0ac9179470961838d99a7838bb81386b3afcdfb148076c4b510dd9b05c705e3d2dbe5a2b9cb1364ea90f6934d1a3bd9b1305c3905db0c37095fd83f09c0152bb34b55302f509c60f6c9f", 0xd2}, {&(0x7f0000004b40)="15b9504a15b0a615b1685880ff3a4cb7647454b4ad4fb02f262dc194049dd153e0cdb1861b63b185c325f4f220c74b66e35b201bd7e7ea60c6372d37eef947312a6c5cb920dd804464789208cc24634dba8ed87af8e29247aadc501942cd053424f3bfcd5020b3cd91a1ff57ca618e08664f712a846d0f22d5fcb01d09c20c", 0x7f}], 0x7, 0x0, 0x0, 0x8005}, {0x0, 0x0, &(0x7f00000050c0)=[{&(0x7f0000004c40)="60bdb0598dada8b5d6b994df545374ffd666408c1bf39d96a59618865dd099bbdb37fa32bfc60e4be828145e744b004a8db0cd942f9bc70ad7fabed1d3987fd0dc0c166c8b44a6753d6292442216d5d5a6ec530447411f0d3fc929f34cc564d10e5fc5292905dd6696450f1e7c876e3e3d26ac955bd3ac343a45f85fc876e944ec31465f13eaac34ef89e8caacf5cadb2a1c3bcde57c172e52f4d5af2a6ed120", 0xa0}, {&(0x7f0000004d00)="778ee8255c818993aa02f36a5584a129a2d96e09a6aa0f5fc79e1dca00fbeadd31d1edbf0fb78fd02fa492af75c44c15a61aa5d50043440c4f50d4de70df354ac7a9f40655c14b3a03580a2e23aabc408d4d466aad4afe33a8635ee3b52493c0495b56a1e75e7f4ce3e71da9c426730b883a9e5f528f32d29ac3a943d81f267cb5507e0e19636305af19b841552736b052c8", 0x92}, {&(0x7f0000004dc0)="39bb0c9ce55c9645bb3e39d97df6decf4c0e8f6a83398620b50792e3ee7b9a17c31bc1640ed4b106e1c3bfe7e0e7f8b64b85144e518d11f47f6e9168c8ad65bf72af942a0ac269587c0984aaa025eb41a5d15d303862ee21ff6e69b29910c95e7cf6f6331cbacf7a389b7b79fba4d642ca032a23583ad806f172ae2e8b93acb6ba314c043f00775af286f3e4", 0x8c}, {&(0x7f0000004e80)="0b9cb3d56f333ef47d8010a42e7be69e662469f728afa4cdfb2c28c1695bc8f4852f6972cde45571b0c3bf03fc4dc458b7da85702ef679d17a8a8e1860a9252e550d113660e052572ae64f001c037b34212bc2f8deecb4420d11e102e4033280f19a390e23b30577490d43193c83a09ec2e7f4040507e31acf5e8d86217d4d89c7af0fb7bcb9ef1fa20a3585126405995fa33765866f8ed9e7de66602091973170d157fa15b882d4876d224fdadb7d7d9e4c630b711feb48ed2c7aa0512fd6f94ee8", 0xc2}, {&(0x7f0000004f80)="750a0cf6094a9eb446", 0x9}, {&(0x7f0000004fc0)="3b63a231c9b833cb2e16dbf5f7408607c00e3a194af28f75678ca0c3ba1bb1150cf3f777e9bc0ce666b79bd73369f942fbca50c98bae3eb4819e1b4fb883c2fc5095129de51c82e1afc66fb818281b8df00c34a41e7a80f71867f6a6e573f6467a05199d3bb57540a1553791e47221da406e2f732160cf561bb431f1cfb2ccd8646cd8d57eaa535214c480d20ac28bebb1fbf19c719c29075a26881c89d833c336a6895ff79275577e580ac23189f5600d21f85c0f3507c58c9f1bd468e7fad4c6e2b7", 0xc3}], 0x6, &(0x7f0000005140)=[@iv={0x50, 0x117, 0x2, 0x36, "ca7ee16906ecf7dff01b4da31953005be9ef9abef1eac0a3a3f2bebffb5bf3adead7a058e997e0025213252a61417023dccc686de762"}, @iv={0x108, 0x117, 0x2, 0xf4, "22f3650b4fc83542241baa24367cd1cbcd256b4fd9e8d3c0fac97091574923817349eefbf87039267480abb3d1fd9b20424805fab18b54f820648598296bf190f55a8bf506bbbe0549bc74a4c467cdadc54b00d43e824f187908c9e2869784e63f505eeef5b99294e1f24abcb5c14aa42971d713bc67b25083c2259029dc0c8d726e7498bbc1dc0e99087f91bd698c39db0b137228d363b8f2fcb9a829af55a824a1413e97552f1b8fe3e57e5e622da9736db469423916815558878a41d0e57e4feed6e0b09253a400c4fa963c07e5fc43986e72c68b9337e7815d9d2717bad7cf0801e62764e25dcef2cd3fe284fab1c6a6c337"}], 0x158, 0x10}, {0x0, 0x0, &(0x7f00000053c0)=[{&(0x7f00000052c0)="ac7ed506571a084430a0feaafe49b5f7ae1142c1b0dce285ae5afdba5589204483dab336523db44437b74f34e18c61a10228a11d972bcbc282659389014ffd28511d61a79162344ee7dd06f54a4f3b7fe711f2fe9a6a6498eb10065cb98f23a36700cb6fdf8e04339f6c992a0d71484fe946a6beff8a42ee645c4532589b0dfcd2c1b5411c122ee3f9231f4d28b62c1ed324a65c56fe1cb34d3c5ff85d518b428e0dfe9fd7c1289653d79ad2710b24d43619bc894c421cc136b0bd26c17556dcc5d8684646ae2329a9e48f4e1339cba964813f14f2714fa536cb468495cf76c66fa174bdd2c142c1c4db4f1409f144e889d812ac7440a4", 0xf7}], 0x1, &(0x7f0000005400)=[@op={0x18}, @assoc={0x18, 0x117, 0x4, 0x100}, @iv={0x18}, @assoc={0x18, 0x117, 0x4, 0xffff}, @iv={0xe8, 0x117, 0x2, 0xcd, "6366501009bd3f197e6731afcc75f4f9ddcb7887c9e4257c9bbe8f0c3b63cacf83f656074593a13ecf9f7d4b62a6cc94db572726b530506a295a399509537074ccbcc375be0bbad35eb7379eb2f00515f20076b46021522b7864b35a1f39cc98954adedd1c722d93f47e03a0980cc81a07ee853b5f9d83b9b3034edffa6de2f78a210ddf6f4e1b3fb2ae4f558ac4b59cb7e2f3236f0c41a8b4d2f650aa5bbbc4ebd8956619a3f014db3aedaa6cbafffcdaab30117ac9459e190c320c9d0f7d91b81dc1e0915b34131138caf486"}, @iv={0xc8, 0x117, 0x2, 0xb1, "83660a0a6613d9e08d1561332ffcdb50c9e6346b9527944210c39a6d98de81364db57f3c801d9c1b4e5fd6296330c29ef2c4277b73a545169a11e224073d37efbc394700a35d613fdd78fe6eb7b17237914c3d3f125c1b0cfef95cb723f53a99d785dc7e6c27f06f309cde60d05c57933a9f8e6c90ecf676c46a52e514de5ac78fd500f415bdb5b91d13afe6b0f4b2b6f1d485240e5edca8b598a93735d36f1ed6498f16946ba60e20561f06c93a2a6045"}, @op={0x18, 0x117, 0x3, 0x1}], 0x228}, {0x0, 0x0, &(0x7f0000005980)=[{&(0x7f0000005640)="7459be6ff5bd7643658fed2d36667cc34f061b7a", 0x14}, {&(0x7f0000005680)="68fb38d8755d5175cb9a53ef0b35d3b2cefe852489d7f11279ff861d9a956dc0fc9e3a270904ce535199a4e601bb03b0a95dca3d579e192dcd65b09f1a5746c60b37311957ef412d9cb212f17c88432ffa054e3497d0865468ce796a77b6ec3d435e90a53c9b01cb77084c15eed16002f3585066bb", 0x75}, {&(0x7f0000005700)="522a600bdf7ecbe9e1f60f533f6e102c6f44f9d40d011a627025fe42e1e59036a1aeda7bafc9fff7916ac7fb9de279fbe1675173d91c2f512e80cfa8a1aa9eb4acbe2edfe60a", 0x46}, {&(0x7f0000005780)="33204fc37b5ba4ed8f816a5b4e0934da786645a5e49affa2f3152d51d4a936aa75ae9da181ac95ce06b76dfa6638f15c50df424636f46dd0e1301d342e007749a11dc68bdf276c91b54f7dd0db0186a1e060ec3295961d0d61e531cd28a80046c37c88c422e4ba2c81ed0c58f932f179afa288060371b14bdcbbb1c671091fef5b0b1a92e263cfc98447a4c38963886fc0092769014bfcf1878aa858952c3343d53f3cdf048a8651427aaa7bf27f32db5d6ac3b1daaa7e5d2f260ef6802d951604911b5a41b8b5f8d6906a154691a5c96e0c70876e6a", 0xd6}, {&(0x7f0000005880)="2a2d40a329afa480e899b079c4126cef645ab72fe69b13e0ca9d2401123c99d32c79ef4cc17568c991b1cda8e8d6a368f875e089671294b4", 0x38}, {&(0x7f00000058c0)="7b2ccddb7fdbbea96dab2540d971c3fcc8dad5997a78f1abbdfc9aa5db128dfd72de032808a645d98a532e6821ba31275a154e345fb6311149ebb63066b5ccac3bd3d9228389d5a1df39dd2e567909246769063ce4aa744861934f0f66199b8e8d5d0e1a72549e13faec59768360ce29035e8625a59b2ba783e74d857e493851f95f261ecfa0c284f6ffcc84a7987f85bb771797447696dd2b48fa31c9fac913d0160486d75f143fe8b27bd0168473c7802dfb18011528caf930d6f2e041", 0xbe}], 0x6, 0x0, 0x0, 0x40000}], 0x9, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x6, 0x1000003ff, 0x837f, 0x4, 0x3, 0x3a6, 0x9, 0x100000000, 0x3, 0x9, 0x3ff}, 0xb) [ 950.606581][ T3753] FAULT_INJECTION: forcing a failure. [ 950.606581][ T3753] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 950.619865][ T3753] CPU: 1 PID: 3753 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 950.627773][ T3753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.637877][ T3753] Call Trace: [ 950.641205][ T3753] dump_stack+0x172/0x1f0 [ 950.645583][ T3753] should_fail.cold+0xa/0x15 [ 950.650222][ T3753] ? __lock_acquire+0x548/0x3fb0 [ 950.655198][ T3753] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 950.661037][ T3753] ? __lock_acquire+0x548/0x3fb0 [ 950.666019][ T3753] should_fail_alloc_page+0x50/0x60 [ 950.671262][ T3753] __alloc_pages_nodemask+0x1a1/0x8d0 [ 950.676678][ T3753] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 950.682433][ T3753] ? find_held_lock+0x35/0x130 [ 950.687237][ T3753] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 950.693098][ T3753] cache_grow_begin+0x9c/0x860 [ 950.697986][ T3753] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 950.704294][ T3753] kmem_cache_alloc+0x62d/0x6f0 [ 950.709284][ T3753] ? notify_change+0x6d5/0xfb0 [ 950.714142][ T3753] ? do_sys_ftruncate+0x41e/0x550 [ 950.719298][ T3753] getname_flags+0xd6/0x5b0 [ 950.723926][ T3753] getname+0x1a/0x20 [ 950.727849][ T3753] do_sys_open+0x2c9/0x5d0 [ 950.732304][ T3753] ? filp_open+0x80/0x80 [ 950.736605][ T3753] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 950.742882][ T3753] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 950.748400][ T3753] ? do_syscall_64+0x26/0x610 [ 950.754419][ T3753] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.760521][ T3753] ? do_syscall_64+0x26/0x610 [ 950.765241][ T3753] __x64_sys_open+0x7e/0xc0 [ 950.769777][ T3753] do_syscall_64+0x103/0x610 [ 950.774408][ T3753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.780332][ T3753] RIP: 0033:0x412d41 [ 950.784270][ T3753] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 21:21:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0xfffffffffffffffe, 0x110001) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10010, r1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0xa, r0, 0x201, 0x8, 0x1000000000100}) 21:21:27 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) tee(r0, r0, 0x9, 0xc) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) fstat(r0, &(0x7f0000000000)) [ 950.803894][ T3753] RSP: 002b:00007faa42150a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 950.812332][ T3753] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412d41 [ 950.820345][ T3753] RDX: 00007faa42150b0a RSI: 0000000000000002 RDI: 00007faa42150b00 [ 950.828358][ T3753] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 950.836384][ T3753] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 950.844390][ T3753] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000003 [ 950.892934][ T3739] device nr0 entered promiscuous mode [ 951.010532][ T3753] gfs2: not a GFS2 filesystem 21:21:28 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x2c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x3300000000000000, &(0x7f00000009c0), 0x3e8, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 21:21:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4f00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:28 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect(r0, &(0x7f0000000180)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x80) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000040)={0x9, {{0xa, 0x4e20, 0x20, @local, 0x4b5b}}, {{0xa, 0x4e21, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}}}, 0x108) socket$rds(0x15, 0x5, 0x0) 21:21:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x1) 21:21:28 executing program 4 (fault-call:1 fault-nth:7): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xff0f0000}) 21:21:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:28 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x4040) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000040)={{0x661b, 0x100000001}, {0x4, 0x7ff}, 0x9, 0x6, 0x3ff}) [ 951.586569][ T3792] FAULT_INJECTION: forcing a failure. [ 951.586569][ T3792] name failslab, interval 1, probability 0, space 0, times 0 21:21:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 951.733402][ T3792] CPU: 0 PID: 3792 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 951.741370][ T3792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.751455][ T3792] Call Trace: [ 951.754793][ T3792] dump_stack+0x172/0x1f0 [ 951.759159][ T3792] should_fail.cold+0xa/0x15 [ 951.763789][ T3792] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 951.769639][ T3792] ? ___might_sleep+0x163/0x280 [ 951.774525][ T3792] __should_failslab+0x121/0x190 [ 951.779491][ T3792] should_failslab+0x9/0x14 [ 951.784025][ T3792] kmem_cache_alloc+0x2b2/0x6f0 [ 951.788915][ T3792] ? __save_stack_trace+0x99/0x100 [ 951.794065][ T3792] __alloc_file+0x27/0x300 [ 951.798502][ T3792] alloc_empty_file+0x72/0x170 [ 951.803294][ T3792] path_openat+0xef/0x46e0 [ 951.807768][ T3792] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 951.813604][ T3792] ? kasan_slab_alloc+0xf/0x20 [ 951.818389][ T3792] ? kmem_cache_alloc+0x11a/0x6f0 [ 951.823431][ T3792] ? getname_flags+0xd6/0x5b0 [ 951.828127][ T3792] ? getname+0x1a/0x20 [ 951.832213][ T3792] ? do_sys_open+0x2c9/0x5d0 [ 951.836817][ T3792] ? __x64_sys_open+0x7e/0xc0 [ 951.841511][ T3792] ? do_syscall_64+0x103/0x610 [ 951.846296][ T3792] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.852480][ T3792] ? __lock_acquire+0x548/0x3fb0 [ 951.857444][ T3792] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 951.862865][ T3792] ? __alloc_fd+0x44d/0x560 [ 951.867392][ T3792] do_filp_open+0x1a1/0x280 [ 951.871918][ T3792] ? may_open_dev+0x100/0x100 [ 951.876629][ T3792] ? lock_downgrade+0x880/0x880 [ 951.882947][ T3792] ? kasan_check_read+0x11/0x20 [ 951.887820][ T3792] ? do_raw_spin_unlock+0x57/0x270 [ 951.892952][ T3792] ? _raw_spin_unlock+0x2d/0x50 [ 951.897833][ T3792] ? __alloc_fd+0x44d/0x560 [ 951.902366][ T3792] do_sys_open+0x3fe/0x5d0 [ 951.906808][ T3792] ? filp_open+0x80/0x80 [ 951.911081][ T3792] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 951.917340][ T3792] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 951.922827][ T3792] ? do_syscall_64+0x26/0x610 [ 951.927522][ T3792] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 21:21:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1, 0x37) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc0ff, 0x3}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) [ 951.933614][ T3792] ? do_syscall_64+0x26/0x610 [ 951.938308][ T3792] __x64_sys_open+0x7e/0xc0 [ 951.942835][ T3792] do_syscall_64+0x103/0x610 [ 951.942857][ T3792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.942869][ T3792] RIP: 0033:0x412d41 [ 951.942885][ T3792] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 951.942892][ T3792] RSP: 002b:00007faa42150a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 951.942905][ T3792] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412d41 [ 951.942913][ T3792] RDX: 00007faa42150b0a RSI: 0000000000000002 RDI: 00007faa42150b00 [ 951.942920][ T3792] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 951.942927][ T3792] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 951.942935][ T3792] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000003 [ 952.032474][ T27] audit: type=1800 audit(1556832088.770:881): pid=3784 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17880 res=0 21:21:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000000), 0x0, 0x80000001) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) 21:21:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000100)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) 21:21:29 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400000, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-monitor\x00', 0x30102, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x8, 0x0) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2c600, 0x0) r9 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x0, 0x103080) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r2, 0x8, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xf5c0}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x57fbb158}]}, 0x60}, 0x1, 0x0, 0x0, 0x400c0c0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000100)=']#\x00') 21:21:29 executing program 4 (fault-call:1 fault-nth:8): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xffffffe4}) [ 952.674866][ T3828] FAULT_INJECTION: forcing a failure. [ 952.674866][ T3828] name failslab, interval 1, probability 0, space 0, times 0 [ 952.709184][ T3828] CPU: 1 PID: 3828 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 952.717143][ T3828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.717152][ T3828] Call Trace: [ 952.717187][ T3828] dump_stack+0x172/0x1f0 [ 952.717216][ T3828] should_fail.cold+0xa/0x15 [ 952.739689][ T3828] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 952.745532][ T3828] ? ___might_sleep+0x163/0x280 [ 952.745563][ T3828] __should_failslab+0x121/0x190 [ 952.756922][ T3828] should_failslab+0x9/0x14 [ 952.761478][ T3828] kmem_cache_alloc+0x2b2/0x6f0 [ 952.766364][ T3828] ? __save_stack_trace+0x99/0x100 [ 952.771528][ T3828] __alloc_file+0x27/0x300 [ 952.775977][ T3828] alloc_empty_file+0x72/0x170 [ 952.780776][ T3828] path_openat+0xef/0x46e0 [ 952.785224][ T3828] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 952.791056][ T3828] ? kasan_slab_alloc+0xf/0x20 [ 952.795846][ T3828] ? kmem_cache_alloc+0x11a/0x6f0 [ 952.800897][ T3828] ? getname_flags+0xd6/0x5b0 [ 952.805605][ T3828] ? getname+0x1a/0x20 [ 952.811316][ T3828] ? do_sys_open+0x2c9/0x5d0 [ 952.818471][ T3828] ? __x64_sys_open+0x7e/0xc0 [ 952.823175][ T3828] ? do_syscall_64+0x103/0x610 [ 952.827973][ T3828] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.834097][ T3828] ? __lock_acquire+0x548/0x3fb0 [ 952.839074][ T3828] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 952.844579][ T3828] ? __alloc_fd+0x44d/0x560 [ 952.849246][ T3828] do_filp_open+0x1a1/0x280 [ 952.853783][ T3828] ? may_open_dev+0x100/0x100 [ 952.858506][ T3828] ? lock_downgrade+0x880/0x880 [ 952.863481][ T3828] ? kasan_check_read+0x11/0x20 [ 952.868387][ T3828] ? do_raw_spin_unlock+0x57/0x270 [ 952.873556][ T3828] ? _raw_spin_unlock+0x2d/0x50 [ 952.878451][ T3828] ? __alloc_fd+0x44d/0x560 [ 952.883513][ T3828] do_sys_open+0x3fe/0x5d0 [ 952.887986][ T3828] ? filp_open+0x80/0x80 [ 952.892276][ T3828] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 952.898561][ T3828] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 952.904061][ T3828] ? do_syscall_64+0x26/0x610 [ 952.908783][ T3828] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.914884][ T3828] ? do_syscall_64+0x26/0x610 [ 952.919624][ T3828] __x64_sys_open+0x7e/0xc0 [ 952.924170][ T3828] do_syscall_64+0x103/0x610 [ 952.928798][ T3828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.934734][ T3828] RIP: 0033:0x412d41 [ 952.938682][ T3828] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 952.958400][ T3828] RSP: 002b:00007faa42150a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 952.966840][ T3828] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412d41 21:21:29 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xa4fd, 0x181000) readlinkat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/235, 0xeb) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r1, 0x104, 0x5, &(0x7f0000000100), 0x4) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2001, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000040)={0x1, 0xab6, 0x3f}) 21:21:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 952.974832][ T3828] RDX: 00007faa42150b0a RSI: 0000000000000002 RDI: 00007faa42150b00 [ 952.982827][ T3828] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 952.990821][ T3828] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 952.998818][ T3828] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000005 21:21:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='memory.events\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x2a5050ea) recvmsg(0xffffffffffffffff, 0x0, 0x10000) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000780), 0x0}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') socket$kcm(0x29, 0x5, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40002, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 21:21:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:29 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000080)={0x400, 0x2a8, 0x80000001, 0xfffffffffffffffb}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0xf4) 21:21:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) write$uinput_user_dev(r0, &(0x7f0000000280)={'syz1\x00', {0x157, 0x1, 0x7fff, 0x7}, 0x3e, [0x7ff, 0x0, 0x4000000000, 0x2, 0x6, 0x7, 0xffff, 0x0, 0x6335, 0x1, 0x20, 0x4, 0x1, 0x100, 0x3ec9, 0x400, 0x7fffffff, 0x4, 0x4, 0x0, 0x7, 0x3, 0x8, 0x7fffffff, 0x100000000, 0x7fffffff, 0x3, 0x100000000, 0x80, 0xf9, 0x87, 0x47, 0xffffffffffffff81, 0x80000001, 0x7fffffff, 0x5, 0x7dac, 0x6, 0x4e70c29d, 0x4, 0x2, 0xc2a, 0x6, 0x40, 0x100, 0xf8, 0x7f, 0xfff, 0x0, 0x3, 0x20, 0x5, 0x0, 0x1ff, 0x0, 0x6, 0x0, 0x3, 0x9, 0x101, 0x6, 0x9, 0x2, 0x2fdeb0ce], [0xe5, 0x6, 0x2, 0x6, 0x1, 0xec00000000000, 0x5, 0x91, 0x7, 0x1000, 0x4, 0x80000001, 0x9, 0x9, 0xfffffffffffffffb, 0x6, 0x5, 0x101, 0x80, 0x6, 0xfffffffffffffffe, 0x7, 0x40, 0x9, 0x3, 0x100000001, 0x0, 0x1, 0x5311, 0xaf, 0x8c, 0x19, 0x40, 0xede, 0x8, 0x6, 0x7ff, 0x7fffffff, 0x7fffffff, 0x4, 0x3fe, 0x3ff, 0x8, 0x7, 0xa2d9, 0x3, 0x6, 0x1, 0xa549, 0x7, 0x3, 0x2, 0x1, 0x1000, 0x7, 0x4, 0x1, 0xc28, 0x1, 0x92d4, 0x200, 0xfffffffffffffe01, 0x4, 0xfffffffffffffff9], [0x1000, 0x101, 0xe5, 0xffffffff, 0x3f, 0x8, 0x1000, 0x2, 0x4, 0x4, 0x1, 0x1a0, 0x5, 0x5, 0x94, 0x3, 0x2, 0x3, 0xf5, 0x20, 0xfff, 0x8000, 0x1f, 0xf2, 0x0, 0x7, 0x7, 0x9900, 0x8000, 0x8, 0x6, 0x400000000000000, 0x4, 0xc8, 0x54, 0x0, 0xd21e, 0x200, 0x3ff, 0xffff, 0x9, 0x1, 0x9, 0x3, 0xffffffffffffffdd, 0x80000000, 0x8001, 0x8, 0x1f, 0xabea, 0x6, 0x4e, 0x4, 0x9911, 0x5, 0xfffffffffffffff9, 0x17800000000, 0xca68, 0x9, 0x101, 0x0, 0x40, 0xfffffffffffffbff, 0xc0000000000], [0x6, 0x0, 0x2, 0xffffffffffbc2670, 0xf946, 0x7, 0x1f, 0xe0b, 0x7, 0x2, 0x5, 0xffffffffffffffff, 0x21, 0xffffffff, 0x0, 0x96, 0x2, 0x940d, 0x7, 0x2, 0xffffffffffffff66, 0x2, 0x8, 0x20, 0x8001, 0x6, 0x3, 0x81, 0x1, 0x0, 0x400, 0x9, 0x4, 0x8, 0x1ff, 0x3, 0x0, 0x97aa, 0x0, 0x16c, 0x4, 0x9, 0x7f, 0xfffffffffffffffa, 0x3, 0x6, 0x9, 0x7, 0x8, 0x5, 0x10000, 0x10000, 0x4, 0x5c6, 0xfffffffffffffffa, 0x9, 0x909, 0x8, 0x0, 0x1, 0x20, 0x5f, 0xfffffffffffffffd, 0x3]}, 0x45c) [ 953.250334][ T3843] device nr0 entered promiscuous mode [ 953.282337][ T27] audit: type=1800 audit(1556832090.020:882): pid=3826 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17883 res=0 21:21:30 executing program 5: ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x40000, 0x0) readahead(r0, 0x6, 0x3) r1 = socket(0x15, 0x807, 0x3) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x7, "dce29a946f290e"}, &(0x7f0000000140)=0xf) fsetxattr$security_capability(r1, &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0x5, 0x2}, {0x10000, 0x55}]}, 0x14, 0x3) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={r2, 0x401, 0x30}, 0xc) r3 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x200, 0x40) ioctl$TIOCNXCL(r3, 0x540d) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x638) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0) accept4$rose(r4, &(0x7f0000000040)=@full={0xb, @dev, @bcast, 0x0, [@netrom, @remote, @bcast, @null, @bcast]}, &(0x7f0000000080)=0x40, 0x0) 21:21:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6100}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xfffffff0}) [ 953.841366][ T27] audit: type=1800 audit(1556832090.570:883): pid=3856 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17896 res=0 21:21:30 executing program 4 (fault-call:1 fault-nth:9): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:30 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x200100, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x7}, 0x10) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000000c0)={r3, 0x62, "346050a4924635b35b9f618648b6b0d7613a17bd8f8615436d9aba58ccc63d6ef2fbe69cca5ecb09eed06f170a71de12fff341979558cad33b780ee85dc35bc526242741a42992390baeb5908cfd0b8d9d3eeea43af0cdb0f0a44933c8767e04deba"}, &(0x7f0000000140)=0x6a) 21:21:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xfffffffe}) 21:21:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='memory.events\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x2a5050ea) recvmsg(0xffffffffffffffff, 0x0, 0x10000) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000780), 0x0}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') socket$kcm(0x29, 0x5, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40002, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 21:21:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000140)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r0, &(0x7f0000000280)={0x78, 0x0, 0x7, {0x4000, 0x4, 0x0, {0x5, 0x2, 0x2, 0x9, 0x2, 0x3, 0x6, 0x6, 0x4, 0x3, 0x35, r2, r3, 0x1f, 0xf28d}}}, 0x78) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0xa, r1, 0x8000, 0x1, 0xfffffffffffffffd, 0x5}) 21:21:30 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x4d91, 0x20000) 21:21:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 954.214221][ T3879] FAULT_INJECTION: forcing a failure. [ 954.214221][ T3879] name failslab, interval 1, probability 0, space 0, times 0 [ 954.256820][ T3879] CPU: 1 PID: 3879 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 954.264852][ T3879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 954.274967][ T3879] Call Trace: [ 954.278381][ T3879] dump_stack+0x172/0x1f0 [ 954.282744][ T3879] should_fail.cold+0xa/0x15 [ 954.287403][ T3879] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 954.293321][ T3879] ? ___might_sleep+0x163/0x280 [ 954.298199][ T3879] __should_failslab+0x121/0x190 [ 954.303162][ T3879] ? loop_info64_to_compat+0x6d0/0x6d0 [ 954.308639][ T3879] should_failslab+0x9/0x14 [ 954.313169][ T3879] kmem_cache_alloc_trace+0x2d1/0x760 [ 954.318571][ T3879] ? lockdep_init_map+0x1be/0x6d0 [ 954.323644][ T3879] ? loop_info64_to_compat+0x6d0/0x6d0 [ 954.329145][ T3879] __kthread_create_on_node+0xf2/0x460 [ 954.334641][ T3879] ? lock_acquire+0x16f/0x3f0 [ 954.339341][ T3879] ? kthread_parkme+0xb0/0xb0 [ 954.344049][ T3879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 954.350328][ T3879] ? kasan_check_read+0x11/0x20 [ 954.355227][ T3879] ? mutex_trylock+0x1e0/0x1e0 [ 954.360009][ T3879] ? loop_info64_to_compat+0x6d0/0x6d0 [ 954.365494][ T3879] kthread_create_on_node+0xbb/0xf0 [ 954.370717][ T3879] ? __kthread_create_on_node+0x460/0x460 [ 954.376650][ T3879] ? lockdep_init_map+0x1be/0x6d0 [ 954.381699][ T3879] ? lockdep_init_map+0x1be/0x6d0 [ 954.386756][ T3879] lo_ioctl+0xc1b/0x2150 [ 954.391023][ T3879] ? lo_rw_aio+0x1120/0x1120 [ 954.395648][ T3879] blkdev_ioctl+0x6f2/0x1d10 [ 954.400255][ T3879] ? blkpg_ioctl+0xa90/0xa90 [ 954.404863][ T3879] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 954.411146][ T3879] ? __fget+0x35a/0x550 [ 954.415335][ T3879] block_ioctl+0xee/0x130 [ 954.419689][ T3879] ? blkdev_fallocate+0x410/0x410 [ 954.424736][ T3879] do_vfs_ioctl+0xd6e/0x1390 [ 954.429362][ T3879] ? ioctl_preallocate+0x210/0x210 [ 954.434495][ T3879] ? __fget+0x381/0x550 [ 954.438695][ T3879] ? ksys_dup3+0x3e0/0x3e0 [ 954.443135][ T3879] ? do_sys_open+0x31d/0x5d0 [ 954.447755][ T3879] ? tomoyo_file_ioctl+0x23/0x30 [ 954.453161][ T3879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 954.459429][ T3879] ? security_file_ioctl+0x93/0xc0 [ 954.464577][ T3879] ksys_ioctl+0xab/0xd0 [ 954.468941][ T3879] __x64_sys_ioctl+0x73/0xb0 [ 954.473562][ T3879] do_syscall_64+0x103/0x610 [ 954.478214][ T3879] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 954.484124][ T3879] RIP: 0033:0x458c17 [ 954.488037][ T3879] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 954.507702][ T3879] RSP: 002b:00007faa42150a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 954.516141][ T3879] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c17 [ 954.524134][ T3879] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 954.532129][ T3879] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 954.540121][ T3879] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 954.548117][ T3879] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000005 21:21:31 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x6006732f, 0x80) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000040)={0x0, @bt={0x7, 0x2, 0x1, 0x2, 0xf484, 0x3, 0x6, 0x6, 0x4, 0x4, 0x0, 0x1272, 0x24b6, 0x3ff, 0x14, 0x24}}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:21:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 954.676646][ T3882] device nr0 entered promiscuous mode 21:21:31 executing program 4 (fault-call:1 fault-nth:10): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) read(r0, &(0x7f0000000140)=""/113, 0x71) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000040)={0x0, @reserved}) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x166) 21:21:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:31 executing program 0: socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0xffffffffffffff48, 0x0) r0 = gettid() mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, 0x0) tkill(r0, 0x800000000000014) 21:21:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 955.022237][ T3905] FAULT_INJECTION: forcing a failure. [ 955.022237][ T3905] name failslab, interval 1, probability 0, space 0, times 0 [ 955.072101][ T3905] CPU: 0 PID: 3905 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 955.080061][ T3905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.090138][ T3905] Call Trace: [ 955.093459][ T3905] dump_stack+0x172/0x1f0 [ 955.097831][ T3905] should_fail.cold+0xa/0x15 [ 955.102463][ T3905] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 955.108298][ T3905] ? ___might_sleep+0x163/0x280 [ 955.113166][ T3905] __should_failslab+0x121/0x190 [ 955.118118][ T3905] should_failslab+0x9/0x14 [ 955.122636][ T3905] kmem_cache_alloc+0x2b2/0x6f0 [ 955.127498][ T3905] ? __schedule+0x1383/0x1cc0 [ 955.132210][ T3905] __kernfs_new_node+0xef/0x690 [ 955.137072][ T3905] ? _raw_spin_unlock_irq+0x28/0x90 [ 955.142285][ T3905] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 955.147747][ T3905] ? kasan_check_read+0x11/0x20 [ 955.152619][ T3905] ? _raw_spin_unlock_irq+0x5e/0x90 [ 955.157851][ T3905] ? __schedule+0x1383/0x1cc0 [ 955.162545][ T3905] ? __lock_acquire+0x548/0x3fb0 [ 955.167496][ T3905] kernfs_new_node+0x99/0x130 [ 955.172196][ T3905] kernfs_create_dir_ns+0x52/0x160 [ 955.177329][ T3905] internal_create_group+0x7f8/0xc40 [ 955.182642][ T3905] ? bd_set_size+0x89/0xb0 [ 955.187084][ T3905] ? remove_files.isra.0+0x190/0x190 [ 955.192392][ T3905] sysfs_create_group+0x20/0x30 [ 955.197251][ T3905] lo_ioctl+0x10af/0x2150 [ 955.201601][ T3905] ? lo_rw_aio+0x1120/0x1120 [ 955.206203][ T3905] blkdev_ioctl+0x6f2/0x1d10 [ 955.210801][ T3905] ? blkpg_ioctl+0xa90/0xa90 [ 955.215398][ T3905] ? tomoyo_execute_permission+0x4a0/0x4a0 21:21:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x20000000000000}) [ 955.221222][ T3905] ? __fget+0x35a/0x550 [ 955.225393][ T3905] block_ioctl+0xee/0x130 [ 955.229729][ T3905] ? blkdev_fallocate+0x410/0x410 [ 955.234763][ T3905] do_vfs_ioctl+0xd6e/0x1390 [ 955.239360][ T3905] ? ioctl_preallocate+0x210/0x210 [ 955.244481][ T3905] ? __fget+0x381/0x550 [ 955.248646][ T3905] ? ksys_dup3+0x3e0/0x3e0 [ 955.253071][ T3905] ? do_sys_open+0x31d/0x5d0 [ 955.257678][ T3905] ? tomoyo_file_ioctl+0x23/0x30 [ 955.262630][ T3905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 955.268887][ T3905] ? security_file_ioctl+0x93/0xc0 [ 955.274045][ T3905] ksys_ioctl+0xab/0xd0 [ 955.278215][ T3905] __x64_sys_ioctl+0x73/0xb0 [ 955.282815][ T3905] do_syscall_64+0x103/0x610 [ 955.287418][ T3905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 955.293311][ T3905] RIP: 0033:0x458c17 [ 955.297209][ T3905] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 955.316822][ T3905] RSP: 002b:00007faa42150a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 955.325247][ T3905] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c17 [ 955.333228][ T3905] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 955.341214][ T3905] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 955.349190][ T3905] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 955.357162][ T3905] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000005 [ 955.385732][ T3905] gfs2: not a GFS2 filesystem 21:21:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='memory.events\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x2a5050ea) recvmsg(0xffffffffffffffff, 0x0, 0x10000) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000780), 0x0}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') socket$kcm(0x29, 0x5, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40002, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 21:21:32 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = open(&(0x7f0000000000)='./file0\x00', 0x1, 0x80) read$rfkill(r1, &(0x7f0000000040), 0x8) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000080)) 21:21:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7100}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:32 executing program 4 (fault-call:1 fault-nth:11): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:32 executing program 0: sendmmsg(0xffffffffffffffff, 0x0, 0xffffffffffffff48, 0x0) r0 = gettid() mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) socket(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$restrict_keyring(0x1d, r1, &(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000100)='wlan0nodev\x00') tkill(r0, 0x800000000000014) 21:21:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x100000000000000}) 21:21:32 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:21:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 955.695622][ T3933] FAULT_INJECTION: forcing a failure. [ 955.695622][ T3933] name failslab, interval 1, probability 0, space 0, times 0 [ 955.750947][ T27] audit: type=1800 audit(1556832092.480:884): pid=3931 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17911 res=0 [ 955.761789][ T3938] device nr0 entered promiscuous mode [ 955.792459][ T3933] CPU: 1 PID: 3933 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 955.800566][ T3933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.812314][ T3933] Call Trace: [ 955.815710][ T3933] dump_stack+0x172/0x1f0 [ 955.820711][ T3933] should_fail.cold+0xa/0x15 [ 955.825421][ T3933] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 955.831357][ T3933] ? ___might_sleep+0x163/0x280 [ 955.836699][ T3933] __should_failslab+0x121/0x190 [ 955.841757][ T3933] should_failslab+0x9/0x14 [ 955.846368][ T3933] kmem_cache_alloc+0x2b2/0x6f0 [ 955.851335][ T3933] ? find_held_lock+0x35/0x130 [ 955.856351][ T3933] ? kernfs_activate+0x192/0x1f0 [ 955.862125][ T3933] __kernfs_new_node+0xef/0x690 [ 955.867364][ T3933] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 955.873192][ T3933] ? lock_downgrade+0x880/0x880 [ 955.878145][ T3933] ? kasan_check_write+0x14/0x20 [ 955.884874][ T3933] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 955.890515][ T3933] ? wait_for_completion+0x440/0x440 [ 955.895908][ T3933] kernfs_new_node+0x99/0x130 [ 955.900729][ T3933] __kernfs_create_file+0x51/0x340 [ 955.906229][ T3933] sysfs_add_file_mode_ns+0x222/0x560 [ 955.911992][ T3933] internal_create_group+0x35b/0xc40 [ 955.917535][ T3933] ? bd_set_size+0x89/0xb0 [ 955.922419][ T3933] ? remove_files.isra.0+0x190/0x190 [ 955.927832][ T3933] sysfs_create_group+0x20/0x30 [ 955.932782][ T3933] lo_ioctl+0x10af/0x2150 [ 955.937221][ T3933] ? lo_rw_aio+0x1120/0x1120 [ 955.941973][ T3933] blkdev_ioctl+0x6f2/0x1d10 [ 955.946786][ T3933] ? blkpg_ioctl+0xa90/0xa90 [ 955.951597][ T3933] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 955.959132][ T3933] ? __fget+0x35a/0x550 [ 955.963377][ T3933] block_ioctl+0xee/0x130 [ 955.967784][ T3933] ? blkdev_fallocate+0x410/0x410 [ 955.972902][ T3933] do_vfs_ioctl+0xd6e/0x1390 [ 955.977619][ T3933] ? ioctl_preallocate+0x210/0x210 [ 955.982817][ T3933] ? __fget+0x381/0x550 [ 955.987087][ T3933] ? ksys_dup3+0x3e0/0x3e0 [ 955.991561][ T3933] ? do_sys_open+0x31d/0x5d0 [ 955.996183][ T3933] ? tomoyo_file_ioctl+0x23/0x30 [ 956.001316][ T3933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 956.007595][ T3933] ? security_file_ioctl+0x93/0xc0 [ 956.012727][ T3933] ksys_ioctl+0xab/0xd0 [ 956.016902][ T3933] __x64_sys_ioctl+0x73/0xb0 [ 956.021519][ T3933] do_syscall_64+0x103/0x610 [ 956.026135][ T3933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 956.032040][ T3933] RIP: 0033:0x458c17 [ 956.035946][ T3933] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 956.055567][ T3933] RSP: 002b:00007faa42150a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 956.064029][ T3933] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c17 [ 956.072034][ T3933] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 956.080020][ T3933] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 956.088015][ T3933] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 21:21:32 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x143042, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfffffffffffffe5b) r0 = gettid() write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) statfs(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0xa935) tkill(r0, 0x1001000000000016) [ 956.096000][ T3933] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000005 21:21:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x120000000000000}) 21:21:32 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0xa02) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) [ 956.192760][ T3933] gfs2: not a GFS2 filesystem 21:21:33 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x80901, 0x0) pwrite64(r0, &(0x7f00000000c0)="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", 0xfe, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000040)) [ 956.244522][ T27] audit: type=1804 audit(1556832092.980:885): pid=3950 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir446490140/syzkaller.DmmNcO/1001/file0" dev="sda1" ino=17914 res=1 [ 956.309275][ T27] audit: type=1804 audit(1556832093.040:886): pid=3952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir446490140/syzkaller.DmmNcO/1001/file0" dev="sda1" ino=17914 res=1 [ 956.357207][ T27] audit: type=1800 audit(1556832093.080:887): pid=3951 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17902 res=0 21:21:33 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="2e0000001c00810ee00f80ecdb4cb90402c804a00800000008000afb120001000e0fda1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) 21:21:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:33 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v2={0x7, 0x2, 0x2, 0xfffffffffffffff8, 0x80, "69393875f83534f176cfac4f2a6da3ab406a8ccaeff090f76d5021406e0d010398f732ef4911512b341d8594204a07da9e78cfa23355f16a498e5bfc607ee3c1db311874b9613d98af1a7b22adf53ce0afa63670302ab5540af0380e0bf1e7658b7fa390ff03daf7b4443a88dcd8a465227af4ac29a98b1a1e37ceebde5b59e1"}, 0x8a, 0x3) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:21:33 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:21:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x200000000000000}) 21:21:33 executing program 4 (fault-call:1 fault-nth:12): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:33 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) socket$inet(0x2, 0xa, 0xa84) [ 956.812692][ T3974] FAULT_INJECTION: forcing a failure. [ 956.812692][ T3974] name failslab, interval 1, probability 0, space 0, times 0 [ 956.827343][ T3974] CPU: 0 PID: 3974 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 956.839022][ T3974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.849128][ T3974] Call Trace: [ 956.852538][ T3974] dump_stack+0x172/0x1f0 [ 956.856904][ T3974] should_fail.cold+0xa/0x15 [ 956.861523][ T3974] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 956.867371][ T3974] ? __save_stack_trace+0x99/0x100 [ 956.872545][ T3974] __should_failslab+0x121/0x190 [ 956.877542][ T3974] should_failslab+0x9/0x14 [ 956.882089][ T3974] kmem_cache_alloc+0x47/0x6f0 [ 956.886877][ T3974] ? save_stack+0xa9/0xd0 [ 956.891229][ T3974] ? save_stack+0x45/0xd0 [ 956.895593][ T3974] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 956.901424][ T3974] ? kasan_slab_alloc+0xf/0x20 [ 956.906221][ T3974] ? kmem_cache_alloc+0x11a/0x6f0 [ 956.911278][ T3974] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 956.917656][ T3974] idr_get_free+0x474/0x890 [ 956.922208][ T3974] idr_alloc_u32+0x19e/0x330 [ 956.927271][ T3974] ? __fprop_inc_percpu_max+0x230/0x230 [ 956.932845][ T3974] ? mark_held_locks+0xf0/0xf0 [ 956.937657][ T3974] idr_alloc_cyclic+0x132/0x270 [ 956.940381][ T3979] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) [ 956.942533][ T3974] ? idr_alloc+0x150/0x150 [ 956.942560][ T3974] __kernfs_new_node+0x171/0x690 [ 956.942577][ T3974] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 956.942616][ T3974] ? __lock_acquire+0x548/0x3fb0 [ 956.942634][ T3974] kernfs_new_node+0x99/0x130 [ 956.942654][ T3974] kernfs_create_dir_ns+0x52/0x160 [ 956.942671][ T3974] internal_create_group+0x7f8/0xc40 [ 956.942685][ T3974] ? bd_set_size+0x89/0xb0 [ 956.942708][ T3974] ? remove_files.isra.0+0x190/0x190 [ 956.994030][ T3974] sysfs_create_group+0x20/0x30 [ 956.998917][ T3974] lo_ioctl+0x10af/0x2150 [ 957.003290][ T3974] ? lo_rw_aio+0x1120/0x1120 [ 957.008803][ T3974] blkdev_ioctl+0x6f2/0x1d10 [ 957.014555][ T3974] ? blkpg_ioctl+0xa90/0xa90 [ 957.020063][ T3974] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 957.026301][ T3974] ? __fget+0x35a/0x550 [ 957.031025][ T3974] block_ioctl+0xee/0x130 [ 957.035837][ T3974] ? blkdev_fallocate+0x410/0x410 [ 957.041166][ T3974] do_vfs_ioctl+0xd6e/0x1390 [ 957.045969][ T3974] ? ioctl_preallocate+0x210/0x210 [ 957.052004][ T3974] ? __fget+0x381/0x550 [ 957.058136][ T3974] ? ksys_dup3+0x3e0/0x3e0 [ 957.063404][ T3974] ? do_sys_open+0x31d/0x5d0 [ 957.068292][ T3974] ? tomoyo_file_ioctl+0x23/0x30 [ 957.080758][ T3974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 957.089605][ T3974] ? security_file_ioctl+0x93/0xc0 [ 957.094859][ T3974] ksys_ioctl+0xab/0xd0 [ 957.099245][ T3974] __x64_sys_ioctl+0x73/0xb0 [ 957.104002][ T3974] do_syscall_64+0x103/0x610 [ 957.109784][ T3974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 957.115727][ T3974] RIP: 0033:0x458c17 [ 957.119829][ T3974] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 957.139890][ T3974] RSP: 002b:00007faa42150a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 957.148519][ T3974] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c17 [ 957.156642][ T3974] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 21:21:33 executing program 3: r0 = epoll_create1(0x0) flock(r0, 0x200000001) r1 = epoll_create1(0x0) flock(r1, 0xfffffffffffffffd) 21:21:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x300000000000000}) 21:21:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 957.164753][ T3974] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 957.172780][ T3974] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 957.180785][ T3974] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000005 21:21:34 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3f, 0x14402) getpeername(0xffffffffffffff9c, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x80) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000040)=0x14) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x50a) timer_create(0x0, &(0x7f0000000140)={0x0, 0x3a, 0x2}, &(0x7f0000000180)=0x0) timer_gettime(r2, &(0x7f00000001c0)) [ 957.242003][ T3974] gfs2: not a GFS2 filesystem 21:21:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', &(0x7f00000004c0)='./file0/../file0\x00') syz_execute_func(&(0x7f0000000080)="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") connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, 0x0) 21:21:34 executing program 4 (fault-call:1 fault-nth:13): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:34 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x236) remap_file_pages(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x81, 0x40820) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) [ 957.403766][ T27] audit: type=1800 audit(1556832094.140:888): pid=3986 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17915 res=0 [ 957.519983][ T3999] FAULT_INJECTION: forcing a failure. [ 957.519983][ T3999] name failslab, interval 1, probability 0, space 0, times 0 [ 957.559490][ T3999] CPU: 1 PID: 3999 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 957.567462][ T3999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.577551][ T3999] Call Trace: [ 957.580885][ T3999] dump_stack+0x172/0x1f0 [ 957.585255][ T3999] should_fail.cold+0xa/0x15 [ 957.589880][ T3999] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 957.595723][ T3999] ? ___might_sleep+0x163/0x280 [ 957.600614][ T3999] __should_failslab+0x121/0x190 [ 957.605601][ T3999] should_failslab+0x9/0x14 [ 957.610131][ T3999] kmem_cache_alloc+0x2b2/0x6f0 [ 957.615017][ T3999] ? lock_downgrade+0x880/0x880 [ 957.619895][ T3999] ? kasan_check_read+0x11/0x20 [ 957.624784][ T3999] __kernfs_new_node+0xef/0x690 [ 957.629666][ T3999] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 957.635157][ T3999] ? wait_for_completion+0x440/0x440 [ 957.640480][ T3999] ? mutex_unlock+0xd/0x10 [ 957.644924][ T3999] ? kernfs_activate+0x192/0x1f0 [ 957.649894][ T3999] kernfs_new_node+0x99/0x130 [ 957.654617][ T3999] __kernfs_create_file+0x51/0x340 [ 957.659761][ T3999] sysfs_add_file_mode_ns+0x222/0x560 [ 957.665169][ T3999] internal_create_group+0x35b/0xc40 [ 957.670482][ T3999] ? bd_set_size+0x89/0xb0 [ 957.674931][ T3999] ? remove_files.isra.0+0x190/0x190 [ 957.680259][ T3999] sysfs_create_group+0x20/0x30 [ 957.685142][ T3999] lo_ioctl+0x10af/0x2150 [ 957.689506][ T3999] ? lo_rw_aio+0x1120/0x1120 [ 957.694132][ T3999] blkdev_ioctl+0x6f2/0x1d10 [ 957.698753][ T3999] ? blkpg_ioctl+0xa90/0xa90 [ 957.703373][ T3999] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 957.709227][ T3999] ? __fget+0x35a/0x550 [ 957.713413][ T3999] block_ioctl+0xee/0x130 [ 957.717769][ T3999] ? blkdev_fallocate+0x410/0x410 [ 957.722823][ T3999] do_vfs_ioctl+0xd6e/0x1390 [ 957.727452][ T3999] ? ioctl_preallocate+0x210/0x210 [ 957.732610][ T3999] ? __fget+0x381/0x550 [ 957.736800][ T3999] ? ksys_dup3+0x3e0/0x3e0 [ 957.741246][ T3999] ? do_sys_open+0x31d/0x5d0 [ 957.745891][ T3999] ? tomoyo_file_ioctl+0x23/0x30 [ 957.750860][ T3999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 957.757135][ T3999] ? security_file_ioctl+0x93/0xc0 [ 957.762364][ T3999] ksys_ioctl+0xab/0xd0 [ 957.766557][ T3999] __x64_sys_ioctl+0x73/0xb0 [ 957.771187][ T3999] do_syscall_64+0x103/0x610 [ 957.775812][ T3999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 957.781728][ T3999] RIP: 0033:0x458c17 [ 957.785644][ T3999] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 957.805267][ T3999] RSP: 002b:00007faa42150a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 957.813701][ T3999] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c17 21:21:34 executing program 0: r0 = syz_open_procfs(0x0, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000080)) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x41) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) close(r2) perf_event_open(0x0, 0x0, 0x10, r3, 0xa) socket$pppoe(0x18, 0x1, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x4800) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000140)={0x80000001}) 21:21:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x400000000000000}) 21:21:34 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x100, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e24, @multicast2}, {0x6, @dev={[], 0x25}}, 0x10, {0x2, 0x4e21, @multicast2}, 'rose0\x00'}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) socket$isdn(0x22, 0x3, 0x35) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2c40, 0x0) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f0000000040)) 21:21:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 957.821691][ T3999] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 957.829679][ T3999] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 957.837671][ T3999] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 957.845663][ T3999] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000005 21:21:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', &(0x7f00000004c0)='./file0/../file0\x00') syz_execute_func(&(0x7f0000000080)="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") connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, 0x0) [ 957.936447][ T3999] gfs2: not a GFS2 filesystem 21:21:34 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0xfffffffffffffe2d) 21:21:34 executing program 4 (fault-call:1 fault-nth:14): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 958.152767][ T27] audit: type=1800 audit(1556832094.890:889): pid=4016 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17911 res=0 21:21:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:21:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x500000000000000}) 21:21:35 executing program 0: r0 = syz_open_procfs(0x0, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000080)) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x41) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) close(r2) perf_event_open(0x0, 0x0, 0x10, r3, 0xa) socket$pppoe(0x18, 0x1, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x4800) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000140)={0x80000001}) [ 958.257213][ T4031] FAULT_INJECTION: forcing a failure. [ 958.257213][ T4031] name failslab, interval 1, probability 0, space 0, times 0 [ 958.280433][ T4031] CPU: 1 PID: 4031 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 958.288426][ T4031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 958.288435][ T4031] Call Trace: [ 958.288470][ T4031] dump_stack+0x172/0x1f0 [ 958.288493][ T4031] should_fail.cold+0xa/0x15 [ 958.288520][ T4031] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 958.316767][ T4031] ? ___might_sleep+0x163/0x280 [ 958.316788][ T4031] __should_failslab+0x121/0x190 [ 958.316804][ T4031] should_failslab+0x9/0x14 [ 958.316819][ T4031] kmem_cache_alloc+0x2b2/0x6f0 [ 958.316834][ T4031] ? lock_downgrade+0x880/0x880 [ 958.316847][ T4031] ? kasan_check_read+0x11/0x20 [ 958.316866][ T4031] __kernfs_new_node+0xef/0x690 [ 958.316883][ T4031] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 958.316901][ T4031] ? wait_for_completion+0x440/0x440 [ 958.316923][ T4031] ? mutex_unlock+0xd/0x10 [ 958.316938][ T4031] ? kernfs_activate+0x192/0x1f0 [ 958.316956][ T4031] kernfs_new_node+0x99/0x130 [ 958.316974][ T4031] __kernfs_create_file+0x51/0x340 [ 958.317013][ T4031] sysfs_add_file_mode_ns+0x222/0x560 [ 958.386534][ T4031] internal_create_group+0x35b/0xc40 [ 958.391913][ T4031] ? bd_set_size+0x89/0xb0 [ 958.396482][ T4031] ? remove_files.isra.0+0x190/0x190 [ 958.401835][ T4031] sysfs_create_group+0x20/0x30 [ 958.406961][ T4031] lo_ioctl+0x10af/0x2150 [ 958.411359][ T4031] ? lo_rw_aio+0x1120/0x1120 [ 958.416101][ T4031] blkdev_ioctl+0x6f2/0x1d10 [ 958.420743][ T4031] ? blkpg_ioctl+0xa90/0xa90 [ 958.425414][ T4031] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 958.431372][ T4031] ? __fget+0x35a/0x550 [ 958.435619][ T4031] block_ioctl+0xee/0x130 [ 958.440033][ T4031] ? blkdev_fallocate+0x410/0x410 [ 958.445112][ T4031] do_vfs_ioctl+0xd6e/0x1390 [ 958.449885][ T4031] ? ioctl_preallocate+0x210/0x210 [ 958.455349][ T4031] ? __fget+0x381/0x550 [ 958.459579][ T4031] ? ksys_dup3+0x3e0/0x3e0 [ 958.464167][ T4031] ? do_sys_open+0x31d/0x5d0 [ 958.468800][ T4031] ? tomoyo_file_ioctl+0x23/0x30 [ 958.473766][ T4031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 958.480124][ T4031] ? security_file_ioctl+0x93/0xc0 [ 958.485268][ T4031] ksys_ioctl+0xab/0xd0 [ 958.489455][ T4031] __x64_sys_ioctl+0x73/0xb0 [ 958.494080][ T4031] do_syscall_64+0x103/0x610 [ 958.498968][ T4031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 958.504881][ T4031] RIP: 0033:0x458c17 [ 958.508796][ T4031] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 958.528514][ T4031] RSP: 002b:00007faa42150a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 958.536954][ T4031] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c17 [ 958.544947][ T4031] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 21:21:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 958.552960][ T4031] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 958.561126][ T4031] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 958.569131][ T4031] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000005 21:21:35 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) tgkill(r0, r1, 0x2d) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x14000, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f00000000c0)={0x9}) [ 958.602091][ T4031] gfs2: not a GFS2 filesystem 21:21:35 executing program 4 (fault-call:1 fault-nth:15): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8f00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 958.684320][ T4039] FAT-fs (loop3): bogus number of reserved sectors [ 958.709703][ T4039] FAT-fs (loop3): Can't find a valid FAT filesystem 21:21:35 executing program 5: r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002a40)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) [ 958.765070][ T4046] FAT-fs (loop3): bogus number of reserved sectors [ 958.786677][ T4046] FAT-fs (loop3): Can't find a valid FAT filesystem 21:21:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x600000000000000}) [ 958.798576][ T27] audit: type=1800 audit(1556832095.530:890): pid=4045 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17926 res=0 21:21:35 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x8, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000200)) 21:21:35 executing program 0: r0 = socket$inet(0x10, 0x400000000002, 0x0) sendmsg(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000080)="4c0000001200ff09fffefd856fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") recvmmsg(r0, &(0x7f0000006400)=[{{0x0, 0x0, 0x0}}], 0x565, 0x2, 0x0) [ 958.962741][ T4056] FAULT_INJECTION: forcing a failure. [ 958.962741][ T4056] name failslab, interval 1, probability 0, space 0, times 0 [ 958.994816][ T4056] CPU: 1 PID: 4056 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 959.002776][ T4056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.012854][ T4056] Call Trace: [ 959.016176][ T4056] dump_stack+0x172/0x1f0 [ 959.020535][ T4056] should_fail.cold+0xa/0x15 [ 959.025169][ T4056] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 959.031003][ T4056] ? ___might_sleep+0x163/0x280 [ 959.035879][ T4056] __should_failslab+0x121/0x190 [ 959.040845][ T4056] should_failslab+0x9/0x14 [ 959.045370][ T4056] kmem_cache_alloc+0x2b2/0x6f0 [ 959.050238][ T4056] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 959.056063][ T4056] ? lock_downgrade+0x880/0x880 [ 959.060959][ T4056] skb_clone+0x150/0x3b0 [ 959.065232][ T4056] netlink_broadcast_filtered+0x870/0xb20 [ 959.071073][ T4056] netlink_broadcast+0x3a/0x50 [ 959.075866][ T4056] kobject_uevent_env+0xa94/0x1030 [ 959.081013][ T4056] kobject_uevent+0x20/0x26 [ 959.085547][ T4056] __loop_clr_fd+0x4ee/0xd60 [ 959.090174][ T4056] lo_release+0x1c2/0x200 [ 959.094623][ T4056] ? loop_probe+0x1a0/0x1a0 [ 959.099148][ T4056] __blkdev_put+0x4d3/0x810 [ 959.103699][ T4056] ? bd_set_size+0xb0/0xb0 [ 959.108143][ T4056] ? wait_for_completion+0x440/0x440 [ 959.113474][ T4056] blkdev_put+0x98/0x560 [ 959.117749][ T4056] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 959.124021][ T4056] ? blkdev_put+0x560/0x560 [ 959.128556][ T4056] blkdev_close+0x8b/0xb0 [ 959.132926][ T4056] __fput+0x2e5/0x8d0 [ 959.136929][ T4056] ____fput+0x16/0x20 [ 959.140923][ T4056] task_work_run+0x14a/0x1c0 [ 959.145536][ T4056] exit_to_usermode_loop+0x273/0x2c0 [ 959.150863][ T4056] do_syscall_64+0x52d/0x610 [ 959.155486][ T4056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 959.161396][ T4056] RIP: 0033:0x412b61 [ 959.165308][ T4056] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 1a 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 959.184934][ T4056] RSP: 002b:00007faa42150a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 959.193404][ T4056] RAX: 0000000000000000 RBX: 00007faa421516d4 RCX: 0000000000412b61 [ 959.201411][ T4056] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 21:21:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:35 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') r1 = creat(&(0x7f0000002980)='./file0\x00', 0x0) accept4$unix(r1, &(0x7f00000029c0), &(0x7f0000002a40)=0x6e, 0x800) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000040)=0x596e204c2361de3e) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:21:35 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='oom_score_adj\x00') sendfile(r0, r0, 0x0, 0x7) 21:21:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x700000000000000}) [ 959.209424][ T4056] RBP: 0000000000000007 R08: 0000000000000000 R09: 000000000000000a [ 959.217426][ T4056] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 959.225423][ T4056] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000005 21:21:36 executing program 4 (fault-call:1 fault-nth:16): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 959.338080][ T4071] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 959.372261][ T4071] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 21:21:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9700}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:36 executing program 3: r0 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000a00)="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", 0x401, r0) 21:21:36 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$FICLONE(r0, 0x40049409, r0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x0) 21:21:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x800000000000000}) [ 959.442906][ T4071] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 959.477284][ T4080] FAULT_INJECTION: forcing a failure. [ 959.477284][ T4080] name failslab, interval 1, probability 0, space 0, times 0 [ 959.490475][ T4080] CPU: 0 PID: 4080 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 959.498409][ T4080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.498429][ T4080] Call Trace: [ 959.511913][ T4080] dump_stack+0x172/0x1f0 [ 959.515200][ T4071] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 959.517055][ T4080] should_fail.cold+0xa/0x15 [ 959.517076][ T4080] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 959.517101][ T4080] ? ___might_sleep+0x163/0x280 [ 959.541550][ T4080] __should_failslab+0x121/0x190 [ 959.541565][ T4080] should_failslab+0x9/0x14 [ 959.541580][ T4080] kmem_cache_alloc+0x2b2/0x6f0 [ 959.541607][ T4080] ? lock_downgrade+0x880/0x880 [ 959.541622][ T4080] ? kasan_check_read+0x11/0x20 [ 959.541644][ T4080] __kernfs_new_node+0xef/0x690 [ 959.547707][ T4082] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 959.551118][ T4080] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 959.551140][ T4080] ? wait_for_completion+0x440/0x440 [ 959.551163][ T4080] ? mutex_unlock+0xd/0x10 [ 959.551187][ T4080] ? kernfs_activate+0x192/0x1f0 [ 959.569038][ T4082] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 959.570612][ T4080] kernfs_new_node+0x99/0x130 [ 959.570634][ T4080] __kernfs_create_file+0x51/0x340 [ 959.570654][ T4080] sysfs_add_file_mode_ns+0x222/0x560 [ 959.605798][ T4082] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 959.608271][ T4080] internal_create_group+0x35b/0xc40 [ 959.608288][ T4080] ? bd_set_size+0x89/0xb0 [ 959.608310][ T4080] ? remove_files.isra.0+0x190/0x190 [ 959.608333][ T4080] sysfs_create_group+0x20/0x30 [ 959.631206][ T4082] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 959.631652][ T4080] lo_ioctl+0x10af/0x2150 [ 959.659960][ T4082] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 959.660749][ T4080] ? lo_rw_aio+0x1120/0x1120 [ 959.660769][ T4080] blkdev_ioctl+0x6f2/0x1d10 [ 959.660795][ T4080] ? blkpg_ioctl+0xa90/0xa90 [ 959.680823][ T4082] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 959.682487][ T4080] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 959.682512][ T4080] ? __fget+0x35a/0x550 [ 959.682531][ T4080] block_ioctl+0xee/0x130 [ 959.682546][ T4080] ? blkdev_fallocate+0x410/0x410 [ 959.682562][ T4080] do_vfs_ioctl+0xd6e/0x1390 [ 959.682581][ T4080] ? ioctl_preallocate+0x210/0x210 [ 959.682603][ T4080] ? __fget+0x381/0x550 [ 959.682622][ T4080] ? ksys_dup3+0x3e0/0x3e0 [ 959.682638][ T4080] ? do_sys_open+0x31d/0x5d0 [ 959.682657][ T4080] ? tomoyo_file_ioctl+0x23/0x30 [ 959.682673][ T4080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 959.682697][ T4080] ? security_file_ioctl+0x93/0xc0 [ 959.697328][ T4082] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 959.702316][ T4080] ksys_ioctl+0xab/0xd0 [ 959.702336][ T4080] __x64_sys_ioctl+0x73/0xb0 [ 959.702354][ T4080] do_syscall_64+0x103/0x610 [ 959.702372][ T4080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 959.702383][ T4080] RIP: 0033:0x458c17 [ 959.702399][ T4080] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 959.702407][ T4080] RSP: 002b:00007faa42171a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 959.702420][ T4080] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c17 [ 959.702427][ T4080] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 959.702434][ T4080] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 959.702441][ T4080] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 959.702448][ T4080] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000003 [ 959.860764][ T4082] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 21:21:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x40001000008912, &(0x7f0000000000)="0adc1f123c123f4d9bd070") keyctl$set_reqkey_keyring(0xe, 0x4) keyctl$join(0x1, 0x0) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000200)='user\x00', 0x0) [ 959.888681][ T4082] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 959.912403][ T4082] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 959.926318][ T4080] gfs2: not a GFS2 filesystem 21:21:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 959.944277][ T4082] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 959.983960][ T4082] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 960.017197][ T4082] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 960.042185][ T4082] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 960.070119][ T27] audit: type=1800 audit(1556832096.800:891): pid=4094 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17935 res=0 [ 960.114743][ T4071] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 960.145393][ T4082] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 21:21:36 executing program 0: 21:21:36 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x801, 0x0) 21:21:36 executing program 4 (fault-call:1 fault-nth:17): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x900000000000000}) 21:21:36 executing program 3: syz_mount_image$btrfs(&(0x7f00000001c0)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000200)="8da4363ac0ed000000000000003f004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d522937fa9f57f893738fc3bb6009e9a18585d75279bf8991b12491b9aaa8356e975db1a95b6e6356cb883abfd1e0797dbdc9ba171a8458065ea1c1982587d7f397d4bb9031f0d1d7efe7524105b62c2817b566e070956ce8506ff5e90cf1fa538704c84249fb7867628c90f57e6ee025cc91e2229c24", 0xbe, 0x10000}], 0x0, 0x0) 21:21:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9f00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 960.314922][ T4111] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 10662368462408984914 /dev/loop3 21:21:37 executing program 0: [ 960.367883][ T4120] FAULT_INJECTION: forcing a failure. [ 960.367883][ T4120] name failslab, interval 1, probability 0, space 0, times 0 [ 960.382269][ T4120] CPU: 1 PID: 4120 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 960.390217][ T4120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 960.400292][ T4120] Call Trace: [ 960.403628][ T4120] dump_stack+0x172/0x1f0 [ 960.408007][ T4120] should_fail.cold+0xa/0x15 [ 960.412641][ T4120] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 960.418481][ T4120] ? ___might_sleep+0x163/0x280 [ 960.423369][ T4120] __should_failslab+0x121/0x190 [ 960.428338][ T4120] should_failslab+0x9/0x14 [ 960.432873][ T4120] kmem_cache_alloc+0x2b2/0x6f0 [ 960.437758][ T4120] ? lock_downgrade+0x880/0x880 [ 960.442645][ T4120] ? kasan_check_read+0x11/0x20 [ 960.447534][ T4120] __kernfs_new_node+0xef/0x690 [ 960.452433][ T4120] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 960.457928][ T4120] ? wait_for_completion+0x440/0x440 [ 960.463254][ T4120] ? mutex_unlock+0xd/0x10 [ 960.467701][ T4120] ? kernfs_activate+0x192/0x1f0 [ 960.472673][ T4120] kernfs_new_node+0x99/0x130 [ 960.477413][ T4120] __kernfs_create_file+0x51/0x340 [ 960.482561][ T4120] sysfs_add_file_mode_ns+0x222/0x560 [ 960.488068][ T4120] internal_create_group+0x35b/0xc40 [ 960.493602][ T4120] ? bd_set_size+0x89/0xb0 [ 960.498073][ T4120] ? remove_files.isra.0+0x190/0x190 [ 960.503404][ T4120] sysfs_create_group+0x20/0x30 [ 960.508288][ T4120] lo_ioctl+0x10af/0x2150 [ 960.512827][ T4120] ? lo_rw_aio+0x1120/0x1120 [ 960.517459][ T4120] blkdev_ioctl+0x6f2/0x1d10 [ 960.522085][ T4120] ? blkpg_ioctl+0xa90/0xa90 [ 960.526711][ T4120] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 960.532615][ T4120] ? __fget+0x35a/0x550 [ 960.536813][ T4120] block_ioctl+0xee/0x130 [ 960.541176][ T4120] ? blkdev_fallocate+0x410/0x410 [ 960.546234][ T4120] do_vfs_ioctl+0xd6e/0x1390 [ 960.550860][ T4120] ? ioctl_preallocate+0x210/0x210 [ 960.556002][ T4120] ? __fget+0x381/0x550 [ 960.560190][ T4120] ? ksys_dup3+0x3e0/0x3e0 [ 960.564642][ T4120] ? do_sys_open+0x31d/0x5d0 [ 960.569269][ T4120] ? tomoyo_file_ioctl+0x23/0x30 [ 960.574240][ T4120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 960.581083][ T4120] ? security_file_ioctl+0x93/0xc0 [ 960.586983][ T4120] ksys_ioctl+0xab/0xd0 [ 960.591217][ T4120] __x64_sys_ioctl+0x73/0xb0 [ 960.595838][ T4120] do_syscall_64+0x103/0x610 [ 960.600468][ T4120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 960.606407][ T4120] RIP: 0033:0x458c17 [ 960.610327][ T4120] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 960.629952][ T4120] RSP: 002b:00007faa42150a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 960.638394][ T4120] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c17 [ 960.646389][ T4120] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 960.654381][ T4120] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 21:21:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xa00000000000000}) 21:21:37 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x9, &(0x7f0000000180)=[0xee01, 0xee01, 0xee01, 0x0, 0xee00, 0xee00, 0xee00, 0x0, 0xffffffffffffffff]) fchown(r1, r2, r3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r4, 0x7fff, 0x10}, 0xc) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:21:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 960.662388][ T4120] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 960.670383][ T4120] R13: 00000000004c78d3 R14: 00000000004dd8f8 R15: 0000000000000005 [ 960.707071][ T4111] BTRFS: Invalid seeding and uuid-changed device detected [ 960.719275][ T4120] gfs2: not a GFS2 filesystem 21:21:37 executing program 0: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffe1d, &(0x7f0000000700)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000a80)=[{&(0x7f0000000980)=""/196, 0xc4}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000880)='mounts\x00') ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) lchown(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000003c0)={0x9, 0xfff, 0x6, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2d5b26ff, 0x0, 0x0, 0x0, 0x4, 0x0}) 21:21:37 executing program 4 (fault-call:1 fault-nth:18): syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:37 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000040)={0x6, 0x80000000}) 21:21:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xb00000000000000}) 21:21:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:37 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0xffffff17) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x280000, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000040)=0x2) [ 960.922382][ T4111] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 10662368462408984914 /dev/loop3 [ 960.997616][ T4111] BTRFS: Invalid seeding and uuid-changed device detected 21:21:37 executing program 3: syz_mount_image$btrfs(&(0x7f00000001c0)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000200)="8da4363ac0ed000000000000003f004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d522937fa9f57f893738fc3bb6009e9a18585d75279bf8991b12491b9aaa8356e975db1a95b6e6356cb883abfd1e0797dbdc9ba171a8458065ea1c1982587d7f397d4bb9031f0d1d7efe7524105b62c2817b566e070956ce8506ff5e90cf1fa538704c84249fb7867628c90f57e6ee025cc91e2229c24", 0xbe, 0x10000}], 0x0, 0x0) [ 961.122615][ T27] audit: type=1800 audit(1556832097.860:892): pid=4144 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17954 res=0 21:21:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:37 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:37 executing program 0: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffe1d, &(0x7f0000000700)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000a80)=[{&(0x7f0000000980)=""/196, 0xc4}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000880)='mounts\x00') ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) lchown(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f00000003c0)={0x9, 0xfff, 0x6, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2d5b26ff, 0x0, 0x0, 0x0, 0x4, 0x0}) 21:21:37 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x100000000, 0x1) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) write$P9_RGETLOCK(r0, &(0x7f0000000080)={0x20, 0x37, 0x2, {0x0, 0x80, 0x0, r1, 0x2, '\xad$'}}, 0x20) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getuid() setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) 21:21:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xc00000000000000}) 21:21:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:38 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x88000, 0x0) prctl$PR_GET_SECUREBITS(0x1b) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000100)=""/118) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) [ 961.350394][ T4163] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 10662368462408984914 /dev/loop3 [ 961.371739][ T4166] gfs2: not a GFS2 filesystem [ 961.384530][ T27] audit: type=1800 audit(1556832098.120:893): pid=4164 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17263 res=0 21:21:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xd00000000000000}) 21:21:38 executing program 0: creat(&(0x7f0000000300)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) 21:21:38 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='\nfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 961.448651][ T4163] BTRFS: Invalid seeding and uuid-changed device detected 21:21:38 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f00000003c0)=""/186) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:21:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x29, 0x0, 0x227) 21:21:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xaf00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 961.608974][ T4182] overlayfs: missing 'lowerdir' 21:21:38 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x480, 0x0) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000080)={0x3, r2}) 21:21:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000002c0)=ANY=[@ANYBLOB="1dd907eccd9b520325ee9c99adf98f6538f1495cba1d9222839554d59fb6bb3c87be74ec528c0caa58386d154250133249757931bc88665f524ef1cc0b1908f79b812b496b98e29aea031f15f8aecae0d0412c49904f58cfe86c7cd089b4eb0f4d23c6b1f2dd87c4a9a4b616f7858b3812acf803a41c984d3d36cf4df369bb85bfe41a952122f71bd4d89a84b49d4ceb53a363d04d0371c3ba953bcfa8293e9c050046bf6bc04cf9a56c80fca35b0c7bbf49a39a81919476efd40000000000000000000000000000000000000087261a280d5387a5"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42803) 21:21:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfa00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:38 executing program 3: 21:21:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xe00000000000000}) 21:21:38 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0x3, 0x0, 0x2, {0x7, 0x1000, 0x10000, 0x5}}) 21:21:38 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='%fs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:38 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40000, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000040)={0x7, 0x7f, 0x1}, 0x7) gettid() 21:21:38 executing program 3: 21:21:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 962.094656][ T27] audit: type=1800 audit(1556832098.830:894): pid=4212 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17949 res=0 21:21:38 executing program 3: 21:21:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xf00000000000000}) 21:21:39 executing program 0: 21:21:39 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x400100, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000140)={0x6}) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f00000000c0)=""/102) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000040)=[0x6, 0x400]) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r3, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0xe}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4804}, 0x4000) 21:21:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:39 executing program 3: 21:21:39 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='Bfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 962.402891][ T27] audit: type=1800 audit(1556832099.140:895): pid=4232 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17264 res=0 21:21:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1000000000000000}) 21:21:39 executing program 3: 21:21:39 executing program 0: 21:21:39 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000040)=0x80000001, &(0x7f0000000080)=0x1) 21:21:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:39 executing program 3: 21:21:39 executing program 0: 21:21:39 executing program 5: socket$isdn(0x22, 0x3, 0x27) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) fallocate(r0, 0x48, 0x40, 0xcf) 21:21:39 executing program 3: 21:21:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:39 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='Cfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 962.793861][ T27] audit: type=1800 audit(1556832099.530:896): pid=4251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17261 res=0 21:21:39 executing program 0: 21:21:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1001000000000000}) 21:21:39 executing program 3: 21:21:39 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0xfffffffffffffffd, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000280)) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2321202e2f66696c653020232120200a378d74946853ad09c731b96896b5ff0362b27c5a103be1a4b6896670c469cabd67efcf4c94147d3c6144c2aa38f45716293bcc1257ba0efdc24bc55735f801cabbfe1ca77eddb45c45c2af77bbfad5206ca0651e49193ff8bf84b51a4eec4af51b4155ee8912782e39f3529c13c487f7e3909c1d28136819e966aefb708e7d9dfeda8cdac90c77f7c5cbb7abb38309ed7df8212a75ee060ca73cf2acbca316ab51a60321fdeb7ad84400007148728f08c48ff3bb88dc9e17ef809b6023bc7ebbfeabb647249a0b69981951240957050c6b6a592c37fe1ad3c092c292"], 0x68) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e22, 0xf6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}}, 0x24) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:21:39 executing program 0: 21:21:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:39 executing program 3: 21:21:39 executing program 0: [ 963.096779][ T27] audit: type=1800 audit(1556832099.830:897): pid=4277 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17713 res=0 21:21:39 executing program 3: 21:21:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1100000000000000}) 21:21:39 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='Dfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:39 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000040)=0x10000, 0x4) 21:21:39 executing program 0: 21:21:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:40 executing program 3: 21:21:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:40 executing program 0: 21:21:40 executing program 3: 21:21:40 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x2, 0x3af, 0x2, 0x4a1}, 0x7, 0x40, 0x6}) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x0) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000040)={0x0, 0xffffffff, 0xfffffffffffffffd}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) 21:21:40 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='Efs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 963.457875][ T27] audit: type=1800 audit(1556832100.190:898): pid=4297 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17968 res=0 21:21:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1101000000000000}) 21:21:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:40 executing program 0: 21:21:40 executing program 3: 21:21:40 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400, 0x0) chroot(&(0x7f0000000180)='./file0\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r2, 0x4, 0x70bd2a, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xd94d, 0x3, 0x4, 0x65a7}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x24000890}, 0x8000) 21:21:40 executing program 0: 21:21:40 executing program 3: 21:21:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 963.823948][ T27] audit: type=1800 audit(1556832100.560:899): pid=4327 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17976 res=0 21:21:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1200000000000000}) 21:21:40 executing program 3: 21:21:40 executing program 0: 21:21:40 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='Ffs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:40 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair(0x0, 0x3, 0x4, &(0x7f0000003480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x7, 0x3f, 0x8, 0x1dc5, 0x0, 0x5, 0xa6bd, 0x7df, 0x0}, &(0x7f0000000040)=0x20) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r2, 0x5, 0x20, 0x6, 0x10000, 0x100000001}, 0x14) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000100)) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=@random={'btrfs.', 'vboxnet0\x00'}, &(0x7f0000000180)=""/171, 0xab) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000280)=0x4) 21:21:40 executing program 3: 21:21:40 executing program 0: 21:21:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:40 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000180)=""/4096) getpeername(0xffffffffffffff9c, &(0x7f0000000040)=@hci={0x1f, 0x0}, &(0x7f00000000c0)=0x80) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={@local, 0x69, r1}) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000140)) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) 21:21:40 executing program 3: 21:21:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1300000000000000}) 21:21:40 executing program 0: 21:21:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:41 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='Gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:41 executing program 0: 21:21:41 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x400, 0x305801) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x74) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) 21:21:41 executing program 3: 21:21:41 executing program 0: 21:21:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1400000000000000}) 21:21:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:41 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 21:21:41 executing program 3: 21:21:41 executing program 0: 21:21:41 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:21:41 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='Ifs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:41 executing program 3: 21:21:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:41 executing program 0: 21:21:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1500000000000000}) 21:21:41 executing program 0: 21:21:41 executing program 3: 21:21:41 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fcntl$setpipe(r0, 0x407, 0x400) 21:21:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1600000000000000}) 21:21:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x14000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:41 executing program 3: 21:21:41 executing program 0: 21:21:41 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='Kfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:41 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x102, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) setsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000080)="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", 0x1000) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20000, 0x0) 21:21:41 executing program 3: 21:21:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x18000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:41 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000004c0)={'nr0\x00', &(0x7f0000000480)=@ethtool_channels={0x3d, 0x7, 0x1, 0x100000001, 0x1, 0x4, 0x6, 0x81, 0x5}}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x80000001) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000040)={"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"}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) ioctl$sock_TIOCOUTQ(r2, 0x5411, &(0x7f0000000500)) 21:21:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000340)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, @in], 0x20) 21:21:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x14, &(0x7f0000000100), 0x8) [ 965.106275][ T27] audit: type=1800 audit(1556832101.840:900): pid=4422 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16801 res=0 21:21:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1700000000000000}) 21:21:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x18100000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, 0x0) 21:21:42 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000040)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:21:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) [ 965.347121][ T27] audit: type=1800 audit(1556832102.080:901): pid=4447 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16817 res=0 21:21:42 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='Mfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="bb8e7882d4ca34d084f9cac02f4ab419"}, 0x1c) 21:21:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1800000000000000}) 21:21:42 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 21:21:42 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x60, 0x2) bind$bt_sco(r0, &(0x7f0000000040)={0x1f, {0x2, 0xffffffff, 0x75, 0x7, 0x2, 0x1}}, 0x8) r1 = dup3(r0, r0, 0x80000) getpeername$inet6(r1, &(0x7f0000000080), &(0x7f00000000c0)=0x1c) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000280)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e23, @broadcast}}}, 0x118) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, &(0x7f0000000180)={0x75, "1d68273a9fd82ea8f955c07f82c43d569b014604da0711ad6adcc613bf9a0cbf22e41093a32022d58823fe9c099f8ef45e783a5e5ce23e74c35550ec6961b94052e745fd72dbc502b13e7d1901385b57f8808215062dd4a3684ac586548e2cbc39211a5d628c8548923cc60c4051a7b521a70ad59cb699d7f7c868f8f9ffe432"}) 21:21:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x6b, &(0x7f0000000100), 0x8) 21:21:42 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) prctl$PR_SET_PDEATHSIG(0x1, 0x34) r1 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) 21:21:42 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000001740)=[{{&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=[{0x10}], 0x10}}], 0x1, 0x0) [ 965.621024][ T27] audit: type=1800 audit(1556832102.350:902): pid=4472 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16785 res=0 21:21:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1900000000000000}) 21:21:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000), 0x0) 21:21:42 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='Nfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x24000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:42 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x200, 0x200000) writev(r1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="35a732886765b66200fde1aef407c3d8c1947ad3d0c4eff827a2ce7c63a1678260fedceb33e1ebbe4c7a447f0b772fd8edb91ee2dc7761aebfc7e5c13fe14a85c7afd0069cfc4c0cae5f50cf33182a41daaff6546bff6b2d22cdda106105deda4ccef3ccb7314cb8f32b23df1a396982365053e1999ec71d02e9afd49eb504d9148888cea9a176a97aa804c42e76148802378bfd1bd4dcccaa7bb1d2928a2a66fed38db0fd3d5d9e70b2b08887d82405d91d3fe5dfe51c77e08b2b635c66b35a26a843bb4226de3b844f15063d89411faff3ae892d72c8adc798f7917ab287d1cddf7009bcb3b4db2617d0580b247976f482b8bb", 0xf4}], 0x1) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000180)={0x680000000000000, 0x2000, 0x8, 0x4, 0x5}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x301000) recvfrom$netrom(r2, &(0x7f0000000040)=""/125, 0x7d, 0x40000002, &(0x7f00000000c0)={{0x3, @bcast, 0x6}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @bcast, @null, @null, @default]}, 0x48) 21:21:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x0, @broadcast}], 0x10) 21:21:42 executing program 3: futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f00000005c0)={0x0, 0x1c9c380}, 0x0, 0x0) 21:21:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x28000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:42 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, 0x0, &(0x7f0000000540)}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 21:21:42 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4002) io_setup(0x4103, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 21:21:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1a00000000000000}) 21:21:42 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [{0x3b9, 0x0, 0x4}, {0x0, 0x0, 0x9}]}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:21:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 966.094984][ T4526] device nr0 entered promiscuous mode 21:21:42 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) ioctl$int_in(r0, 0x5421, &(0x7f00000000c0)=0x100000001) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000040)=0x1000000) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) 21:21:42 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='Ofs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:42 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f0000000240)={{0x3, @rose}, [@null, @netrom, @netrom, @bcast, @netrom, @default, @default, @rose]}, 0x48) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@in={0x3, 0x0, @dev}, 0x10) 21:21:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1b00000000000000}) 21:21:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x30000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 966.215970][ T4535] ax25_connect(): syz-executor.3 uses autobind, please contact jreuter@yaina.de [ 966.246066][ T4535] ax25_connect(): syz-executor.3 uses autobind, please contact jreuter@yaina.de 21:21:43 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x20e) 21:21:43 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f0000000240)={{0x3, @rose}, [@null, @netrom, @netrom, @bcast, @netrom, @default, @default, @rose]}, 0x48) [ 966.373238][ T4553] ax25_connect(): syz-executor.3 uses autobind, please contact jreuter@yaina.de [ 966.437695][ T4553] ax25_connect(): syz-executor.3 uses autobind, please contact jreuter@yaina.de [ 966.646611][ T4526] device nr0 entered promiscuous mode 21:21:43 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, 0x0, &(0x7f0000000540)}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 21:21:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1c00000000000000}) 21:21:43 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) bind$isdn(r0, &(0x7f00000000c0)={0x22, 0x9b9, 0x276, 0x3000000, 0x1}, 0x6) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4$ax25(r0, &(0x7f0000000140)={{0x3, @netrom}, [@remote, @rose, @rose, @null, @netrom, @default, @netrom, @default]}, &(0x7f00000001c0)=0x48, 0x80800) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'eql\x00'}) write$apparmor_current(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7065726d686174201a78303030303030303030305e2c256c6f5c3a656d31757365726400002f6465762f6365632300000000000000"], 0x38) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) 21:21:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:43 executing program 3: r0 = socket$inet(0x2, 0x80001, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000140)={{0x2, 0x0, @broadcast}, {0x0, @random="10761fd7822c"}, 0x18, {0x2, 0x0, @multicast1}, 'gretap0\x00'}) 21:21:43 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='Rfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:43 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) memfd_create(&(0x7f0000000040)='%wlan1proc\x00', 0x4) 21:21:43 executing program 3: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="1ad6d795dfb6e91a27e43c87b346876751"]}) [ 967.125794][ T27] audit: type=1800 audit(1556832103.860:903): pid=4559 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16817 res=0 [ 967.127712][ T4573] device nr0 entered promiscuous mode 21:21:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1d00000000000000}) 21:21:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x800000005, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="20000000000000000000000000000000f3cc2e92a358c42ba8b5a6c80ef22de707c7699f985dae96eb451962fa9c3c62eec919c7297e6638c0d440274bd7fafa817d534d98463c2d57b11caad1fcef8e949b5f0d354ea59c98833c3fd8e90ae861613f63390f416e8211bfb2bb263e1ce01549c0ad5cc813ffd366d2849996d1b19f98699955253c6a67312d170e380b757740"], 0x93}, 0xfc) [ 967.380840][ T27] audit: type=1800 audit(1556832104.110:904): pid=4588 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16977 res=0 21:21:44 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, 0x0, &(0x7f0000000540)}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 21:21:44 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x2, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000680)={0x1, &(0x7f0000000640)=[{}]}) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f0000000000)=0x44) prctl$PR_GET_FP_MODE(0x2e) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000004c0)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x3) write$uinput_user_dev(r0, &(0x7f0000000040)={'syz0\x00', {0x8fc1, 0x8, 0x9457, 0x6}, 0x44, [0x1ff, 0x66, 0x7, 0x0, 0x4, 0x10000, 0x4, 0x1, 0x3ea5, 0xfffffffffffffffe, 0x0, 0x8, 0x76, 0x80000000, 0xa15ec10, 0x4, 0x3b, 0x7ff, 0xa6, 0x5, 0x6, 0x80000001, 0xfffffffffffff801, 0x0, 0xed, 0x1, 0x10001, 0x2, 0x9a, 0x80, 0x3, 0x8001, 0xf925, 0x1, 0x7, 0x6, 0x80000001, 0x52, 0x8, 0xb4, 0x1ff, 0x5, 0x3, 0x5800, 0xe1, 0x1f, 0x3, 0xffff, 0xcf0c, 0x1, 0x3e000000000000, 0xffff, 0xffffffff, 0x7, 0x1f, 0x4, 0x0, 0xffff, 0x8001, 0x100000001, 0x4, 0x803, 0x40, 0x8000], [0x3, 0x5, 0xf694, 0x7, 0x8, 0x2, 0x7, 0x1, 0x7, 0x0, 0x5, 0x200, 0x7, 0x6, 0x3, 0x9, 0x7, 0x6, 0x6, 0x2d7, 0x8, 0x9, 0x4, 0x7, 0x400, 0xab08, 0x8, 0xc4, 0xfffffffffffffffd, 0x5, 0x7fffffff, 0x9, 0xae, 0x2, 0x5f, 0x8001, 0x8000, 0xfffffffffffffef7, 0x6, 0x4, 0x8, 0x9, 0x100000001, 0xfffffffffffffffd, 0x3, 0x46, 0x1, 0x10001, 0x0, 0xffffffff, 0x5, 0x4, 0x0, 0x7, 0x7, 0x5, 0x37, 0x0, 0x1, 0xffffffffffffffff, 0x9, 0x7f, 0x4, 0x5], [0x0, 0x4, 0x8000, 0x5, 0x7, 0x1ff, 0x80000001, 0x3, 0x7, 0x9, 0xfff, 0x5, 0x6, 0xafec, 0xaa, 0xfffffffffffff7e0, 0xfffffffffffffffd, 0x1, 0x1000, 0x0, 0x7, 0x0, 0x20, 0x0, 0x6a0b010a, 0xcc, 0x200, 0xabb, 0x9, 0x4, 0x1, 0x0, 0x10001, 0xfffffffffffffffa, 0x2, 0x2, 0x4, 0xfffffffffffffffb, 0x0, 0x100000000, 0x1c, 0x6, 0x0, 0x80, 0x7, 0xee54, 0x5, 0x4, 0x33, 0x0, 0x80, 0x40, 0x9, 0x8001, 0x1, 0x68, 0x61, 0x7, 0x40, 0x0, 0x3, 0x5, 0x0, 0x7fff], [0x2, 0x400, 0x9, 0x5, 0xfff, 0x3, 0x7fffffff, 0x4, 0x6, 0x7142, 0x20, 0x8, 0xff, 0x6, 0xac, 0x9, 0xca, 0x9394, 0x400, 0x80000000, 0x101, 0x800, 0x5, 0x5, 0x3, 0x1, 0x69c, 0x8, 0x0, 0x100000001, 0x407, 0x7ff, 0xffffffff, 0x3f, 0x6, 0xaa, 0x2, 0x7f, 0x9, 0x7fffffff, 0x200, 0x9, 0x0, 0x2, 0x6, 0x7, 0x8, 0x3, 0x2, 0x6, 0x1f, 0x7, 0x8, 0xa71, 0x7ff, 0x6, 0x3, 0x5, 0x80000000, 0x8000, 0x7, 0x9, 0x1, 0x9]}, 0x45c) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_rfcomm(r0, &(0x7f0000000540)={0x1f, {0xdfa, 0x0, 0x2, 0x100000001, 0x100000001, 0x2}, 0x2}, 0xa) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x0) 21:21:44 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='Sfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x43000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1e00000000000000}) 21:21:44 executing program 3: pause() setrlimit(0x7, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000080)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_matches\x00') syz_execute_func(&(0x7f00000011c0)="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") 21:21:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x44000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:44 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup2(r0, r0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000380)={&(0x7f00000002c0)=""/177, 0x200000, 0x1800}, 0x18) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000100)) setsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f0000000140)=0x3, 0x4) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e24, @remote}, 0x10) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e21, 0x8, @empty, 0x8b49}, {0xa, 0x4e24, 0x9c9, @mcast2, 0x5}, 0x0, [0xa41, 0x0, 0x3f, 0x8e8, 0x7, 0x4, 0x7ff, 0x4]}, 0x5c) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r2 = dup2(r0, r1) syncfs(r0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000080)=""/124) r3 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x0, 0x3) fallocate(r3, 0x10, 0xf2c, 0x6) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r3, 0x80045530, &(0x7f00000004c0)=""/218) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f00000001c0)={0x1, 0xec}) write$apparmor_current(r1, &(0x7f0000000480)=ANY=[@ANYRESHEX=r2], 0x1) 21:21:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) syz_execute_func(&(0x7f0000000280)="26d3dad52b98cd801b69e429e4e4629b5c7cd9d9d0c40f381cd6f9fb0bee8fe9589b26c7e4c753fbc48fe93801516141c109098fe840ed8ac61954f685c4c12de5affeefffff00c4da7676c4c3fd019300000000048f08eeeee0000080c4c3dd6d6807484151660fd095000000005f3b1439e0c9e0c99b0f85800000009b0000d1c4e1d1ee870c0020c35b5b4536bef86b4600a20faee42c240f5e5bf44700000f10eb0f0d18e1584ef6fe5ff6e7df64673667667066bd4343660fd2938c000000c4e1fc5a0cf26666458fc8389e8e04000000001411c4e2bd45937c930000") [ 967.793927][ T4611] device nr0 entered promiscuous mode [ 967.812177][ T27] audit: type=1800 audit(1556832104.540:905): pid=4602 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16993 res=0 21:21:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1f00000000000000}) 21:21:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x48000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 967.919033][ T27] audit: type=1326 audit(1556832104.640:906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4618 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 21:21:44 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup3(r0, r0, 0xc4c432e1a0f54d30) read$eventfd(r1, &(0x7f0000000000), 0x8) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) [ 968.071500][ T27] audit: type=1800 audit(1556832104.800:907): pid=4627 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16674 res=0 21:21:45 executing program 0: syz_execute_func(&(0x7f0000000540)="0c0ed52b98cd801b69e429e4e4629b5c7cd9d9d0c40f381cd6385f5bf9fbe23d0bee8fe9589b26c7e4c753fbc4e101ed41660f597ab48fe840ed8ac61954f6852a2a00c4da7676c4c3fd019300000000048f08eeeee0000080c4c3dd6d6807485151660fd09500000000509b129f9b9f9b0000d1c4e1d1ee870c00000020c35b5b45363ef8c4c1c9dd380faee42c240f5e5bf44700000f10eb0f0d18c401fe5ff6e7df64673667667066bd4343660fd2938c0000000f01c36666458fc8389e8e04000000001411c4e2bd45937c930000") 21:21:45 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='Ufs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:45 executing program 3: syz_execute_func(&(0x7f0000000140)="0c0ed52b98cd801b69e429e4e4629b5c7cd9d9d0c40f381cd6385f5bf9fbe23d0bee8fe9589b26c7e4c753fbc4e101ed41660f597ab48fe840ed8ac61954f6852a2a00c4da7676c4c3fd019300000000048f08eeeee0000080c4c3dd6d6807485151660fd09500000000509b129f9b9f9b0000d1c4e1d1ee870c00000020c35b5b45363ef8c4c1c9dd380faee42c240f5e5bf44700000f10eb0f0d18c401fe5ff6e7df64673667667066bd4343660fd2938c0000000f01c36666458fc8389e8e04000000001411c4e2bd45937c930000") 21:21:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4b000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:45 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0xffffffffffffff6e) 21:21:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x2000000000000000}) 21:21:45 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0xfffffffffffffff1) 21:21:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x19, 0x2}) 21:21:45 executing program 0: madvise(&(0x7f0000ff1000/0x2000)=nil, 0x2000, 0xca) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000fed000/0xd000)=nil, 0xd000, 0xcb) [ 968.453262][ T27] audit: type=1800 audit(1556832105.190:908): pid=4643 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16621 res=0 21:21:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xe4ffffff00000000}) 21:21:45 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.apparmor\x00', &(0x7f00000001c0)='{\x11eth0em1trusted\x00', 0x11, 0x3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0xe5) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) 21:21:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4f000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:45 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='Vfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:45 executing program 0: syz_execute_func(&(0x7f0000000180)="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") syz_execute_func(&(0x7f0000000900)="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") 21:21:45 executing program 3: pause() syz_execute_func(&(0x7f0000001540)="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") 21:21:45 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) 21:21:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x50000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xf0ffffff00000000}) 21:21:45 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair(0x1, 0x800, 0xd61c, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x900, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x80c1}, 0x4000) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r3 = msgget(0x3, 0x20) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000000)=""/59) 21:21:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x53000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:45 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='afs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 968.977969][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 968.977987][ T27] audit: type=1800 audit(1556832105.710:910): pid=4691 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17233 res=0 21:21:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xfeffffff00000000}) 21:21:45 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000080)='/dev/udmabuf\x00', 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x402000, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x96ee, 0x400) r2 = openat$cgroup_ro(r1, &(0x7f0000000240)='cpu`cct.usage_percpu_us\x956\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f0000000040)={0x5, 0xf72d, 0x0, 0xa0da, 0x1, 0x2}) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000000c0)=[0x2, 0x10000]) 21:21:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x54000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:45 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @loopback}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000200)={r2, 0x179c5be4}, 0x8) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0xfffffffffffffecd) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x10001, 0x400) getpeername$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c) 21:21:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x58000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xff0f000000000000}) 21:21:46 executing program 3: syz_execute_func(&(0x7f0000000e00)="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") syz_execute_func(&(0x7f0000000940)="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") 21:21:46 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='bfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:46 executing program 0: syz_execute_func(&(0x7f0000000040)="f3e100def9575c8ac2c2c9734e424a2664f0ff064a460f3038082e67660e50e94d00c9c9c4625dbae5c9e1ccaba39ddf4507e50c420fae9972b57111ec") syz_execute_func(&(0x7f00000001c0)="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") 21:21:46 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x205) 21:21:46 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x66b) 21:21:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 969.860289][ T27] audit: type=1800 audit(1556832106.590:911): pid=4748 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17186 res=0 21:21:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xffffffff00000000}) 21:21:46 executing program 5: socket$bt_bnep(0x1f, 0x3, 0x4) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) socket$inet6_udp(0xa, 0x2, 0x0) 21:21:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x60000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:46 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='dfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:46 executing program 5: r0 = creat(0x0, 0x140) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000480)=ANY=[], 0x0) rt_sigprocmask(0x0, 0x0, &(0x7f0000000140), 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f00000005c0)) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x80) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380)={0x3f, 0xc60, 0x202, 0xfffffffffffffffe, 0x200, 0x8, 0x5}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) keyctl$get_security(0x11, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$tun(r2, &(0x7f0000000280)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000200)='ceph\x00', &(0x7f0000000240)={'syz'}, 0x0, 0xfffffffffffffff8) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r4, 0x112, 0xb, 0x0, 0x638) 21:21:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x61000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 970.182863][ T27] audit: type=1800 audit(1556832106.910:912): pid=4768 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16866 res=0 21:21:47 executing program 0: pause() syz_open_procfs(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000200)="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") 21:21:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x2}) 21:21:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x63000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:47 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='ffs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:47 executing program 3: syz_execute_func(&(0x7f0000000000)="c4e3f9614832074a2be93499980f0531f3aec4a37bf0c50241e2e98f2978cb4b99459864428158090d000000d9fb0a0002e600006210f30f380898d6000000d2650f810b00000063c40249a6acd89142a2d72525000ee7818f8fc29d9094c7200000006885c4112a2f572f57f3490f2cf1f3440f7e322269e0a64cbec5c5c2858c3f8b563e44dcfc430f18472e6c6c3666660f290001a0150ef04111b900000000c4a1a0c29c4ccdc781818f34cc67f36ab40f80300000005666410ffe3af244ad288a300fbc7b470048001f8f915acdc8c8c82ea256b609660fdf530967410f58d1e289e289f2ae33b9c183c383f4c461ebd058de460f0fc30c46dec42ef267f342b1ed7812ce660f38f65e0c6566460f13f8e88c4200000000ca30cae26cbb3cbb3c0247bb00005700cc180d36380d36500099a3a3b62f818194d80093d800dd2f4805480501eec443fd08cc8dd3c4b800000020cbffff57c4422140f7e42ec4a17c1002970606e9027e0000c422e6912cb18374fb0a076466420f3a0b30da64460f14a00000ffff8f4978d25d27ed36660f38058b976192361d09f4f5e5660fed3d0500000089473bbfbf4a045c0b660f73f0b926f240ab060f0f2ef2c4031968ce06d9fec4236d4219004974ec0b313664dbc37ddd00001366440fdc60f4ef") 21:21:47 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x200000, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80400}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x2c}, 0x1, 0x0, 0x0, 0x40801}, 0x40000) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000340)={0x100000001, {{0xa, 0x4e24, 0x3ff, @remote, 0x9}}}, 0x88) ioctl$SIOCX25SCAUSEDIAG(r2, 0x89ec, &(0x7f0000000140)={0x6, 0x7}) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f0000000000)=0x1) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:21:47 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x8000) getuid() ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000040)={0x7, 0x1, 0x7f}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000080)=0x6) 21:21:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x64000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x68000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:47 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0xfffffffffffffd51) 21:21:47 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='hfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:48 executing program 0: 21:21:48 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40000) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000040)=""/143, 0x20000, 0x800, 0xffffffffffffffff}, 0x18) 21:21:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:48 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='ifs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:48 executing program 3: 21:21:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x3}) 21:21:48 executing program 3: 21:21:48 executing program 0: 21:21:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x71000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:48 executing program 3: 21:21:48 executing program 0: 21:21:48 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='mfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:48 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fcntl$setsig(r0, 0xa, 0x3d) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) [ 972.053329][ T27] audit: type=1800 audit(1556832108.790:913): pid=4840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16914 res=0 21:21:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x73000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x4}) 21:21:48 executing program 0: 21:21:48 executing program 3: 21:21:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x74000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:49 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000040)) 21:21:49 executing program 3: 21:21:49 executing program 0: 21:21:49 executing program 0: 21:21:49 executing program 5: 21:21:49 executing program 3: 21:21:49 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='rfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x5}) 21:21:49 executing program 0: 21:21:49 executing program 3: 21:21:49 executing program 5: 21:21:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x83000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:49 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='sfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:49 executing program 0: 21:21:49 executing program 5: 21:21:49 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 21:21:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x84000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:50 executing program 5: 21:21:50 executing program 0: [ 973.290246][ T4910] device nr0 entered promiscuous mode [ 973.796492][ T4910] device nr0 entered promiscuous mode 21:21:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x6}) 21:21:50 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='tfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:50 executing program 0: 21:21:50 executing program 5: 21:21:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85ffffff}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:50 executing program 0: 21:21:50 executing program 5: 21:21:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x88000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:51 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000380)="0c0ed53b98cd801b69e4660f3a2118a6e4629b5c5c6200d9d9d0c40f381cd6385f5bc4c3514ae300fb21a2b93db93d8fe9589b26c7e4c753fbc4e101ed2ef00007c4c1a9e0368fe840ed8ac61954f685f2f00fbbb60500000000c4c4c251aebe5b900308c7e4f2738f730f00cf660f71e44a2fdb4f08dd6d6807485151660fd09500000000509b129f9b9f9bb261996161ea11eff265dc5f20c35bc4c121df670445363ef80f9966030faee42c24660e4700000f10eb0f0d18c401fe5ff6e3df64673667667066bd4343660fd2938c00000065643e660f7fd165f20f2b959b0000005566458fc8389e8e040000000067987d") 21:21:51 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f00000000c0)=0x54) 21:21:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x7}) 21:21:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bind(r0, 0x0, 0x0) execve(0x0, 0x0, &(0x7f0000000240)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x40400c0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, 0x0) 21:21:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:51 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='xfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:51 executing program 0: r0 = inotify_init1(0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) kcmp(r1, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 21:21:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8f000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x5}) 21:21:51 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='g\ns2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:51 executing program 0: r0 = inotify_init1(0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) kcmp(r1, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 21:21:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x90000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bind(r0, 0x0, 0x0) execve(0x0, 0x0, &(0x7f0000000240)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x40400c0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, 0x0) 21:21:51 executing program 0: r0 = inotify_init1(0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) kcmp(r1, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 21:21:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x8}) 21:21:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x97000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:52 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='g%s2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:52 executing program 0: r0 = creat(0x0, 0x140) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000480)=ANY=[], 0x0) rt_sigprocmask(0x0, 0x0, &(0x7f0000000140), 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f00000005c0)) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x80) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380)={0x3f, 0xc60, 0x202, 0xfffffffffffffffe, 0x200, 0x8, 0x5}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) keyctl$get_security(0x11, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$tun(r2, &(0x7f0000000280)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000200)='ceph\x00', &(0x7f0000000240)={'syz'}, 0x0, 0xfffffffffffffff8) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r4, 0x112, 0xb, 0x0, 0x638) 21:21:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x98000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1300000000000000}) 21:21:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x5}) 21:21:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9cffffff}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:52 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:52 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='g.s2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:52 executing program 0: r0 = creat(0x0, 0x140) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000480)=ANY=[], 0x0) rt_sigprocmask(0x0, 0x0, &(0x7f0000000140), 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f00000005c0)) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x80) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380)={0x3f, 0xc60, 0x202, 0xfffffffffffffffe, 0x200, 0x8, 0x5}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) keyctl$get_security(0x11, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$tun(r2, &(0x7f0000000280)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000200)='ceph\x00', &(0x7f0000000240)={'syz'}, 0x0, 0xfffffffffffffff8) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r4, 0x112, 0xb, 0x0, 0x638) 21:21:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9f000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x9}) 21:21:53 executing program 5: r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002a40)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) 21:21:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9fffffff}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:53 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x100, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e24, @multicast2}, {0x6, @dev={[], 0x25}}, 0x10, {0x2, 0x4e21, @multicast2}, 'rose0\x00'}) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) socket$isdn(0x22, 0x3, 0x35) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2c40, 0x0) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f0000000040)) 21:21:53 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='g/s2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:53 executing program 0: r0 = creat(0x0, 0x140) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000480)=ANY=[], 0x0) rt_sigprocmask(0x0, 0x0, &(0x7f0000000140), 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f00000005c0)) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x80) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380)={0x3f, 0xc60, 0x202, 0xfffffffffffffffe, 0x200, 0x8, 0x5}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) keyctl$get_security(0x11, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$tun(r2, &(0x7f0000000280)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000200)='ceph\x00', &(0x7f0000000240)={'syz'}, 0x0, 0xfffffffffffffff8) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r4, 0x112, 0xb, 0x0, 0x638) 21:21:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f143c123f319bd070") ioctl(r2, 0x8, &(0x7f0000000100)="5ce7a3fe9d06bffc91f6a5da7c4c1c63176dc98dc3c47aeca7d6fed4d2b7773f1a3d938ef569a4c4b801ae67953d47eca7f315e2fda73d8f48829193cd8ce0540a5ffb65a2a4dbf8168e9f75de8b33a656ddd115a594defbc5690262ffe27726d36010b17fe7144c16943d0ed3c41ff9d273cbdd5515e02b8dfa830841e0ef2032e37a174e72edf5534ad834c05d0ed71edc28bad0f43b847eb6329926c7a3a052b676b87cadddc327d0cd4305497b6546314ea670c95e2eb998ecad50d18ddd4f51c6a2b03cc102d76ccdf8b9fb94fb1e2819baa00f2690a4") r4 = socket(0x11, 0x2, 0x40000000000) fallocate(r3, 0x10, 0xc9b, 0x937) write(r4, &(0x7f00000002c0)="1f00000054000d0000000000fc07ff1b070404001200000007000100010039", 0x527d) fcntl$setpipe(r3, 0x407, 0x1000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r1}) 21:21:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0xf0ffffff}) 21:21:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa0000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:53 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gf\n2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa3000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:53 executing program 0 (fault-call:2 fault-nth:0): r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:21:54 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:21:54 executing program 3 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:21:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa4000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:54 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gf#2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xa}) 21:21:54 executing program 5 (fault-call:3 fault-nth:0): epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") [ 977.431661][ T5063] FAULT_INJECTION: forcing a failure. [ 977.431661][ T5063] name failslab, interval 1, probability 0, space 0, times 0 21:21:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) [ 977.478844][ T5063] CPU: 0 PID: 5063 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #97 [ 977.486812][ T5063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.496894][ T5063] Call Trace: [ 977.500244][ T5063] dump_stack+0x172/0x1f0 [ 977.504643][ T5063] should_fail.cold+0xa/0x15 [ 977.509300][ T5063] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 977.515168][ T5063] ? ___might_sleep+0x163/0x280 [ 977.520078][ T5063] __should_failslab+0x121/0x190 21:21:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa8000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 977.525062][ T5063] should_failslab+0x9/0x14 [ 977.529620][ T5063] kmem_cache_alloc+0x2b2/0x6f0 [ 977.534511][ T5063] ? lock_downgrade+0x880/0x880 [ 977.539414][ T5063] getname_flags+0xd6/0x5b0 [ 977.543962][ T5063] do_renameat2+0x199/0xc40 [ 977.548506][ T5063] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 977.554100][ T5063] ? lockdep_hardirqs_on+0x418/0x5d0 [ 977.559417][ T5063] ? retint_kernel+0x2d/0x2d [ 977.564069][ T5063] ? user_path_create+0x50/0x50 [ 977.568960][ T5063] ? retint_kernel+0x2d/0x2d [ 977.573597][ T5063] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 977.579096][ T5063] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 977.584610][ T5063] ? do_syscall_64+0x26/0x610 [ 977.589343][ T5063] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.595448][ T5063] ? do_syscall_64+0x26/0x610 [ 977.600158][ T5063] ? lockdep_hardirqs_on+0x418/0x5d0 [ 977.605492][ T5063] __x64_sys_rename+0x61/0x80 [ 977.610217][ T5063] do_syscall_64+0x103/0x610 [ 977.614947][ T5063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.620867][ T5063] RIP: 0033:0x2000000a [ 977.624970][ T5063] Code: Bad RIP value. 21:21:54 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x20000088) [ 977.629063][ T5063] RSP: 002b:00007f16d29e1bd8 EFLAGS: 00000216 ORIG_RAX: 0000000000000052 [ 977.637502][ T5063] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000002000000a [ 977.645500][ T5063] RDX: 0000000000000000 RSI: 000000000000002e RDI: 0000000000000003 [ 977.653500][ T5063] RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000006 [ 977.661496][ T5063] R10: 0000000000000007 R11: 0000000000000216 R12: 000000000000000b [ 977.669589][ T5063] R13: 000000000000000c R14: 000000000000000d R15: 0000000000000005 21:21:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0x7, 0x0, 0x638) 21:21:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xaf000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:54 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x1) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:21:54 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gf%2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfa000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r1, 0x3, 0x1, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 21:21:54 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f00000000c0)={0xa, 0xa, 0x8, 0xffffffffffff1416}, 0xa) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x8, 0x4) 21:21:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xb}) 21:21:55 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x80010, r0, 0x0) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:21:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:55 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:21:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0xf0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000080)=0x9c) 21:21:55 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gf*2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:55 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000040), 0x8) 21:21:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff85}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x40000, 0x1) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000080)={0x2, 0x7f, 0x0, 0x2, 0xc17}) 21:21:55 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f00000000c0)={0x1, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:21:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff9c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") prctl$PR_SET_FPEMU(0xa, 0x1) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x1, 0x0) rmdir(&(0x7f0000000180)='./file0\x00') ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f00000001c0)={0x8, @remote}) bind$isdn(r2, &(0x7f00000000c0)={0x22, 0x7, 0x4, 0x623, 0xffff}, 0x6) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) 21:21:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xc}) 21:21:55 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gf+2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000000)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:21:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff9f}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:55 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:21:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:56 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:21:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp6\x00') ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f00000000c0)={r2, 0x0, 0xfffffffffffff000, 0x8000}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r3, 0x112, 0xb, 0x0, 0x638) [ 979.451784][ T5] binder: release 5136:5137 transaction 2 out, still active [ 979.485096][ T5] binder: release 5136:5171 transaction 5 out, still active 21:21:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:56 executing program 0: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=0xe, 0x800) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x400) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000000c0)) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x2c00) read$rfkill(r2, &(0x7f0000000080), 0x8) write$FUSE_IOCTL(r1, &(0x7f0000000100)={0x20, 0x0, 0x6, {0x9, 0x4, 0xff}}, 0x20) 21:21:56 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gf-2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 979.550348][ T5] binder: send failed reply for transaction 2, target dead [ 979.585635][ T5] binder: send failed reply for transaction 5, target dead 21:21:56 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x600000, 0x0) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000001c0)={'ip_vti0\x00', {0x2, 0x4e20, @broadcast}}) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000200), 0x4) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) syz_mount_image$nfs4(&(0x7f0000000140)='nfs4\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x0, &(0x7f00000011c0), 0x6000, &(0x7f0000001200)='trusted[*selinux{(-(\x00') [ 979.685996][ T27] audit: type=1800 audit(1556832116.420:914): pid=5162 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16722 res=0 21:21:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xd}) 21:21:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:56 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) 21:21:56 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c20) read$rfkill(r0, &(0x7f0000000080), 0x8) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20081, 0x0) 21:21:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getown(r0, 0x9) r1 = syz_open_dev$amidi(&(0x7f0000001b80)='/dev/amidi#\x00', 0x1ff, 0x20a2c0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000001bc0)=0x9, &(0x7f0000001c00)=0x4) recvmmsg(r0, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/177, 0xb1}], 0x2}, 0x7ff}, {{&(0x7f0000001280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001880)=[{&(0x7f0000001300)=""/246, 0xf6}, {&(0x7f0000001400)}, {&(0x7f0000001440)=""/212, 0xd4}, {&(0x7f0000001540)=""/125, 0x7d}, {&(0x7f00000015c0)=""/29, 0x1d}, {&(0x7f0000001600)=""/1, 0x1}, {&(0x7f0000001640)=""/131, 0x83}, {&(0x7f0000001700)=""/163, 0xa3}, {&(0x7f00000017c0)=""/13, 0xd}, {&(0x7f0000001800)=""/66, 0x42}], 0xa, &(0x7f0000001940)=""/230, 0xe6}, 0x2}], 0x2, 0x100, &(0x7f0000001ac0)={0x0, 0x1c9c380}) getsockname$netrom(r2, &(0x7f0000001c40)={{0x3, @rose}, [@bcast, @null, @bcast, @null, @netrom, @bcast, @null, @netrom]}, &(0x7f00000000c0)=0xfffffffffffffecb) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_dev$midi(&(0x7f0000001400)='/dev/midi#\x00', 0x7, 0x1) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000140)={0x10001, 0x7, 0xfffffffffffffff7, 0x0, 0x16, 0x2, 0x8, 0x96, 0xfffffffffffffffc, 0x9, 0x7, 0x8}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r4, 0x112, 0xb, 0x0, 0xfffffffffffffdcd) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x20000, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r5, 0x8250aea6, &(0x7f0000001e40)=""/106) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000006, 0x40010, r1, 0x0) 21:21:56 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:21:56 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) fcntl$setown(r0, 0x8, r1) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:21:56 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gf.2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:56 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x100c0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f00000000c0)) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xaf4, 0x80080) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getpeername$tipc(r0, &(0x7f0000000100)=@id, &(0x7f0000000140)=0x10) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r3, 0x112, 0xb, 0x0, 0x638) 21:21:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xe}) 21:21:57 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:21:57 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000000c0)=0x7) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@gettfilter={0x2c, 0x2e, 0xc, 0x70bd2a, 0x25dfdbfd, {0x0, r1, {0x8, 0xe}, {0x4, 0xe}, {0xa, 0x1}}, [{0x8, 0xb, 0x73}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8081) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:21:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x500000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:57 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:21:57 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:21:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x2, 0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000680)={0xa, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) timer_create(0x2, &(0x7f0000000800)={0x0, 0x1d, 0x0, @thr={&(0x7f00000006c0)="72dba7fc2ad15b7a6727662f979a9cc8c00a9594", &(0x7f0000000700)="81c576ffdf9b7385b6689dc9ce8254ba724581884ebdaa4a74c181ef6461f87ae68e67e8680aefbb7d694ee8d6c95cce65580fa0c80b2dbda3991541972e86e512dc1224e3e3bd37d60dc22d2d50a9154c1dfaa4dc4962cd23a066778dbaeb0003d8237d9c2bdf887c0af7795012662ee4e0cf4a488c293351c293ef85f53882bf185c3b4e43f3d6fc2e30e4e344782ccf69a1f570b66c6f6be438aa0e9ee83579ef53ea3a326516f6596a100adfcced7ad6ff0ce2a5bc98354703281ff4d072c8dbd62eac6a6f01432b43022ff82387419401f46210ad52250ec9895ab282272f93118918564fa5cf5a74f656e889e4433f583e0f26f27d"}}, &(0x7f0000000840)=0x0) timer_settime(r3, 0x1, &(0x7f0000000880)={{0x0, 0x1c9c380}}, &(0x7f00000008c0)) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) 21:21:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x600000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:57 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gf02\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:57 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000040)={0x40, 0x4, 0x6, 0x4}) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:21:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x700000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:21:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xf}) 21:21:57 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f00000000c0)=ANY=[@ANYBLOB="0700000000000000000000001d3e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004d3d000000000000"]) memfd_create(&(0x7f0000000040)='nodev\x00', 0x1) 21:21:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x173) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x3, 0x8000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='yam0\x00') setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000080)=0x1b, 0x4) socket$rxrpc(0x21, 0x2, 0x2) 21:21:58 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:21:58 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfX2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:58 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000001180)={0x7, 0x0, [{0xbd8, 0x0, 0x1}, {0xb6f}, {0x858, 0x0, 0x5}, {0xb78, 0x0, 0x8}, {0xac0}, {0xecf, 0x0, 0x6}, {0x0, 0x0, 0x10000}]}) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000001580), 0x75eac021e3974f2a) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x224200, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r2, 0x1, &(0x7f0000001140)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x5, 0xfffffffeffffffff, r0, &(0x7f0000000100)="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", 0x1000, 0x6e, 0x0, 0x0, 0xffffffffffffff9c}]) fgetxattr(r1, &(0x7f0000001400)=@random={'system.', 'wlan0trustedem1securityeth0\xcb]bdev$#eth1eth0**\\securitysystemnodev\x00'}, &(0x7f0000000080)=""/21, 0x15) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000001480)=0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000001380)={0x3, 0x6, 0x6, 0x80, &(0x7f0000001200)=[{}, {}, {}, {}, {}, {}]}) 21:21:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) dup2(r2, r3) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) accept4$netrom(r4, 0x0, &(0x7f0000000080), 0x80800) 21:21:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:58 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8000000000000008, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:21:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:58 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfc2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x10}) 21:21:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = request_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='^\x00', 0xfffffffffffffff9) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$reject(0x13, r2, 0x2, 0x0, r3) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:21:58 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:21:58 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000022c0)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000023c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000002400)={@mcast1, @remote, @local, 0x4, 0x7, 0x7f, 0x0, 0x2f4d, 0x80000, r1}) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x2c00) read$rfkill(r2, &(0x7f0000000140), 0xffffffffffffff38) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) 21:21:58 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:21:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:58 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfd2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x11}) 21:21:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:58 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)=0x9) 21:21:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x240000, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'yam0\x00', @ifru_addrs=@xdp={0x2c, 0x4, 0x0, 0x18}}}) bind$bt_hci(r1, &(0x7f0000000100)={0x1f, r2}, 0xc) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r3, 0x112, 0xb, 0x0, 0x638) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000140)=0x20, 0x2) 21:21:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) socket$isdn_base(0x22, 0x3, 0x0) 21:21:59 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) r1 = gettid() openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x4000, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x8, 0x2) ptrace$cont(0x7, r1, 0x1, 0x7) fcntl$setstatus(r0, 0x4, 0x2801) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:21:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x40000109200, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000080)=@rose={'rose', 0x0}, 0x10) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:21:59 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfi2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:21:59 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:21:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1810000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x12}) 21:21:59 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000001380)='/dev/ashmem\x00', 0x800, 0x0) readv(r0, &(0x7f0000002680)=[{&(0x7f00000013c0)=""/127, 0x7f}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000001440)=""/163, 0xa3}], 0x3) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8, 0x0) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x4, &(0x7f0000001240)=[{&(0x7f0000000140)="9bef351392c1e300ddeeb531bec46207e3e0e4f7273b2d0ce2f0babe23f5293b2e9446a3ecb3d4620c8937e7a25ef35c80838012c67a65d8b60f6906db97ff43c9f59d448f32a11aebe9230d06e226ceca5228745dbf6c95fd6a3272a4f0", 0x5e, 0x1}, {&(0x7f00000001c0)="d8f845c59bb908f945e817c584c8d609b5bb674e95a40395a1ac90cea496afbca98144368fe2787113eb215990f9054b641499af3c290073f9e5a0b6", 0x3c, 0xc6e}, {&(0x7f0000000200)="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", 0x1000, 0x37}, {&(0x7f0000001200)="a6ccb4410c2286787f70bb37fa7e09d28134fb9b0f8cb4c6d5e7792a3013487e099f326ffad31be105c10ddcbe68101305019314472daee2cc", 0x39, 0x4}], 0x4, &(0x7f0000001500)=ANY=[@ANYBLOB="757466383d302c6e6f6e756d7461696c3d302c747a3dccee5dbe9be05554432c6e6e6f6e756d7461696c3d312c66756e633d504154485f434845434b2c736d61636b6673726f6f743d70707030656d302c7065af5a28414a06e340656374696f2c61707072616973652c6673636f6e746578743d726f6f7449b3b30f6b3668ebf296247b3bff85841b1a6ef05d493c42e722f3cc5a3a0474e7da7566303ac7baf02c43619a37feb57470f7551b572674d8ef95d643fcc210cf9f6e0f8b52ff0e2117508ab6ff57ca3beb054a34003c9d26bfbc244042dc36adf669883f", @ANYRESDEC=r2, @ANYBLOB="2c6f626a5f747970653d73656c696a75785d40ea5b2c6673757569643d00047a39332831322d3737647f989f2d667747342d006637772d34313d0073633b772c66756e633d4b455845435f494e495452415246535f434845434b"]) ioctl$TIOCSBRK(r1, 0x5427) fcntl$setstatus(r1, 0x4, 0x2c00) read$rfkill(r1, &(0x7f0000000080), 0x8) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000000)=0x8) 21:21:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x0) 21:21:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:59 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="69000000b7a92ac174318ee46ce663ba982ab6023ce90123bbd957a645f8c9cd095b13d764ff697d043bfe665773875a3e60ffac5b8ad2528258913c8fa970328a79f5a8f9051cc8a13c0b52fee17b2f2080411b7146ea4168abb41dd1327cbe46f12b50b767b3299ec47c4f6e2cd5584ea90d42100bf14989b2f825deffbf2f2a97dccc2ba20800f0f82a0236b1d97c0ec62078b7d7808a606b33a6f6e4062b75ea2b2ca59aa3e45de57ea87e370252c7a57138562e9ef528b0"], &(0x7f0000000140)=0x71) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0x1c}, 0x1ff}}, 0x8, 0x6}, 0x90) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x44000) read$rfkill(r2, &(0x7f0000000080), 0x8) 21:21:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:21:59 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xa, 0x111002) fcntl$setstatus(r0, 0x4, 0x2c00) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) bind$can_raw(r0, &(0x7f00000001c0)={0x1d, r1}, 0x10) read$rfkill(r0, &(0x7f0000000080), 0xf7) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000200)={0x9}) 21:22:00 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfl2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='bcsf0\x00') setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:22:00 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x810, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x8040) 21:22:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:00 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0xfffffffffffffedf) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x3db) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000140)="2be67f5b43ccfaee1ae3f33ce9dcfe0a85cb055e9cd06b85cd7d97f4650ff6400a537324ef5468915e1d47107872074e3abb903d528e9908ab8d1759d9af9e3588f68b54eedb7347a364a89e638e8e9e59800b3f78a856dc1b6fbb67a802086fd453d4fb838e8ae8712459b1b575cc115261e0515597b788c5098ea5950c901e626c75347b739f389334", 0x8a) renameat2(r2, &(0x7f0000000080)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00', 0x5) 21:22:00 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:00 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfo2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x13}) [ 983.938247][ T5404] Unknown ioctl 19465 [ 983.960312][ T5404] Unknown ioctl 19465 21:22:00 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x41) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000080), 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) 21:22:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:00 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfp2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f00000000c0)="14dcd070e10a823e7344c9ce6ef8a41d40916acf19b94f1e43c24b0290911b68a8a4ce9ac613d1c1ce4f894c14cdb9e5e17e8b69335f1b8a71837901582b85b739151f97afcbab118f68903da0fbba78c73c1e40fd9c32ce07a15eea3cdf271ea85d68a286ed") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:22:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40, 0x0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0x80000000, 0x9, 0x6, 0x1, 0x8, 0x6}, 0xffffffffffffffff}, 0xa) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) syz_execute_func(&(0x7f00000001c0)="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") perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x646) 21:22:01 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:01 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfu2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x14}) 21:22:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet(0x2, 0x4, 0x394) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:22:01 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:01 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001200)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x5000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x8000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000001180)="a1b358d61df0b7056da72121e82ff3d815dfd91a872d3fa5e4152b2d0bf42db99eb433c6074193983c0e33202751e116891c26d70aeaab22da51c40fc77a322d3f70a3a3af56d357e827bf8cb3cb4dc67a363b781fa0e694e1cb6264951c7de9f56d4e958663b23bbe375462666523a05e1f04f72a4e347e5fb3158d8a08bd", 0x7f, r0}, 0x68) read$rfkill(r0, &(0x7f0000000080), 0x8) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000001140)={0x6, 0x0, 0x7, 0x0, 0x4, 0xf27d, 0x10000, 0xd3, 0x2, 0xfffffffffffffff8, 0xfff, 0x1000, 0x0, 0x1000, 0x2, 0x2, 0x7, 0x1f, 0x6}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000010c0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x5000)=nil, &(0x7f00000000c0)="d79684e53625656883a998231e22216e21a3885a892d498a05f76544a0b7e09d67b13d61dfab8a025799a1c1fdf6d8f02ca9c04440e9294e16a771373322c3b6aa13fb78bdd4fc68ee080bfc7e9b5cdf4f96ec2a80916727b7c33b04fdb0f731e6a4b6c8f4f3db7fcbb5d872511c46f66ebcd4b4553ee747553753b1c94a27e5a4c5db1fa7ef021e13fdfbe3aa3466c23e850b62634761ad157fe41267ced6c2348ab2a7fb747766a092674fcb40ee756020a57ad5362bb4fa81653d1166e12f31a9f98ee02f79350df3a3b67767232ed8ca8355be5bd2dfdeaab1d0d3fad2f0cd28c5af39bdc2146bce47d02ee806f0d96b712bfa5e037368e5e8ce16b69263d8bb1134dd3f89d5748e6836be4394777cbc152c646d27b830281ad07a4cc01796d1c8eb759eea9a3d730865d6345cfa2e6d568f8b422e1ecad9a484785dc5bffea24478a6cee9c483ce58466324da0631394d9414b28d7a2c71b0fef635c46cf67c9ed8b3bd10bcc28d66d6665e1b9fc9f4b1b8d7562d34bc11fe5901ad5e747f87fa0d52528d24464b7b0cbcd6ca796cebf3caaf297a5091e6c59402a08b33e25fa98969a0ea2a6a154196a34142f21fbe1da5d61eb45aeb908cf25a32053a178afceeb9238646400a0ea412f8292bdb30d0a7768dfd8bf088f223ff68732c7bf33c9f66b40a9f9a524c02562802874926792be4a40f8151b77d7427108a66bb054fa17865101a8d9c6bc56b0dd0ee23e51ead6213c1a93c43affc4e56745dd715a11a59feb01eac50eb0ab1219035e31f2c85ee5adf210441764f63c61dcf41573103ba829c4de61f38829651d5159d8c8a9efa50ce8d008ce80137f543b19db51f83ba7a1b1124c595ce2018a3e6107ed62806fc4815b427d2078e46fb835107559163625884cd5ed3fb50d99e8a1e40cc3bf67ba1a4cbb782af2f808c758c6764b19eac9269599ce3442f5e7fdac9ce892a1ad0c7a1eea6193f469b732897d5871299b29e8010c302dd0fa02874f7eb3f512da16adc7d94bcd8ef39ddcef0b650789679ac1089eb6b9c57662ab2b18755a0e6c8611f1f7e65b4d12dea3611fbcd749f5b0aaf13b80649b51686ea87608025d8a31a0b9bf3da7c2b4d3d02971c74fedddb49ce9ddffa266472854c285b6a60762bde8fc85e20be0584115d5da9cf6542b16f4af04b12a53769b7f73bb2832b61bdf50532cfee4e3929b5aed0aec067de8326421b69c3a645cc6cbf6eb3e283f1e2324b3a3f96101be02f3ab7d8694cc6f0968588bc8da83bea4029f0a897e0d39180225d71e34c5815999d2d62b8720ae03f247224fee6d30986beafd9fc79632c27bedb099ad979f4cb755768a73ce72a8d8a2f557c7f9d623b3d1c488e5e68c6e65b920e1c038b6d15a7fcf2f891a4bbc6b128f8a179aebab249bae38100a111c93ef64e806e3ce3990c115b10be40d1f2cc35611409f613200af52fa1a39354b6f63f9fab607cba519d75834f3a485fe95a16a997ec745578183368c3ea8cda6739578f03fa8ed79f004064fad11480cb78e2156177e6070b5b83d7d4b30a5232c0016ec039b6c2cf72fd8b54fc9172d883a19e945a5c0917d894ef5c237ba02d6386ca6512fdb92a44d510ce3b81a201df9b25494732ac161359e45e58a6a5129bc6ff0bf06f59ba818121ac516270df674296f4799e2e2a3729b701b3c2d86d40b15a2635dc17bb2474ce5db6f37f3e4b8471d8bbf11ddbdcf32d90ae382f3f41b2015c0ac598e58c4472d9f2c1c04bb3b965096ddd2af733e7c82def0d455f9268aba8d0f93a2f3fb11e9420ac347b23dada93b0cdbcbd63db9a852a8f0872e0724fa05ba4693cb7df7c413a5531d4c6b9417dba01a42f4988b4d57ddbb33c67efd2828726522368cf83e05a6338ebf025c22c5a60b98951879505e09975a0eaf647c932a4d13e1c57514c740f1401467908b876503cac57d37db02c9fab7d73767c1ac0a7990caff508ed39ffc46fca4380f1c9848206529f3f7044676031ca3dbce34ecc430974bc294aa10915ef03e7d9a5435a2650f534044d0d0e5875123631e42da353dcfbe5ea1edf37e91b88a974016b0248d62ad856524e9926ca788b1a82f49b215793b45c7a569ecfb4c8fe3fa998f405c2d635db52ac8441e3a9259db2628276c72496a03a37cf4c69d2b667917bda80f9df18ad98f84dd4f3562c75b30da5993114cb83d76d551c92a235eece3ebde0a759ff6edba9013b8c66d4d6450927164c2b3b81457938a1646460904b3041d99bde4c5183826b2d77e23fa531693df9c69bac975446b18c42d64c0b51bf46c4db334bf8f4e0c8c50b41e625693430a1d921da22b7f98c8906931d0e688f1620b23f17b8f2791466fec659467b7fa1238346b7991185c532d813e09e33ca56d89f8d4b91dd54f33cd6f072a8125b052a984d808901de80e6db16b0ca8b4137ba2b71eb410e9a80644ca1530e86ff252c8dab3ba692d4f09b06669ed462b4a0b135b17713b520fcb16b7bc80a2f19f1af8743f8e12cb51c63a8263f1a175090adadf1db9853fd0f3d8c1b2ddd9c6d9395a46dae75648c778b1f77c80530a52a807525425c31109c955e44a392f994d6a36cebcbd8609c6a4cef46ccdd4322331f4a34f4687152bf9733cd0f0860446b71184dfce1712fb6e65051bcd255ff25fb5ca23532c2e34e246cb425ec66f629837cbbb08d334a129d8bc48363df6ad960eb62d6b0a093acc8f0f5669f958ee13a8982c2f81256b2ff56238986a0db392b750bdcbc7aaafb661dcf5ba9d1d89c95f4f6de9805ec69f58350f82a1e6398b2816ccb31b5a08afd5a5293cb8b33da436a2079d87b0d5fef2f8f2244d80b812b7e2cebabebf9342265432281232ef8a925f1dac1b4be36ebb452546d4d893f42a4bc4845ef3b0d9175de572348baa36da993dbfa788ae72ac5368f2e489fb669c07dc400c4feb24204aa914af9ccc682132a82bcb2d0df515e5c834d2aee9a9879a2c71e85e4dd4ef515e47e3fc698fb44e0d42ea0409f2869ea34a1843ac4645131fa95dabf03aa3d7dc76fdffa98570f28250d9f1700e0c6a2a2f32a24d6d0dc7b298b3634869f035f9bc86d0780258b26e31c2ad835112c5085b1cfd7677d18d6d3457a7e8429e296c8baefded5ffc621a330022c363d3c69daac69189d77c840efd378ceb274376975615f4f0572d45c8f832a422990917760fb5aa1538d8382d96c5290735db589d59dc47a2f057235c6fd31b12c0d3545e2564c7a0697377183b715a8fb0ddc26fb67c953b4d88f254549246f22e9a826a9e3657f74cfde94d5e995f8ef33cc1944162d6dcb4315fb2456d5b599b8a9a27ff3fe997dfc338a3d37ddaf814bcd2666b3661c9d22dc7183f4d3a24886743530fbced07446ec1f78282cb07d2c4497c7d10e17d069d2ffa75f21524a23210583f8150a7a0d7c5284571d3cad5e256a349c8801c743bca7548a27a18176e6d03ddeeaa026cb5a7f8f556fe96f69df3c58e6f63b4980ca15b845753165d57b9e681eb915da32a1fc5365145051a3f1615640a2939b193378cd231e8b6b3e38bacd55cc38aff0d4aa0c2f16d70a1985f717f68a3bdbdd0f457aecc20490ca813e0f7679fda5a4104ef241a72c1749dc91efb42fe80ffb8e150988a47f9e7e5dd55119ca620535445a56fbe9ae6d7c3b3bf135163fc3dff0586d51f7f4e71ec3ee5d1d22af994a7001a70f4f09d7fefccb24a322f643a2ed0e4cf2f6139a369e2193b43da65e41de24b77230e033bd65cc5878b5723d1ddac81af0b313da4362d4c51070c58190e696006b5dd3954fceb34f7cc4dc8c8e37ff0e3727fd8d0bbba8b75f8a229a40e584c6d96f05ef768cca4e7ca5839c6aab2fae30950e12d95414dddc21baa09ab1c5aa920479dca253430e4818526cea5ac709f37d1431184694558164796477955d040458a42a6f9ed4833a5c4d5e3b17b8c637074be837690ba9e6cdf2b9f3b3e38bf56b472e72604af9ff554ffd6cc6b37ef56ede6a54b3b73d59cccc60d73c7ee9825757f3d5e7d337b069d0d4d991d3dd813d133efff49b374bd66acd4761cac4bfe16a529ca8998c219751b40b7f36fed8c17b170c44de22701d288e7b1371c6629bf221775d99895d07f17eee66236edbe152cadce40eafbdf82a411cb2afb1afe9a247a75ca7eaf37e3c08978c0bedd520f68c3ef14ea74e1642d8c0187536ece6a9485a31225c1e7b274476b26878997bb78b64abbcc51d4d19ca888a2457dbe0133a56701be5ecf3f224729a5924cbe54f9dfda7d63c2352935fe93cde1e272f2a7356827b31dd822cbc201fe9e72ba5d91b1040dbb26edb8318b9bba70d352077b5c873c2f19f22177283086c280126d01caa11c968b2142f819f691a189346bf825cb609f7e0ed67e693500aa2070dc2962c90b42803e918c0a9839d03f458472dc4f70b91c187b247dd8ddbb687c47135d4dbb710061f3df6c5597277a605d9c5f39e349251592c241d911df96be139707f4cafb354bf0c26c349bd1e57894fcf0518d543c6fdbc0932742000a8a4d0c10b96bac50da317867898331a3ddef7f5880a15f1c9455ae4c5ce65672d0081dfe67cc5d699c4da69229a69dba87aaf75f03004357a908a37a450a5150aefba579d2a362c56b174830b099ac4819f7a9e6cb1f75300ffdf2197e94b154624bd352fff3adabb001c6ca2a4e5c356319550a7da8e5857f177edc4e86ad7a344335109dc519e135ac2b12448b3ff2c7b02726fed1f1181058119db66730d96a877d8c9f10b8a5c5951df7bf0550efaac3732340013ef84504853d86149d40a40417f97cfa0f25fb340a6fbc019d121cef2e4961ed4b665551caabc78d867e6856f2d78aadc8e5e1eb904609c7aa051c3d40e5852835f1c2493e6b797273e5c6bc84ec4a14f201a30cb036afc39dfe213f76c69a423dc5c5e582205af970cdcb9f5043a672c860ef2d3d5f83695c7021f21f83d800522de8a43c8d0460844bdfb448c59ffe0c22da4d2a7ea530254fead3662b444152aaa92ba0b0f16f66fe5782bb88fba58466943d79f3a0c2037fcef6c1866515b5956e345931f0b1d7f3e0ebdf9fc649faca571bcff78e93f45b7b67f8ac125c23e92057e344b7d6d7ee47b18001a4529436415646b56ba859a3dc01bce5a4422e90d881672ff64d881b4d3c7487210b381ca0769010f7f6f7ff582f509f359c140147626c3af67e81af7f2eb9cf55f8687cb95d6bb13d6916bada508cbe382a2bc7bc6044c556a3e81ad1359009e0d7a864935e53c69559a1b96a4988c45cf3311a7cc77a89046b2c0a35449cb4721b429fb9a551d7c78273d11b57ee9a36efa7ee03a16f166163000a83c90a044ec3459e2ebb106118d6560ce0cca4aa42e43a6c0e9ae041b0a54abf9cf6e42f86e0922cec21833a44331334edd6db4c2a5ab228bc4289d6e9f744d377dcf53942c28f51d304c682e88e6c5f9ee83ae2901991a3c30a860501dff4a34720e1cb5f85118f007888a3ee542ee1d5f1984b212992a424336fb54a1d0cbbffaf64bce951eddea2af5b817e5272fb249236e2201690a7341f52de9795613c329d3ffe545f8d49ad6284a0c62661496fa645b8a1571088c4caeb22186e42713247dd1bcef0dfe16cda57f3daa79382de5468d01b2fcffd79189bd9eb32aa55cd7232f5be6c293c4e7737268a917d48f9638dfea1bd71a7f1744119654df0dc381e2f7947ffc589c993e778de1b681c37d4ae8f2c74c517e75d1689d38cc", 0x1000, r0}, 0x68) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 21:22:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40080, 0x28) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000140)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x7fffc, 0x0) 21:22:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:01 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:01 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x400) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:01 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfx2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:01 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) 21:22:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x15}) 21:22:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x2be) 21:22:02 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs\n\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:02 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x80, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000080)={0x18, 0x0, 0x5, {0x7}}, 0x18) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x0) 21:22:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pwrite64(r0, &(0x7f00000000c0)="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", 0x1000, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = syz_open_dev$adsp(&(0x7f00000010c0)='/dev/adsp#\x00', 0x2, 0x408400) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000001100)={0x4000000000000000, 0x1000, 0x4, 0x1, 0x4}) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000080)=0x7, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000001140)={0x10000, 0x1, 0x1, 0x1f, 0x7}, 0xc) 21:22:02 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x6, 0x10000) fcntl$setstatus(r0, 0x4, 0xbff) r1 = semget$private(0x0, 0x4, 0x81) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x46}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x3, 0x4, 0x2, 0x101, 0x81, 0x1000, 0x3f, 0xfffffffffffffffe, r2}, &(0x7f00000001c0)=0x20) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000000)=""/12) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:02 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:02 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs%\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) msgget(0x0, 0x40) [ 986.276811][ T27] audit: type=1800 audit(1556832123.010:915): pid=5509 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16626 res=0 21:22:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x16}) 21:22:03 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs3\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:03 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20000, 0x0) read$rfkill(r0, &(0x7f0000000080), 0x8) poll(&(0x7f0000000040)=[{r0, 0x1}, {r0, 0x1148}, {r0, 0x40}, {r0, 0x100}, {r0, 0x268}, {r0, 0x440c}], 0x6, 0x8) 21:22:03 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000080)={0xbe2, 0x2, 0x6}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) 21:22:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4b00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x800, 0x0) fsync(r2) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0xbe8, 0x1f, 0x100000001, 0x4}, 0x8) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f00000000c0)=""/53) 21:22:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4f00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x42, 0x0, 0x9, "e110d27f1717704c0b72a54c9febcdfd", "672f815aab828d22b33b6acb5b79231baa9155a5cdf224a189b793ca4346d1d10e167603164e7a13cab5396b78"}, 0x42, 0x2) 21:22:03 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03030000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 21:22:03 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x02', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x17}) 21:22:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) open$dir(&(0x7f0000000040)='./file0\x00', 0x202000, 0x125) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x0) 21:22:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:04 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x03', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:04 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x10001, 0xb06, 0xfc, 0x80000001, 0x3, 0x6, 0x80000000, 0x2bf, 0x38, 0xe7, 0x800, 0x100, 0x20, 0x1, 0x9, 0x5513626e, 0xaea0}, [{0x6474e551, 0x81, 0xfffffffffffffff7, 0xf48d, 0x4, 0x68, 0x7, 0x81}], "", [[], [], [], [], [], [], [], [], []]}, 0x958) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000b00)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000a40)="a2bd7f856a04386a880f8477954933cfb87467baa95d60220803011ba01e9bacf8bcb48abf9beeec874f1f56f128174274641a319dd1027402c909306cdef8408b8dab8cc784a945511ce509e7da5ad0dbe0d559ff573b96d93bc956aa7994175178d6451ce6c75d14cac51a8c392f2dc2d2455b047ac96d8ca2c2146d922e3788996d9363ed915a86a62c64798f5c", 0x8f, r0}, 0x68) 21:22:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:04 executing program 0: umount2(&(0x7f0000000040)='./file0\x00', 0xa) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) pread64(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x0) 21:22:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f00000000c0)="0adced404b5daf1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'veth1_to_bridge\x00', 0x400}) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0xffffffffffffffed) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$VIDIOC_G_TUNER(r2, 0xc054561d, &(0x7f0000000040)={0xecb5, "080176f6a82b57867dd313b1f48fc851f4b39a398be9c30ac273e7423af23731", 0x5, 0x20, 0xa9d1, 0x5, 0x2, 0x0, 0x3, 0x7}) 21:22:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:04 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03080000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 21:22:04 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x04', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:04 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x7}, &(0x7f00000000c0)=0x10) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'system.', '/dev/amidi#\x00'}) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000100)={r1, 0x1800000000000, 0x6c, "2570a3ee54566066dbf59c1ac421c499651ceb30539f2e7f0302079a6434a03db43db04e36a1ea0cb209b30fdf0a177b6677e7a652e73a65dcf4107d48ff3fe8c75050f276c171d637bbf0811952fe52e3fc9f8d6ea6efea4244db5447917bf51334d9907164c223277b9e52"}, 0x74) [ 988.187164][T28703] bridge0: port 2(bridge_slave_1) entered disabled state 21:22:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x18}) 21:22:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x18) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:22:05 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x1, @remote, 0x7}}}, &(0x7f0000000040)=0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r1, 0xffffffffffffffc1}, 0x8) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:05 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2c00) read$rfkill(0xffffffffffffffff, &(0x7f0000000080), 0x8) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x1, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000240)=0x3) rt_sigaction(0x22, &(0x7f00000000c0)={&(0x7f0000000000)="c44209a61e660f38285b00a4c4028da7aa200000000f6e303666430f38402fc442053711f20f120431c40231b92ec4a1d56d11", {0xcb22}, 0x50000004, &(0x7f0000000040)="400f4e91feefffff98c4624daaec0f1ba103000000448648e72e44af66f6d58fe920956109c442110a8cab0d000000660febc7"}, &(0x7f0000000180)={&(0x7f0000000100)="c44189fb6f8ec442f9abf23636f30faec96465f30f516f0bf20f5942132e660fef85d688b6aa660f3833fbc462a9afc6aa2e2ed1dd", {}, 0x0, &(0x7f0000000140)="c4e3ed792c1c7826666644add9f83ef2afc4827d58560067f3f2440f90a10000000044c1f60d42ffe70f69f246dc86fa000000"}, 0x8, &(0x7f00000001c0)) 21:22:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) unlink(&(0x7f0000000100)='./file0\x00') setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc0585604, &(0x7f0000000080)={0x1, 0x0, {0x401, 0x4, 0x300f, 0x7, 0xb, 0x7, 0x3, 0x2}}) 21:22:05 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2c00) read$rfkill(0xffffffffffffffff, &(0x7f00000000c0), 0x8) 21:22:05 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x05', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 988.508155][ T5652] QAT: Invalid ioctl [ 988.549428][ T5655] QAT: Invalid ioctl 21:22:05 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf030c0000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 21:22:05 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) write$FUSE_LK(r0, &(0x7f00000000c0)={0x28, 0xfffffffffffffff5, 0x8, {{0xffffffffeca6a304, 0x400, 0x0, r1}}}, 0x28) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fcntl$setflags(r0, 0x2, 0x1) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x7, 0x181) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000200)={0xffffffff, 0x5, 0x4, 0x81, 0x5, 0x40, 0x61, 0x9, 0xff, 0xd6, 0x5c164af5, 0x2}) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f00000001c0)=0x7ff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="59c56a38c1fcedf3d439df67e2917596b6dbd3802753b4333cb8a72060008d45b5c89ad29df56362562d9cc252fc10133e4faa01c66efa7e35f397531805e3c7caeeb323262335432a9b65a8f151e3ef4a21c933598200bc0434", 0x5a, r1}, 0x68) 21:22:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x19}) 21:22:05 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x06', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:05 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000040)={0xff, 0x401, 0xc8, &(0x7f00000000c0)="2e97a50eb973c2b18673b471012bc837324666e37574fa86991ca2e3d439b327e411a1a256b6292be70449927e666bfce02524fe5829dfd56aa5150f61a321e6afafb188b0f1f253e8e18280d25be9dca7eca8878e0071383b227ecd48843f227c6dd4a072834a2662e32af601d1a73e8e2d51f8b6117a0458145293d3d7e51627415722b3150414cd62a0e796043318e1223b7b5399515c2da65da6c4ab7f752990474d771020a192b28de64b2777bb92df3eb88a0a6df1a1c19ff0b90b0f47cff4571150d2ed4a"}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x50, r1, 0x0, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="14beffa9b4fe8871e759593b89540cdb"}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000340)={0x100}) 21:22:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0xfffffdb5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x201, 0x70bd2c, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44080}, 0x800) 21:22:06 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={0x1, @bcast, @netrom={'nr', 0x0}, 0x5, 'syz0\x00', @bcast, 0x7, 0x1, [@null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x401, 0x1, 0xa, 0x1, 0x100000001, 0x81, 0x8, 0xfff00, 0x0}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r1, &(0x7f0000000200)=0x4) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) ptrace$setsig(0x4203, r2, 0x2, &(0x7f00000002c0)={0x21, 0xff, 0x1000}) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x200}, 0x8) read$rfkill(r0, &(0x7f0000000040), 0x8) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000000c0)=0x6, &(0x7f0000000340)=0x4) 21:22:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000040)) 21:22:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:06 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03100000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 21:22:06 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\a', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:06 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80040}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r1, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000801}, 0x10) fcntl$setstatus(r0, 0x4, 0x2c00) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000040)='/dev/amidi#\x00', 0xc) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1a}) 21:22:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4a, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x801) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f00000002c0)={{0xb32}, 0x1, 0x4, 0x6, {0x6, 0x7}, 0x800, 0xfffffffffffffffe}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) getdents(r2, &(0x7f0000000140)=""/221, 0xdd) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x6) close(r2) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x8001, &(0x7f00000000c0)=0xd1, 0xfffffffffffffffe, 0x4) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000280)={'vlan0\x00', 0x403}) setsockopt$bt_BT_VOICE(r3, 0x112, 0xb, 0x0, 0x638) 21:22:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:06 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffffff, 0x402000) fcntl$setstatus(r0, 0x4, 0x2c20) read$rfkill(r0, &(0x7f0000000080), 0x8) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 21:22:06 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x80) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4004a80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x18, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4801) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:22:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:07 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\t', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 990.477820][ T27] audit: type=1800 audit(1556832127.210:916): pid=5723 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16581 res=0 21:22:07 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:07 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f00000002c0)={"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"}) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xffffffff, 0x8000) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000), 0x4) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f00000006c0)={{0x2, 0x4e22, @multicast2}, {0x1, @local}, 0x0, {0x2, 0x4e21, @empty}, 'syzkaller1\x00'}) fcntl$setstatus(r1, 0x4, 0x40800) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x108, r2, 0x800, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="356e7e9aa77664a73b2d3578cf1ff416"}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @broadcast}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x80, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6d}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x100}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x77}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x108}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 21:22:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:22:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1b}) 21:22:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:07 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\n', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x80003, 0x0) r2 = getuid() ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000140)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r2}) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000240)) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0xc2b, 0x5, 0x1, 0x101}]}) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x7}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={r4, 0xbdbb}, 0x8) fcntl$setpipe(r0, 0x407, 0x8) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r5, 0x112, 0xb, 0x0, 0x638) 21:22:07 executing program 0: r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x2, 0x8000000000001000) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) [ 991.023282][ T5781] QAT: Invalid ioctl 21:22:07 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x0e', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:07 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) gettid() read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:08 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x103000, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000080)={0x3ff, [0x8, 0x3, 0x7, 0xff, 0x8, 0x0, 0xf24, 0x7, 0x401, 0xfffffffffffffff7, 0x800, 0x7f, 0x6, 0xffffffff80000000, 0x101, 0x3ff, 0xf139, 0x7, 0x7, 0x2, 0x805b, 0x0, 0x5, 0xce3, 0x80, 0x9, 0x1000, 0x10000, 0x9e, 0x5, 0xe5, 0x1000, 0x100000000, 0x8, 0x80, 0xe49, 0x40000000000, 0x8001, 0x5, 0x80000001, 0xf2, 0x8, 0x8000, 0x100, 0x6, 0x4, 0x0, 0x5], 0x9}) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0xfffffffffffffd17) 21:22:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:08 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='children\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000300), 0x3b) 21:22:08 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x10', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1c}) 21:22:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040)=0xa6e203b02fbcc840, 0x2) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) 21:22:08 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x595c, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7bb9b971}}, 0x8, 0x100, 0x1000, 0x8001, 0x8}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000180)={r1, @in6={{0xa, 0x1000, 0x4, @mcast2, 0x200000000000000}}, [0xffffffffffffffc1, 0xc76, 0x49ac, 0x1, 0x6, 0x206, 0x5, 0xf06, 0x6, 0x8000000000000000, 0x9, 0x7, 0x7, 0x7f, 0x3]}, &(0x7f0000000280)=0x100) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$KDSETMODE(r0, 0x4b3a, 0x7) 21:22:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:08 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x0) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='setgroups\x00') getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={r1, 0x6, 0x10, 0x3, 0xfff}, &(0x7f00000001c0)=0x18) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0ac61f122c9bec59123fb19bd070bdf5264db02015ed6cea4b0cde986cbe21dbca0e5300eddffd535d3c233d89c69c228109058d1aa447aad10337987c95a81f852576c53b967f68272e447929a8eee8258a36306c5d3fcb52c08e2043ac030eb6f4da3446b598b3d20489590080f2ffffff00001da433b7527eee9639c488dc3fce52e100000000429071cbd31bf31005b6d582a8c38f0c7d702757785577988dc86855788243f005ebc75a10ff200d04") syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 21:22:09 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:09 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2#', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, r2, 0x1, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}]}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7665}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x82}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0xbc}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r3, 0x112, 0xb, 0x0, 0x638) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000240)={0x9, 0x3, 0xfff, 0x1, 0xf953}) 21:22:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1d}) 21:22:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req={0x800, 0x1, 0x0, 0x3}, 0x26c) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0xfffffffffffffdd2) 21:22:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85ffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x2) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:22:09 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0xd00) 21:22:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:09 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs20', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000080)="00000000000000000900083afc86f312b55871720f5340a40d06da7e20b596880508da1978d526762f296eebef439b8dc84956140eae8a6aaa8e52333c7f04d4e8db922e913cd8faa729c7bfa3905f77469e1bed06a49ec8e262bc00"/101) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 21:22:10 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:10 executing program 0: r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x400, 0x0) prctl$PR_GET_FP_MODE(0x2e) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008916, &(0x7f0000000040)="0ae91f123c1225319bd070944fcfe2d487f495b545c26621a42fd02fb2c8a228f22e8b6fa7fa49a537be2d01ceb99d84802493e6a57e6227526fc000c5d69d28c88eeade1e9c6c2ca34d020670fc641862a0e22c72f591bccbf78e195f450e1fc4fbbf8500a871299d0fcc009242bf5c8328261eb61aab27d04e14362c08d9648221570ce18bf3d35cec470a11f35571066a5887e805444e353cb5e37d7c2bed80b9a2fbbab1ee95823441161bc14cca1c3c5e5e34d0c61818bbf83f391792cd6019b009b5679571489767434f072075a180ee88") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0xff6a) 21:22:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1e}) 21:22:10 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2H', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8f00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:10 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x3, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x1, 0x8001, 0x4}, {0x1, 0x0, 0x3ff, 0x140000000000}, {0x240000000000000, 0x3f, 0x9, 0x3}]}) fcntl$setstatus(r0, 0x4, 0x2c00) set_robust_list(&(0x7f0000000240)={&(0x7f0000000180)={&(0x7f0000000140)}, 0x5, &(0x7f0000000200)={&(0x7f00000001c0)}}, 0x18) read$rfkill(r0, &(0x7f0000000080), 0x7c976fa1eea478d3) write$FUSE_POLL(r0, &(0x7f0000000100)={0x18, 0x0, 0x8, {0xc3cc}}, 0x18) 21:22:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0xb4, 0xa0180) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f00000001c0)) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = fcntl$getown(r0, 0x9) capset(&(0x7f0000000140)={0x399f1736, r3}, &(0x7f00000001c0)={0x3, 0x3, 0x100000000, 0x3, 0xf7f7, 0xc3f6}) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r4, 0x80605414, &(0x7f0000000080)=""/154) getpgrp(0xffffffffffffffff) 21:22:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:10 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2L', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:10 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1002, 0x0) fcntl$setstatus(r1, 0x4, 0x2c00) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x800, 0x0) [ 994.081176][ T27] audit: type=1800 audit(1556832130.810:917): pid=5902 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16521 res=0 21:22:11 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:11 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sy\t\x00\x00\x00\x00\x00\x00\x00v4/v{/sync_qlen_max\x00', 0x2, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) 21:22:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9700000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x110}) 21:22:11 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x10000, 0x2, 0x3f, 0x1, 0x0, 0x3, 0x1000, 0x0, 0x8, 0x533, 0x5, 0x0, 0x800, 0xfff, 0x4, 0x0, 0x1, 0x7, 0xffffffffffffffff, 0x0, 0x400, 0x3479, 0x10000, 0x7, 0x846, 0x8, 0x8, 0x7, 0x2, 0x3, 0x4, 0x8001, 0x1, 0x5, 0x6, 0x100000001, 0x0, 0x8000, 0x0, @perf_bp={&(0x7f0000000040), 0xc}, 0x80, 0x3f, 0xd3de, 0x0, 0x9, 0x7fff, 0x1ff}, r0, 0x0, r1, 0x2) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000200)={0x3, 0x0, [{0x0, 0x26, 0x7, 0x7fffffff, 0x6, 0x7, 0x466}, {0x80000019, 0x0, 0x6, 0x1, 0x5, 0x101, 0x200}, {0x0, 0x100000000, 0x7, 0x80, 0x6c9a, 0x2eb5ca97, 0x401}]}) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000180)={{0x3, 0x3, 0x4, 0x1, 0xfffffffffffffff9}, 0x7, 0x7}) fcntl$setstatus(r2, 0x4, 0x2c00) read$rfkill(r1, &(0x7f0000000080), 0x8) clone(0x1008000, &(0x7f0000000280)="c3bd6a22d75de505cc49c39f50edd4e0891e1be936cdff1df5016a0637f8ff3354905cbbc1e3542b9feda6a7a9e8a6fd6b0dede249f69c4d6570dbca067a7bc44f7ca114e4ca51de63b531393e8c88d60e536159290a29a93f61caffd7034418a44c00c62b807520dd41623f504c6324c3e58e744e1ea70f66c0b101e5c0a2d526cea55656c0920c83b13a4dd6244b7e53a435b9fcefaf9b7951d3198b3d42b9d4fc9b9cd610226b351531b28b80a35f888028fca4a547bfead1ae0cfb86834e0c857f45d4c74e4074f4991b77f8c6665923a5de86d8fcb47c819a932c977a8e7fe834a42e1a0ab3e30fb4d65202", &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="a7e97567059fafa1c5ee6bc69b57f3bc2686fc7f81406cfac463e95fb144568f994a07d3669461b9da3f97c2ee1100ee3d8eab6d43a2aed3ad95bed9ffa3ef930e27f473b7ee0782550e3b7c3dc5b14eea1792166faed60c44782c5a4ef6fa8a7c22f0e107234d781b33c5cfc8d3ebb28c65f07e0238bdfcef8296b1cea8bec6bde96d9dcc48a19f4b9b470eed5bde87b82c1fd4b8af9ccb8298989da97152dfeee9d5bb42a0a0ddfaf36e23cc3c7921") 21:22:11 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2`', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) ioctl$VIDIOC_ENUMINPUT(r2, 0xc050561a, &(0x7f0000000100)={0x8001, "de2ea06b726d8cb31ba693a61512d376b98b674ba71279d7f7e073ac6bab1800", 0x0, 0x0, 0x4, 0x200b000, 0x4, 0x8}) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, r3}) prctl$PR_MCE_KILL(0x21, 0x0, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:22:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000080)=@fragment={0x849e836414f69381, 0x0, 0x72, 0xfffffffffffffffc, 0x0, 0xfff, 0x65}, 0x8) 21:22:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9cffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:11 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2h', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:11 executing program 0: r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x117}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r1, 0x1}}, 0x18) [ 994.763237][ T27] audit: type=1800 audit(1556832131.500:918): pid=5929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16583 res=0 21:22:12 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x111}) 21:22:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9f00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f00000000c0)={0x0, 0x8001, 0xca, &(0x7f0000000080)=0x6}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x638) 21:22:12 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x10002) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:12 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2l', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9fffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:12 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) read$rfkill(r0, &(0x7f0000000080), 0xffffffffffffffc2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000180)={{0x5, 0x0, 0xfffffffffffffffb, 0x2, 'syz0\x00', 0x7}, 0x4, 0x20, 0x200, r2, 0x3, 0x4000000000, 'syz0\x00', &(0x7f0000000100)=['/dev/amidi#\x00', '%wlan1,em1vmnet0\x00', '!wlan1*)^+em0system@self&em0#]vmnet1*vmnet0cgroup\x00'], 0x4f, [], [0x3, 0x1, 0xffff, 0x2]}) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x2) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0xffff, 0x4}) 21:22:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x2) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000080), 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) 21:22:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:12 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000040)) [ 995.641638][ T27] audit: type=1800 audit(1556832132.370:919): pid=5984 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17025 res=0 21:22:12 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:12 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2t', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:12 executing program 0: r0 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x1, 0x408001) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000040), 0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x5, 0x7, 0x4, 0x4, 0x7}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={r1, 0x98ca, 0x10, 0x8, 0x7fff}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={r2, 0x9, 0x1}, 0x8) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000180)) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r2, 0x1}, 0x8) 21:22:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x120}) 21:22:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="433107123fde15365d8a9a751c575e38c370") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@broadcast, @remote, @broadcast}, &(0x7f0000000080)=0xc) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000000)={0x2, 0x1ff}, 0x2) fchmod(r0, 0x956debc40b9eb23d) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) socket$nl_generic(0x10, 0x3, 0x10) 21:22:13 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) chroot(&(0x7f0000000100)='./file0/../file0\x00') ioctl(r0, 0x100000890e, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f0000000140)={0x200000000000, 0xa38c}) 21:22:13 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x40c00) read$rfkill(r0, &(0x7f0000000040), 0x8) [ 996.366692][ T6031] Unknown ioctl -1073195492 21:22:13 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x80000) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x40}) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x800, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000100)={r2, 0x80000, r3}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r4, 0x112, 0xb, 0x0, 0x638) 21:22:13 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2z', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:13 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:13 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 21:22:13 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xaf00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0xfffffffffffffe89) 21:22:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x300}) 21:22:13 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xa0', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:13 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfa00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101000, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000080)=""/167) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:22:14 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) 21:22:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:14 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x0f', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:14 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x801) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:14 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x88200) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080)={0x9}, 0x4) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) 21:22:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:14 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)=0xffffffffffff0b33) fcntl$setstatus(r0, 0x4, 0x2c00) r1 = fcntl$getown(r0, 0x9) setpriority(0x0, r1, 0xfffffffffffffffc) read$rfkill(r0, &(0x7f0000000040), 0x8) 21:22:14 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x1a', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x500}) 21:22:14 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x9a62, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f00000000c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r1, 0x4, 0x2c00) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'tunl0\x00', 0x0}) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000200)={@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, r2}, 0xc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000180)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0xd0, r3, 0x0, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x800}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1ff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3ff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x242c}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000844) read$rfkill(r1, &(0x7f0000000080), 0x8) 21:22:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:14 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000080)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) r3 = getgid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={r1, r2, r3}, 0xc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r5, 0x112, 0xb, 0x0, 0x638) 21:22:15 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80000, 0x0) read$rfkill(r0, &(0x7f0000000080), 0x8) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 21:22:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x7c, r2, 0x300, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x273}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x98}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xed}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3f}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0xc000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000580)={0x0, 0x21, "38da2fc6c6da6600535d955b44bd6334853d574a606fa0dea15649c34678e30d1b"}, &(0x7f00000005c0)=0x29) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000600)={r4, 0xff, 0x6, 0x7}, 0x10) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$sock_buf(r0, 0x1, 0x37, &(0x7f0000000040)=""/193, &(0x7f0000000140)=0xc1) setsockopt$bt_BT_VOICE(r5, 0x112, 0xb, 0x0, 0x638) 21:22:15 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:15 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xfe', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x0, 0x1, 0x9000000000000, [], &(0x7f0000000040)=0xff}) 21:22:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:15 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x1) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x600}) 21:22:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x121041, 0x0) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000100)=0x1, 0x4) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x2}) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) fremovexattr(r0, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 21:22:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 999.109051][ T6156] QAT: Invalid ioctl [ 999.149795][ T6159] QAT: Invalid ioctl 21:22:15 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:16 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x400, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000100)={0x1, 0x20, 0x9, 0xc8}) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x58) [ 999.426985][ T6170] gfs2: not a GFS2 filesystem 21:22:16 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:16 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xffffffffffffffff, 0x1) fcntl$setstatus(r0, 0x4, 0x100002c00) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f00000000c0)=0x10) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:16 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioperm(0x80000000, 0x10000, 0x2f) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) 21:22:16 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xca', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x700}) 21:22:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0xb0e) 21:22:16 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) accept4(r0, &(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x80, 0x800) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f00000000c0)={0x7ff, 0xcdc3}) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x8}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000080)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x8000, 0x0) bind$vsock_stream(r2, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @hyper}, 0x10) 21:22:16 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000040), &(0x7f00000000c0)=0x4) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) bind$rxrpc(r0, &(0x7f0000000100)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e21, 0x0, @rand_addr="3df6b3185d924087df651f48b7b6877a", 0x5ea}}, 0x24) 21:22:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:17 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:17 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:17 executing program 0: r0 = socket(0xb, 0x6, 0x3) getsockopt$inet6_dccp_buf(r0, 0x21, 0xd, &(0x7f0000004980), &(0x7f00000049c0)) r1 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x2, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x1) fcntl$setstatus(r1, 0x4, 0x2c00) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x10) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r2, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) sched_setattr(r3, &(0x7f0000000200)={0x30, 0x2, 0x1, 0x4, 0x7, 0x4, 0x9, 0x2}, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)={r2, 0x1bc0, 0x1000, r1}) read$rfkill(r1, &(0x7f0000000080), 0x8) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000140)) write$FUSE_POLL(r2, &(0x7f0000000100)={0x18, 0x0, 0x2, {0x1}}, 0x18) 21:22:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xc}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x52e) r2 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) 21:22:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x900}) 21:22:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0xfffffffffffffd64) 21:22:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xe}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:17 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8040000000000002, 0x121000) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) [ 1000.920474][ T6232] gfs2: not a GFS2 filesystem 21:22:17 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f00000000c0)={0xa, 0x0, [{0xb9f, 0x0, 0x921}, {0x40000073, 0x0, 0x6}, {0x32f, 0x0, 0x4}, {0xc0010a5f, 0x0, 0x6}, {0xa14, 0x0, 0x6}, {0x339, 0x0, 0x7}, {0x0, 0x0, 0xffffffff}, {0xfff, 0x0, 0x41}, {0x2fd, 0x0, 0x81}, {0x937, 0x0, 0x1}]}) 21:22:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xf}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = syz_open_dev$mouse(&(0x7f0000000680)='/dev/input/mouse#\x00', 0x8, 0x100) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000007c0)) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f00000006c0)=0x7, &(0x7f0000000700)=0x4) acct(&(0x7f0000000780)='./file0\x00') setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) pwritev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="34f0b8d7fe5a10576cd11f4495ef28acb19a125a68729867d41f456e319a56657c60233923d2da37bc53c488897ecaaa0f1ce1fe1a120570a47f6d2b1ef4cae597df443a05a7ff07ee5b42282be48d372137bfc25c0d0fe06f69fed9472bec0d19209ef5d118946146bb5c1326cb60143bac6dc428cbde5efb093641baddab96b3c842ac9ffe0e1d7622af743d8d00f307e6ae4e2327c019e7c519ce84b9dd9925aa3da39e2c556878cbde86f4ced54ae47525a320610264fa21c022499b7a7aa66183ad907b6295a968e5d6bee3e86c7812a7ff5e63113d3cd286a88dfb14400dec62", 0xe3}, {&(0x7f0000000140)="68ef6b200f1a04c11d5fc7a076f1690f3d670a3f1a9682c81d7f80e9067e77c4889a48d8f3b7e8204b781a58e60bafe597750a5f0625dc85ad02761030827b92ff7cde3b498271c62ac6be215f5ee28014554f3c091f44ce9195ddff76f4f9339cedc3e175eb26e663cb928c97bdb8571c24a3e5344da3fdc0de7281c0ca3b8b392fb1e3501a3dd74cd7f1ac6d159a779d3619928584a2c2db51ed04a3fc20d0eed8be67ec7e54bfbcb347092e6277d4e028226172ddb5fcbf20f5fc645db4747447b13af451", 0xc6}, {&(0x7f0000000240)="09dacfc9b094ea0eef643fbb4474f4211e2b0b886c075d24306a7515c367e0fbe528f7bcc558796c48edd3440336d24978d203ef55dd6a2f68c5b33b23ee7470a53bce136de9ac09b40f4c4b6890338d76f8e6ee097eef1fd6cbc47501b2e3ab4126878e5253081787a1c8edc901892cfca3954910a963e84ee24569", 0x7c}, {&(0x7f00000002c0)="cfb2f20f212f3f8be497da6e63932967981a610e5b249009e663abbf77cb50a5bc3d7547fdb61c3ec375b7becd83d869c997bc4b649518c9ae88f5c329c93dcba9727985dc283dd3f20e4ef75181b4933dc83815e591e874ae598a", 0x5b}, {&(0x7f0000000340)="026d6ceb6dce02bd0f264093572c", 0xe}, {&(0x7f0000000380)="1ea453928c43330976dcce8465899dc24333e158b5bfc06ac455e3b0af133c7daa45952978c49bc8284b55aac152e110d5095dca98d0b038e6bb2039a0b7d0a01376afae6aa45cc46696e36b9c48819136c5505e8052127d9d83172dde82c0ddcb0d95507871b2993e14827fedd23f37667d", 0x72}, {&(0x7f0000000400)="8a0f6b80531af88ce7bf9d2d5d51a3aa351fceb69ec0ef869facade9f6", 0x1d}, {&(0x7f0000000440)="95a773bba0252168eef6b2aa9cdc9e559b8af6a87b4fb8ea88685546c75fbad7ffc534cd70f0a3c555f9936d243d277cc5747ba5d90c4eab76b5a423e1e3efa256147bb03eb9e8fce805", 0x4a}, {&(0x7f00000004c0)="2083a90757bb3c50d1499879c348de5afce99773c711fccafd9693fc5edc94024aeae4c3fcf1ac130374cd17baf1d6ea37e02a49fb8a269a80b3b8b22c9a8321a6631880fa4ca4f307c701c95014c9823742978e5e12655f65e73045f5a3eb26f6616e95f18127be7a88261f0b8f5dc7beb8dccd1b30a48eb944dd7afd7d5057ba4dc2de0687f1e53451223040f859d5e8641a28069ca82d79c13a3247345984a87d738a926c90b1be900d4f4fa099138549606f8d983bfe8b94338ad57ef661c8a8fea07211a32365d85c8cdc6a", 0xce}], 0x9, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000740)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$FUSE_OPEN(r2, &(0x7f00000008c0)={0x20, 0x0, 0x4, {0x0, 0x1}}, 0x20) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000900)=0x0) ioprio_set$pid(0x3, r3, 0x20) accept$netrom(r0, &(0x7f0000000800)={{0x3, @null}, [@null, @default, @bcast, @rose, @rose, @remote, @rose, @rose]}, &(0x7f0000000880)=0x48) 21:22:18 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:18 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:18 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f00000000c0)={0x8000, 0x9, 0x5}) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x10001, 0x202) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000140)) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$VIDIOC_S_INPUT(r3, 0xc0045627, &(0x7f0000000000)=0x1f) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 21:22:18 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f00000000c0)={r1, 0x35}) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x10}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xa00}) 21:22:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x14}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e22, 0x800, @dev={0xfe, 0x80, [], 0x1b}, 0xcb05}, @in6={0xa, 0x4e24, 0x18, @rand_addr="04f1c54317aab676e404c1d21d686223", 0x3a52}, @in6={0xa, 0x4e23, 0x5, @loopback, 0x401}, @in={0x2, 0x4e21, @loopback}], 0x64) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x118, r3, 0x0, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}]}, @TIPC_NLA_BEARER={0x78, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x0, @loopback, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e22, @local}}}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'ip6gretap0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xd2}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x4000}, 0x400c095) 21:22:18 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) utime(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x8001, 0x7}) read$rfkill(r0, &(0x7f0000000080), 0x8) [ 1001.707465][ T6268] gfs2: not a GFS2 filesystem 21:22:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:18 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x400, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000340)='./file0\x00', r0}, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r1, 0x4, 0x2c00) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x81, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x80000001}, 0x0, 0x0, &(0x7f0000000140)={0x10001, 0x2, 0x1000, 0xf0e}, &(0x7f0000000180)=0xb77e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x5}}, 0x10) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000300)) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r1, 0x4, 0x3, r1}) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000400)=0xffffffffffffffff) 21:22:18 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 1001.912726][ T27] audit: type=1800 audit(1556832138.650:920): pid=6260 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16534 res=0 [ 1002.074285][ T6291] gfs2: not a GFS2 filesystem 21:22:19 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40000, 0x0) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0x88a) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:22:19 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x0) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xb00}) [ 1002.493265][ T6269] cgroup: fork rejected by pids controller in /syz5 21:22:19 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 1002.628846][ T6405] Unknown ioctl 1074294798 21:22:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x24}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1002.699854][ T6413] Unknown ioctl 1074294798 [ 1002.709360][ T6410] gfs2: not a GFS2 filesystem 21:22:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x28}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000100)={0x0, {0x31d6, 0xfd9}}) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x6, 0x0, 0x0, 0x0, 0x0, 0xff, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x9, 0x9, 0x0, 0x7994, 0x0, 0x4e17, 0x10000040, 0x5, 0x7, 0x5, 0x18, 0x80, 0x5, 0x0, 0x0, 0xb788, 0x0, 0x0, 0x0, 0x6968, 0x9, 0x0, 0x3, 0x1f, 0x8, 0x800, 0x8, 0x6c00000000000, 0x3, 0x0, 0x82, 0x0, 0x200003ff, 0x3bb1, 0x9, 0x10000, 0x0, 0x7fffffff, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0x10000000000, 0xd, 0x9, 0x9, 0x5}, 0x0, 0x2, r1, 0x8) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x3ffe, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f0000000040)="14bf76aa", 0x4}], 0x1) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)=0x3, 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(r3, &(0x7f0000000400), 0x12) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r5, 0x112, 0xb, 0x0, 0x638) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000240)={0x0, 0x244, {0x57, 0x489c, 0x0, {0x3f, 0x200}, {0x8, 0xdcb}, @const={0x400, {0x2, 0x100000001, 0x8001, 0xffff}}}, {0x57, 0x2, 0x401, {0xfff, 0x40}, {0x3ff, 0x5}, @cond=[{0x0, 0x6, 0x200, 0x800000000000000, 0x4, 0x5}, {0x80000000, 0x200, 0x7cc, 0x80000000, 0x726, 0x1}]}}) 21:22:19 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x2) ioctl$TIOCSTI(r1, 0x5412, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) [ 1003.079741][ T6428] gfs2: not a GFS2 filesystem 21:22:20 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x30}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$KDENABIO(r1, 0x4b36) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) 21:22:20 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xc00}) 21:22:20 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x2) fcntl$setstatus(r0, 0x4, 0x2c00) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/uts\x00') read$rfkill(r0, &(0x7f0000000100), 0x8) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="20000000303db35f8f8844ee0e", @ANYRES16=r2, @ANYBLOB="000128bd7000fddbdf25110000000c0006000800010008000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 21:22:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8001, 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0x9) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0xfd83) 21:22:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x43}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1003.632454][ T6549] gfs2: not a GFS2 filesystem 21:22:20 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200082, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0xff, 0x3, 0xb7a, 0x3, 0x8}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0xe0, 0x6, 0x202, 0x9, 0x7f, 0x0, 0x7, 0xffd, r1}, &(0x7f0000000200)=0x20) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1002, 0x100) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000240)=0x8, 0x4) fcntl$setstatus(r2, 0x4, 0x2c00) read$rfkill(r2, &(0x7f0000000080), 0x8) 21:22:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$radio(&(0x7f00000011c0)='/dev/radio#\x00', 0x2, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000001200)=[@in6={0xa, 0x4e23, 0x2, @mcast1, 0xb9}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e23, 0x200, @ipv4={[], [], @rand_addr=0x7}, 0x8001}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, @in={0x2, 0x4e24, @remote}], 0x84) ioctl(r0, 0x2, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) 21:22:20 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x01', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:21 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf0313fa00c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 21:22:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x44}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:21 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:21 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1000, 0x1018, 0x9, {"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"}}, {0x0, "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"}}, &(0x7f0000001180)=""/206, 0x1114, 0xce}, 0x20) r1 = getpid() fcntl$setownex(r0, 0xf, &(0x7f00000012c0)={0x2, r1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x9, &(0x7f0000000000)="0adc1f124c123f319b98703e2abaa572a0f1f78793cd02a0ff1f1be4ba2d89a82b10163e544c5d2fe9a3763e7143e0759995dcd36c") r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r3, 0x112, 0xb, 0x0, 0x638) 21:22:21 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\"', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xd00}) 21:22:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x48}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:21 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x4040, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000140)={0xd545, 0xd27, 0xfffffffffffffffb, 0x1}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f00000001c0)={0x7, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000200)={r4, 0x3}) setsockopt$bt_BT_VOICE(r3, 0x112, 0xb, 0x0, 0x638) 21:22:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4b}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) 21:22:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xe00}) 21:22:22 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:22 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2 ', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4f}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:22 executing program 0: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r0 = syz_open_dev$dmmidi(&(0x7f0000001100)='/dev/dmmidi#\x00', 0x2, 0x20000) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000001140)=0x10f000) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40, 0x0) write$binfmt_misc(r1, &(0x7f00000000c0)={'syz0', "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"}, 0x1004) r2 = syz_open_dev$amidi(&(0x7f0000001180)='/dev/amidi#\x00', 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2c00) read$rfkill(r2, &(0x7f0000000080), 0x8) 21:22:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40040, 0x0) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000100)={0x2, 0x8, 0x7, 0x200, 0xffff, 0x7}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0xb7, "235f2f928ee91efa8b446ba0e59e63cf7887a3e6252f64a82d86aceb6f4a3dc0ef4a16c3eec3d4c2016265387e3aaf34017229ee4538bf1fdc4b88f50ce75952cb7b2c58a5f202665aba2622f6b24dff952625b0a4865172bc356cffac1a40b1502d4f3b10d0eebc1837b3101c1ffe4497c7f3c1c2b8265bd4a2613a0eaaaf5efb3b02ca036af1989615898fd56a100dafb05ac4827f2acf472bcc530606df64c2a9b93b7bcab090766a9f377a7dde35882023f6f90813"}, &(0x7f0000000200)=0xbf) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000240)={r3, 0x1}, &(0x7f0000000280)=0x8) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10000, 0x0) ioctl$SIOCGIFHWADDR(r4, 0x8927, &(0x7f0000000080)) 21:22:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xf00}) 21:22:22 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f0000000100)=0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0xfffffffffffffeca, 0xfffffffffffffffa) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) 21:22:22 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x280600, 0x0) signalfd(r0, &(0x7f00000000c0)={0x1}, 0x8) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x8000) openat(r1, &(0x7f0000000140)='./file0\x00', 0x0, 0x8) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xdaa, 0x0) r3 = socket(0x10, 0x3, 0x0) readv(r3, &(0x7f0000000080)=[{&(0x7f0000000300)=""/145, 0x91}], 0x1) write(r3, &(0x7f000018efdc)="1400000052001f0214f9f4070009040081000710", 0x14) recvfrom$rose(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$x25(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2c00) read$rfkill(r2, &(0x7f0000000080), 0x8) 21:22:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x50}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:22 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x400400, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f00000001c0)={0x7, 0x7, 0x36, "de6ed78a18308c3c01ee5da52a34fd7552976921873f1248d0b3a39ddab9baa066d47f11c16b5b8a4e3ec44584825de80544c08eade8a86062c2b341", 0xe, "130b0d7a1bd9380689c22e8cbd0154aea1499aeba1304feb5411d88bcc5dd7f173a6058c74453c23bf8b9e0092155d0752659d1d5afbaf4e147bc0f2", 0xc8}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+', 0x1480}, 0x28, 0x3) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000280)) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000140)={0x8, 0x200, 0x6, 0x7, 0x8}, 0x14) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x0) socket$inet(0x2, 0x0, 0x5ef9) 21:22:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x53}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:22 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x02', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:23 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:23 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r1, 0x4, 0x2c00) read$rfkill(r1, &(0x7f0000000080), 0x8) 21:22:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @aes256, 0x3, "834345ba29ccf5b9"}) 21:22:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x54}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:23 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1001}) 21:22:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x58}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:23 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r1, 0x810, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x21e}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40080}, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r0}) read$rfkill(r0, &(0x7f0000000080), 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x2002}) 21:22:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) [ 1006.594871][ T6972] gfs2: not a GFS2 filesystem 21:22:23 executing program 0: r0 = epoll_create(0x3ff) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x6, 0x4d0100) sendfile(r0, r1, &(0x7f0000000180), 0x7) r2 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x2, 0x94000) sendmsg$inet_sctp(r2, &(0x7f0000000380)={&(0x7f00000001c0)=@in6={0xa, 0x4e20, 0xd964, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x3}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="b4a16744ee4c7cc776d39ad20216bad846c3d7421b695bf81ee5c5ed71e11f59b2bf2edea867867d5ad834fa2e9bbd9a28a326ae1e0a0ef4cae31f17429e1d5a0ca6d3c76daa09ed938b0ce18058fd2b8b2a009b57f918831112c1ddd302082c3e53983977217564155aba10b0c6995ba30fec3fc8cc120a47a163a2762fcc2e7de803905fb27d164022c8e16cb17cb0b02b34097e0d62e26ef3174efc7f9d387fde42cd", 0xa4}], 0x1, &(0x7f0000000300)=[@dstaddrv6={0x20, 0x84, 0x8, @local}, @init={0x18, 0x84, 0x0, {0x7, 0x8, 0x6, 0x1}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x252}}, @authinfo={0x18, 0x84, 0x6, {0x80}}], 0x68, 0x40408d0}, 0x8000) fcntl$setstatus(r2, 0x4, 0x2c00) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'bond_slave_0\x00', 0x1110}) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) read$rfkill(r2, &(0x7f0000000080), 0xfffffd29) 21:22:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="75453915926c0ab5c3704430019cc62d7b3471a419165d135a3ff6099a8434847013bd397dcd2befc1cc41a85cff32f46d1df6bf2e79f33dc3e87920f3") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) 21:22:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:24 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:24 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) geteuid() r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x721, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x5ddd}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:24 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x60}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:24 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x100) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) 21:22:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1100}) 21:22:24 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x5, 0x4) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xc82, 0x0) 21:22:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000180)="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", 0x10f) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, 0x0, 0x638) 21:22:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x61}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1007.477017][ T7111] gfs2: not a GFS2 filesystem 21:22:24 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000001380)) read$rfkill(r0, &(0x7f0000000080), 0x8) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000040)={0x1000, &(0x7f00000000c0)=""/4096}) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000012c0)='trusted.overlay.origin\x00', &(0x7f0000001300)='y\x00', 0x2, 0x2) sendmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f00000010c0)="6479df8104dbb315d6f155f290592b044e863afa4eb10c49cdb7fdc8540d8679dc339f7f50963bddbb9b5a54ccf1f6756749e5a767cd2d0a4fd64d2bd7327c04a92c5e8d2ba580cb28ea57ed92e3d95fa139354d4a7e438c9a36d854e3c8cfec1b40c12811cec68d3944128bd7d9c2cdbf5f15dd2edbc4a884f94ba18cd5c1b47fdbb518b8e5dc0060273c701aa1cd8ce23ba48ec4c23438bd98860fb996f9b411039ad21f2141505d41bec2d8a27f088e48d64cbc6b617df2ef1e9c0ed0e4dddfca8a2b6967c9bbee5af393daa8d9208c752776009a7e8ea02ecb3b4967f1682740bce1dcfdb7d8a28d7424d8814d1dbb672bd1", 0xf4}, {&(0x7f00000011c0)="8b96aae282fdeae1fddb2f041825aa4fc6e0183536a7ce390bf66da51ed49d142b364b566a4d4b69dccae7e2de093bf0d415dfc24469b8b0fca8a9611d6854269b9039b29a7695d26226e3fa96d29bd7ac17b2b9bb1eef8179844765de6b6d734e69c933e9e3cbf3515af0f7422070ebb09027098fe92f4acfbd", 0x7a}, {&(0x7f0000001240)="6141f7613aa18deb", 0x8}], 0x3, &(0x7f00000013c0)=ANY=[@ANYBLOB="18000000000000009f0100000000001da9b000000000000020000000000000008e0000003f000010edc2fcf97134e526be41847e16000000280000000000000015010000feffffff731ec8c8524eb5a0e55e81c942cdc9ba7b26239b5b88ec00f97589c1c9cb4e483bb6e23b5c612841ee0d91f437f912924e54822eedbda7ede2bde51894d8b3f1afbfd6959fc5304dc1550c182256798fd9baae11bdbad5bc7917bc886287d7ebfd831fb8e6c3d36f5370"], 0x60}, 0x1) 21:22:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x63}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:24 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x10', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:25 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:25 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400000, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x20}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, 0x0, 0x638) 21:22:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x64}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:25 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x400) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000040)) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000000c0)={0x4, 0x14, 0x6, 0x68, "6fa827025d9c559e9d1fb3fd95f55adc585baa6d7c1c9215a4c4ea657a084235"}) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:25 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x0f', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1101}) 21:22:25 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, 0x638) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x10000, 0x600200) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000080)={0xc025, 0x2}) 21:22:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x68}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x80, 0x0) sendmsg$nl_crypto(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@delrng={0x10, 0x14, 0x23, 0x70bd2a, 0x25dfdbff, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x24008054}, 0x4040000) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000080)=0x1, 0x4) r2 = openat$cgroup_ro(r1, &(0x7f0000000180)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r2, 0xc0044306, &(0x7f00000001c0)=0x3) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000002c0)={{0x10001, 0x4}, 'port1\x00', 0x7, 0x1406, 0x20, 0x3, 0x11f, 0x1, 0xffffffffffffff86, 0x0, 0x2}) signalfd4(r0, &(0x7f0000000140)={0x1ff}, 0x8, 0x80800) setsockopt$bt_BT_VOICE(r3, 0x112, 0xb, 0x0, 0x638) syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x5, 0x0) fstatfs(r1, &(0x7f00000003c0)=""/157) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x42, 0x10000, 0x29ff, 0xd98, 0x6}) 21:22:25 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x70}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1008.743792][ T7271] gfs2: not a GFS2 filesystem 21:22:25 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x71}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:25 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x280600, 0x0) signalfd(r0, &(0x7f00000000c0)={0x1}, 0x8) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x8000) openat(r1, &(0x7f0000000140)='./file0\x00', 0x0, 0x8) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xdaa, 0x0) r3 = socket(0x10, 0x3, 0x0) readv(r3, &(0x7f0000000080)=[{&(0x7f0000000300)=""/145, 0x91}], 0x1) write(r3, &(0x7f000018efdc)="1400000052001f0214f9f4070009040081000710", 0x14) recvfrom$rose(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$x25(r3, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2c00) read$rfkill(r2, &(0x7f0000000080), 0x8) 21:22:25 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:25 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x9db, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x5add068108f6f301) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000000)) [ 1009.356795][ T7391] gfs2: not a GFS2 filesystem 21:22:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1200}) 21:22:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x73}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:26 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x20, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xe00}) 21:22:26 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:26 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) ioctl$FICLONE(r0, 0x40049409, r0) 21:22:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x74}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1009.705791][ T7409] gfs2: not a GFS2 filesystem 21:22:26 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7a}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:26 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f00000000c0), 0xffffffc8) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:26 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:27 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c03) read$rfkill(r0, &(0x7f0000000080), 0x8) fsetxattr(r0, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00', &(0x7f00000000c0)='trusted\x00', 0x8, 0x0) [ 1010.360115][ T7524] gfs2: not a GFS2 filesystem 21:22:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1300}) 21:22:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x83}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:27 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xb718, 0x200000) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000180)={{&(0x7f00000000c0)=""/84, 0x54}, &(0x7f0000000140), 0x3}, 0x20) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) sysfs$1(0x1, &(0x7f0000000080)='/dev/amidi#\x00') read$rfkill(r1, &(0x7f00000001c0), 0x8) 21:22:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xb00}) 21:22:27 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x84}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x88}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1010.735605][ T7544] gfs2: not a GFS2 filesystem 21:22:27 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03004e00c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 21:22:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x8c}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:27 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1400}) 21:22:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x8f}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x500}) [ 1011.342251][ T7662] gfs2: not a GFS2 filesystem 21:22:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x90}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:28 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100)={0x2, [0xfff, 0x6]}, &(0x7f0000000140)=0x8) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0xf9a0000, 0x485, 0x4, [], &(0x7f0000000040)={0x0, 0x1ff}}) fcntl$addseals(r0, 0x409, 0xa) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:28 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x97}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:28 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) r1 = msgget$private(0x0, 0x40) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x1ff, 0x855}, &(0x7f00000000c0)=0x10) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000180)={0x7, 0x200, 0xff, 0xfffffffffffffe01}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r2, 0x2}, &(0x7f0000000140)=0x8) msgctl$IPC_RMID(r1, 0x0) 21:22:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x98}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1011.694113][ T7681] gfs2: not a GFS2 filesystem 21:22:28 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03005c01c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 21:22:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x300}) 21:22:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x8406, 0x2000000080207) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000100)={&(0x7f00000000c0)=[0xfff, 0x0, 0x0, 0x7f, 0x1, 0x4, 0x4, 0x7, 0xd7], 0x9, 0x20, 0x100, 0x100000000, 0xb41, 0xf669, {0x1, 0x3e, 0x2, 0x8, 0x10000, 0xc4c, 0x3, 0x2, 0x7020, 0x8000, 0x1, 0xebd6, 0x0, 0x5, "83a85a34d48723c17a59d314f5ed49730f36c129da9e4bd2d34a9d8f7ea1e26c"}}) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x2c00) read$rfkill(r2, &(0x7f0000000080), 0x8) 21:22:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9f}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:28 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1500}) 21:22:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa0}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1012.253383][ T7803] gfs2: not a GFS2 filesystem 21:22:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa3}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:29 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa4}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1012.649645][ T7817] gfs2: not a GFS2 filesystem 21:22:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa8}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:29 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 1013.035395][ T7829] gfs2: not a GFS2 filesystem 21:22:29 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:29 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1002, 0x0) fcntl$setstatus(r1, 0x4, 0x2c00) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x800, 0x0) 21:22:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xaf}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:29 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x101, 0xb9fb}, {0x9, 0x83d4}]}, 0x14, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000a00)={@multicast1, @dev, 0x0}, &(0x7f0000000a40)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000a80)={'veth1_to_team\x00', r1}) fcntl$setstatus(r0, 0x4, 0x42000) 21:22:29 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)=0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x410000, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x80000001, 0xa3e, 0x8, 0x10000, 0x0, 0x20, 0x1000, 0x1, 0xffff, 0x11, 0x2, 0x5, 0x81, 0x8001, 0x6, 0x2b4, 0xdff, 0x8, 0x5, 0x0, 0x8001, 0x5, 0x7f, 0x8, 0x0, 0x7, 0x2, 0x8, 0x0, 0x4, 0x8001, 0x1f, 0x1, 0x101, 0x401, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000040)}, 0x10000, 0xd7, 0xbc, 0xb, 0x3f, 0x3, 0x9}, r0, 0x10, r1, 0x9) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x2c00) read$rfkill(r2, &(0x7f0000000080), 0x8) 21:22:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1600}) 21:22:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xfa}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:29 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1a}) 21:22:29 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) read$rfkill(r0, &(0x7f0000000080), 0x8) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000100)) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@loopback, @remote, 0x1}, 0x10) 21:22:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:30 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x112f1a14, 0x80040) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x7c, r1, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x81}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7e2f}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40010}, 0x4001) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x2c00) read$rfkill(r2, &(0x7f0000000080), 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) [ 1013.361799][ T7966] gfs2: not a GFS2 filesystem 21:22:30 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x500}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:30 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1700}) 21:22:30 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f00000000c0)={0x1, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x600}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:30 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f00000000c0)={0x1, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) read$rfkill(r0, &(0x7f0000000080), 0x8) [ 1014.104070][ T8121] gfs2: not a GFS2 filesystem 21:22:31 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x03', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 1014.265727][ T8131] binder: BINDER_SET_CONTEXT_MGR already set [ 1014.292113][ T8131] binder: 8130:8131 ioctl 40046207 0 returned -16 21:22:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x700}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1014.300081][ T27] audit: type=1800 audit(1556832151.030:921): pid=8114 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16705 res=0 21:22:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1800}) 21:22:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xc00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:31 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xc0', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xe00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1014.952127][ T5] binder: release 8125:8126 transaction 9 out, still active [ 1015.006208][T28703] binder: send failed reply for transaction 9, target dead [ 1015.037853][T28703] binder: send failed reply for transaction 12 to 8130:8138 21:22:31 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xf00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:31 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x02', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:31 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f00000000c0)={0x1, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) read$rfkill(r0, &(0x7f0000000080), 0x8) 21:22:31 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f00000000c0)={0x1, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) read$rfkill(r0, &(0x7f0000000080), 0x8) [ 1015.057963][T28703] binder: undelivered TRANSACTION_ERROR: 29189 21:22:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1018}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1015.226886][ T8277] binder: BINDER_SET_CONTEXT_MGR already set [ 1015.250286][ T8277] binder: 8270:8277 ioctl 40046207 0 returned -16 21:22:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1900}) 21:22:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:32 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1015.465256][ T8291] gfs2: not a GFS2 filesystem 21:22:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1810}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:32 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 1015.764875][ T8302] gfs2: not a GFS2 filesystem [ 1015.917507][ T5] binder: release 8263:8269 transaction 16 out, still active [ 1015.972112][ T5] binder: release 8270:8277 transaction 19 out, still active [ 1016.010004][ T5] binder: send failed reply for transaction 16, target dead [ 1016.049322][ T5] binder: send failed reply for transaction 19, target dead 21:22:32 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r1, 0x3, 0x1, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 21:22:32 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:32 executing program 3 (fault-call:4 fault-nth:0): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1a00}) 21:22:33 executing program 0 (fault-call:6 fault-nth:0): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) [ 1016.285492][ T8418] gfs2: not a GFS2 filesystem 21:22:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1016.443895][ T8429] FAULT_INJECTION: forcing a failure. [ 1016.443895][ T8429] name failslab, interval 1, probability 0, space 0, times 0 [ 1016.457532][ T8429] CPU: 0 PID: 8429 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #97 [ 1016.465692][ T8429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1016.475904][ T8429] Call Trace: [ 1016.479281][ T8429] dump_stack+0x172/0x1f0 [ 1016.483705][ T8429] should_fail.cold+0xa/0x15 [ 1016.488656][ T8429] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1016.494630][ T8429] ? __sigqueue_alloc+0x173/0x4d0 [ 1016.499725][ T8429] ? find_held_lock+0x35/0x130 [ 1016.504566][ T8429] __should_failslab+0x121/0x190 [ 1016.509555][ T8429] should_failslab+0x9/0x14 [ 1016.514103][ T8429] kmem_cache_alloc+0x47/0x6f0 [ 1016.518906][ T8429] ? kasan_check_read+0x11/0x20 [ 1016.523800][ T8429] __sigqueue_alloc+0x268/0x4d0 [ 1016.528712][ T8429] __send_signal+0xda3/0x1590 [ 1016.533432][ T8429] send_signal+0x49/0xd0 [ 1016.537712][ T8429] force_sig_info+0x251/0x310 [ 1016.542429][ T8429] force_sig_fault+0xbb/0xf0 [ 1016.547053][ T8429] ? force_sigsegv+0x120/0x120 [ 1016.551858][ T8429] ? retint_kernel+0x2d/0x2d [ 1016.556554][ T8429] do_trap+0x1ab/0x230 [ 1016.560706][ T8429] do_error_trap+0xd6/0x200 [ 1016.565270][ T8429] do_invalid_op+0x37/0x50 [ 1016.569877][ T8429] ? invalid_op+0xa/0x20 [ 1016.574267][ T8429] invalid_op+0x14/0x20 [ 1016.578459][ T8429] RIP: 0033:0x20000092 [ 1016.582557][ T8429] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a 00 00 00 00 00 00 00 00 00 3c 00 00 00 00 00 00 00 ff ac 14 14 00 00 00 00 00 c4 22 eb aa bb 3c 00 ba 00 00 0f c7 [ 1016.602193][ T8429] RSP: 002b:00007f873d844bd8 EFLAGS: 00010a07 [ 1016.608311][ T8429] RAX: 000000002000008a RBX: 0000000000000009 RCX: 0000000000000002 [ 1016.616396][ T8429] RDX: e42c7a716897568f RSI: 0000000000000000 RDI: 00007f873d845608 [ 1016.624479][ T8429] RBP: 000000000000000a R08: 0000000000000005 R09: 0000000000000006 [ 1016.632473][ T8429] R10: 0000000000000007 R11: 0000000000000008 R12: 000000000000000b 21:22:33 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 1016.640576][ T8429] R13: 000000000000000c R14: 000000000000000d R15: 0000000000000004 21:22:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x2, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) [ 1016.737498][ T8436] gfs2: not a GFS2 filesystem 21:22:33 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x541b, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:33 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xa0', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5421, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1b00}) 21:22:34 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:34 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1017.406080][ T27] audit: type=1800 audit(1556832154.140:922): pid=8568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16546 res=0 21:22:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1017.505325][ T8579] gfs2: not a GFS2 filesystem 21:22:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5450, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) [ 1017.741358][ T27] audit: type=1800 audit(1556832154.470:923): pid=8589 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16564 res=0 21:22:34 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:34 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3f00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5451, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1018.141233][ T8701] gfs2: not a GFS2 filesystem 21:22:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5452, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1c00}) 21:22:35 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 1018.349104][ T27] audit: type=1800 audit(1556832155.080:924): pid=8718 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16568 res=0 21:22:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5460, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:35 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f06bf000c4000c4a37bf0c50141e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1018.537312][ T8732] gfs2: not a GFS2 filesystem [ 1018.601634][ T27] audit: type=1800 audit(1556832155.330:925): pid=8731 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16740 res=0 21:22:35 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6609, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:35 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1019.090062][ T8843] gfs2: not a GFS2 filesystem 21:22:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4b00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x660c, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) [ 1019.119383][ T27] audit: type=1800 audit(1556832155.850:926): pid=8841 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16564 res=0 21:22:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1d00}) 21:22:35 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:36 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f0523020c4000c4a37bf0c50141e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6611, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) [ 1019.338509][ T27] audit: type=1800 audit(1556832156.070:927): pid=8863 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16538 res=0 [ 1019.412105][ T8872] gfs2: not a GFS2 filesystem 21:22:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4f00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:36 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf0300002ac4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 21:22:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6612, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:36 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1020.061311][ T8987] gfs2: not a GFS2 filesystem 21:22:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1e00}) [ 1020.088303][ T27] audit: type=1800 audit(1556832156.820:928): pid=8991 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16706 res=0 21:22:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40049409, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:36 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:37 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086602, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) [ 1020.402755][ T9014] gfs2: not a GFS2 filesystem 21:22:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1020.478254][ T27] audit: type=1800 audit(1556832157.210:929): pid=9017 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16673 res=0 21:22:37 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086604, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:37 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1021.041397][ T9137] gfs2: not a GFS2 filesystem [ 1021.058078][ T27] audit: type=1800 audit(1556832157.790:930): pid=9134 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16673 res=0 21:22:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1f00}) 21:22:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086607, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6100}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:37 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 1021.203281][ T9151] EXT4-fs warning (device sda1): ext4_group_extend:1769: can't shrink FS - resize aborted [ 1021.320512][ T27] audit: type=1800 audit(1556832158.050:931): pid=9151 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16523 res=0 21:22:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:38 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6609, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) [ 1021.416151][ T9162] gfs2: not a GFS2 filesystem 21:22:38 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40087602, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:38 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x2000}) [ 1022.094993][ T9288] gfs2: not a GFS2 filesystem 21:22:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x400c6615, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:39 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1022.417724][ T27] audit: type=1800 audit(1556832159.150:932): pid=9295 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16609 res=0 [ 1022.486365][ T9303] gfs2: not a GFS2 filesystem 21:22:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40106614, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) [ 1022.733341][ T27] audit: type=1800 audit(1556832159.470:933): pid=9308 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16609 res=0 21:22:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf04000000c4a37bf0c50141e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:43 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x401c5820, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:43 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x2001}) 21:22:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7100}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1026.487695][ T9427] gfs2: not a GFS2 filesystem [ 1026.501804][ T27] audit: type=1800 audit(1556832163.230:934): pid=9423 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16946 res=0 21:22:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4020940d, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:43 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7a00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1026.814907][ T9449] gfs2: not a GFS2 filesystem 21:22:44 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf05000000c4a37bf0c50141e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xff0f}) 21:22:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40286608, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x8300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:44 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:44 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") [ 1027.491403][ T9562] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 10 (only 16 groups) 21:22:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x8400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1027.584325][ T9572] gfs2: not a GFS2 filesystem [ 1027.604220][ T27] audit: type=1800 audit(1556832164.340:935): pid=9562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17073 res=0 21:22:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305828, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:44 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x8800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4030582a, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) [ 1027.831338][ T27] audit: type=1800 audit(1556832164.560:936): pid=9582 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16642 res=0 21:22:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x8c00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1027.982456][ T9588] gfs2: not a GFS2 filesystem 21:22:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf06000000c4a37bf0c50141e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x8f00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:47 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x200000}) 21:22:47 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6609, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x80086601, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9700}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:47 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x80086603, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:48 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9f00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x80087601, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1000000}) 21:22:48 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf07000000c4a37bf0c50141e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:48 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa300}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x800c6613, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:48 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa400}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x801c581f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:48 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa800}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0045878, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x1200000}) 21:22:52 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xaf00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:52 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0045878, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:52 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x2000000}) [ 1035.639376][T10019] gfs2: not a GFS2 filesystem [ 1035.658357][ T27] audit: type=1800 audit(1556832172.390:944): pid=10016 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16594 res=0 21:22:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xfa00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0185879, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:52 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xff00}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1035.927155][ T27] audit: type=1800 audit(1556832172.660:945): pid=10035 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16609 res=0 21:22:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x100000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0189436, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) [ 1036.017971][T10043] gfs2: not a GFS2 filesystem [ 1036.251926][ T27] audit: type=1800 audit(1556832172.980:946): pid=10018 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17281 res=0 21:22:53 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:53 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc020660b, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x3000000}) 21:22:53 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") [ 1036.615443][T10166] gfs2: not a GFS2 filesystem 21:22:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0c0583b, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:53 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1036.836000][ T27] audit: type=1800 audit(1556832173.570:947): pid=10179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16579 res=0 21:22:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xffffffff00000000, r1, 0x0, 0x0, 0xa00000000000000}) [ 1036.975637][T10187] gfs2: not a GFS2 filesystem 21:22:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1037.060111][ T27] audit: type=1800 audit(1556832173.790:948): pid=10190 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16595 res=0 21:22:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:54 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:54 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x4000000}) 21:22:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0xfeffffff, 0x0, 0xa00000000000000}) 21:22:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1037.666547][T10315] gfs2: not a GFS2 filesystem [ 1037.698345][ T27] audit: type=1800 audit(1556832174.430:949): pid=10312 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16801 res=0 21:22:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0xfffffffe, 0x0, 0xa00000000000000}) 21:22:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:54 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x8000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1037.925689][ T27] audit: type=1800 audit(1556832174.660:950): pid=10316 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16568 res=0 [ 1037.986277][T10335] gfs2: not a GFS2 filesystem 21:22:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x5000000}) [ 1038.039251][ T27] audit: type=1800 audit(1556832174.700:951): pid=10326 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16566 res=0 21:22:55 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf0d000000c4a37bf0c50141e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0xfeffffff00000000, 0x0, 0xa00000000000000}) 21:22:55 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:55 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xc000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1038.634900][T10456] gfs2: not a GFS2 filesystem [ 1038.652648][ T27] audit: type=1800 audit(1556832175.390:952): pid=10452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16881 res=0 21:22:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0xfeffffff, 0xa00000000000000}) 21:22:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xe000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:55 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xff', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0xfffffffe, 0xa00000000000000}) 21:22:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xf000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1038.958664][ T27] audit: type=1800 audit(1556832175.690:953): pid=10343 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16550 res=0 21:22:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x6000000}) 21:22:56 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x10000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:56 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0xfeffffff00000000, 0xa00000000000000}) 21:22:56 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa000000feffffff}) [ 1039.685243][ T27] audit: type=1800 audit(1556832176.420:954): pid=10600 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16817 res=0 21:22:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x14000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x7000000}) [ 1039.788074][ T27] audit: type=1800 audit(1556832176.510:955): pid=10488 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16550 res=0 [ 1039.823866][T10608] gfs2: not a GFS2 filesystem 21:22:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x18000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1039.918622][ T27] audit: type=1800 audit(1556832176.640:956): pid=10616 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16616 res=0 21:22:56 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa000000fffffffe}) 21:22:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x18100000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1040.129587][T10631] gfs2: not a GFS2 filesystem 21:22:57 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000, 0xfeffffff}) 21:22:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x8000000}) 21:22:57 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:57 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x20000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000, 0xfffffffe}) 21:22:57 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x24000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000, 0xfeffffff00000000}) [ 1041.043676][T10772] gfs2: not a GFS2 filesystem 21:22:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x28000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:58 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:58 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:22:58 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xff', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:58 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='stat\t\xc0\xd2\xfe\xbc\xf9\x12H\xe9\x11\x93Q0I\xf8\a\x00\x00\x00}\xe6l\x84\xf6\xa1\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xaf`\x8a\xaf\xf0\x1e{R4\f\xd6\xfd\x00\x00\x00\x00p\x1a\x8a\x89\xbb\xedl\xef\xb1*\x17\x96\xa1\xfc\xbd\tBu\xa9f\xb5:2\x00\x00\x00\x00\x00\x00\x00\x00\x1f,\x99\\\x84V\x16r\xd5\x91\xa19\xd6uk!\'\xe5\xd0\x85\xb8F\xc3\x14<=\x1e\x8f\xf2\xe0?\x18\xce\xf3_f\xc7\xd9{\xe0\x05\xf8\x81@\xc0\xad,\x83\xbb d3\x95H/$t\xc4O\x05\x00\x00\x00\x00\x00\x00\x00^\xf4:k\xb0\x92`YZJ\xd6\xdd~\xb5\xe6\xfc\f\xe5Ng{se\xfc\xc3JF\x9d\xfd>\x99!\x0e\xb6\x8c\xc8E\xd9\xccU7J\xde\x81\xf6\x8a\x8b_\x99\xcd1\'M{\x1eK\x9b7\xf0;\xe6\a\x8a\xf6{\x9b\xc3\x9a\xce\aD\x96\x1cT\x8et\x00y\xdfQ7\xc3n,\xb7\xb7\xc0g#dq\x94-\xf3\xa1\xc7\vt\xd9v\xda\xf1}\xa5\xc8\x1f\x9c\x81\xb4\x84w\xa6j1\xf5\xcf\x04f\xf2\xa6y\xfd\xbc\xf8I\xd1\xbd\x9f<\xdb\xb3H\a\x13\t\x12\\\xdd\xd1\x8a\xbdO\x90*\xca\x85\t|{&Yf\xe5\xf1\xc6\x9e\xb6m\xf0]\xf5G\x93Y\xfaZ\xae\xa6\x0f\xb6\x87\xa7VtH\x00\xfev\x83\xd20x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000200)=0xe8) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000013c0)={@ll={0x11, 0x2, r2, 0x1, 0xe00, 0x6, @random="865b4719d45c"}, {&(0x7f0000000380)=""/4096, 0x1000}, &(0x7f0000001380), 0x40}, 0xa0) 21:22:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/prev\x00') write(r0, &(0x7f0000000280)="417f847fe285ac947bd4eb4dc5ead82cc5c7e7eaba50f8eeea54458c1a1ababd725b1d33bf5b463cdde7ffa3932d06bae5e14bd882d74627f52d33c8683b027409579273154afedbf0320f516f882da81efabc0df3b622a65656ff67a24ca22b358f90604797803d85801d0031882f4dba14dbb506317a31a59ee537b00c4e844dcd08ccac19ebd24288f8f0750c75232c416ecf501b6c5ef6d00f145d83ec6f2935526c08bf84276d9e28", 0xab) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f00000000c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='hugetlb.2\t\x00\x00s\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x200000000011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) syz_open_dev$mice(0x0, 0x0, 0x0) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x3e8, 0x0, 0xffffffff00000900) r5 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x2000002) fsync(r1) fallocate(r1, 0x3, 0xa, 0x110003) mkdir(&(0x7f0000000000)='./file1\x00', 0x1) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xa, r0, 0x0, 0x0, 0xa00000000000000}) 21:22:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:58 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xff', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xa000000}) 21:22:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:22:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000000002000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) [ 1042.523494][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 1042.523522][ T27] audit: type=1800 audit(1556832179.260:960): pid=10919 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16695 res=0 21:22:59 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xff', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:59 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0800004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 21:22:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xb000000}) 21:22:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x40000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r1, 0x1, 0x4000000000000000, 0x100000000000002) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:59 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xff', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:22:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) dup2(r0, r1) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:22:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x43000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:22:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x44000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1043.128839][ T27] audit: type=1800 audit(1556832179.860:961): pid=11058 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16674 res=0 [ 1043.432677][ T27] audit: type=1800 audit(1556832180.170:962): pid=11047 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16534 res=0 21:23:00 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:23:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x48000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x9, &(0x7f0000001600)=[{&(0x7f0000000140), 0x0, 0x8}, {&(0x7f0000000180)="ec750d182462cd3e43c1c802e216aa5a0365448b5ba5c2bdbb605d29d93f27452331cf84f760eb3fb8a49986e4273ded6247d1ba462412d364b40528d451462ee6cdcebbb6397c6e", 0x48, 0x2}, {&(0x7f0000000280)="b27d0226948d35ab4eb01ab196f1f76d18c37870e5cddf5f0c825bb2968acdaec6ac35ff7142d6f42d823e27390f9581cd31d697f6f94284fc1cb95470ee4b25a03b787fdb7cd12b291faecf62306ecfe6a9cd5432e9a9e215d9766b2a7b01e3ae7157170e300e9dbe1a8a2f9729bac3a8a99718f41b6639a93c9e3e18c3fe9a5f474d649d1e570aea61aac01447de47b5ffb2e7de7ab2d93cbf8b60d7d1877be1cdd944c844e60a0c083f627f920708f5d1a585dfab41045c71a4b11f", 0xbd, 0x2}, {&(0x7f0000000200)="7b92c945df3ba2305be06a145fcd4d6040de0c3073e7e5252a79b4e572e15df1f3cd3f99a95665695ef86dbce81b0283b89cef063b7fa5338a", 0x39, 0x4}, {&(0x7f0000000340)="ba097b23549b9001568e3dc9b5a167576b20a850660c2376cec9b152b454a1606f89610c66c6683cfd6e0ca5f4eda163333aaa12f6a28b95baad24df7fa82109a64869cab1a53ab4117ee102474792cf7f421e1dce54553e5fc3770550242e4d72331b321162948b46e081335ddf17f5fd45e11beb4367583863d6d4ae7bec2010e49073afcd69dfade7131a07be3e1d74b27bdaf65a8adf12814f9dcbdd6d51101b", 0xa2, 0x1}, {&(0x7f0000000400)="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", 0x1000, 0xffffffff}, {&(0x7f0000001400)="c8cc561f0449d4b0758655b81493197ab7c7e2227fc0637d270c4a971acc9278fff0c95c27dbc067709a5b7760afd364392ce667fa42c2d4d9f8ee5ac57a85a815a6d9d98e3c0b2b8b3eccfa1c1425c56bbc5f3e5bb30b33d9bb80dd294c8eafadb8ce157795f75f0edfff5a3270814707a70b98f81b7239b525da482a550d494939fd5633091984b4f56698d21b8469b35b84a613b66cbd36b175ab540f663ef1ad16ab7cae44a77c25d960f1c8d85404198ec72551c17185ec8b3b019102", 0xbf, 0x9}, {&(0x7f00000014c0)="84495c72d7b1900e6106aa078da834b8be3b2fcb42ee7290413ab73344eb5ae1e3edc8495d8f7e0c7c79b332c680f1258fe9de77c901ea247348b948d167e07e04afc7c99d6784e360ad4bd83158fa2e87ce76dcd91a745883b7f1a19d1e6d602b2c18dd9cc613223f5562ced56304c77ea35172e534b339ef6595d038ea8483a1ce9451d69dc251ebfc8e7469f1bbc6b1d5c327", 0x94, 0x85f}, {&(0x7f0000001580)="5b408fabb00870dc5804a02ca58e85d7a82ed90123c5e59ec8aafa6eeef4a30d97c05fa27c1b84b1847020b0cfd31e359e20f8c7822ad5230f0908015d32657ef47e30bfe625d68a7c1c2a80e535c8cb00e2ffbff1b204f2a52db212366672151c9d7639b97a0256eeb11745bc494368bd979a", 0x73, 0xfd}], 0x80, &(0x7f0000001700)={[{@utf8='utf8=1'}]}) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:23:00 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xff', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:23:00 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:23:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xc000000}) 21:23:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4b000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1043.683924][T11181] FAT-fs (loop3): invalid media value (0x14) [ 1043.699866][T11181] FAT-fs (loop3): Can't find a valid FAT filesystem 21:23:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:00 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:23:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4f000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1043.895247][T11190] FAT-fs (loop3): invalid media value (0x14) [ 1043.902813][T11190] FAT-fs (loop3): Can't find a valid FAT filesystem 21:23:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xd000000}) 21:23:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={[], 0x3}}, 0x12) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) write$binfmt_aout(r1, &(0x7f0000000100)={{0x108, 0x1, 0x2, 0x31, 0x275, 0x6, 0xaf, 0x1}, "c4efc50b36e382fee4f65f1c488fa863842cedd985c77a7b146074b2e6732963c9d1a13650ef4cc8563e525c680b06584568ba1b9f68ba3d5e1710b4c8e4936e3b8f76265b18e0cb8d8f"}, 0x6a) [ 1044.048892][T11209] gfs2: not a GFS2 filesystem 21:23:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:23:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x50000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x9, 0xfffffffffffffff7}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:23:01 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xf9', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:23:01 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") [ 1044.551148][ T27] audit: type=1800 audit(1556832181.280:963): pid=11210 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16554 res=0 21:23:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xe000000}) 21:23:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x53000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000)="4ed27d0b58c08cad25407f90d3a71c6c33845837314d8d06018d3c17", 0x1c, r0}, 0x68) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) write$UHID_CREATE(r1, &(0x7f0000000280)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000100)=""/213, 0xd5, 0x6, 0x7, 0x8, 0x6, 0x2}, 0x120) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:23:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x54000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:01 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xfc', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:23:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:23:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x58000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:23:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0xf000000}) 21:23:02 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xfd', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:23:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:02 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:23:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) recvmsg$kcm(r0, &(0x7f00000012c0)={&(0x7f0000000100)=@caif=@dgm, 0x80, &(0x7f0000001280)=[{&(0x7f0000000180)=""/154, 0x9a}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000000000)=""/57, 0x39}], 0x3}, 0x40000000) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:23:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x60000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x61000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1045.754805][ T27] audit: type=1800 audit(1556832182.490:964): pid=11481 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16977 res=0 21:23:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x9) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000000)={0x1, 0x5, 0x8, 0xcb}, 0x6) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:23:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x63000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:02 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x7f', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:23:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x10000000}) [ 1045.960240][ T27] audit: type=1800 audit(1556832182.690:965): pid=11495 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16629 res=0 [ 1046.038529][ T27] audit: type=1800 audit(1556832182.690:966): pid=11452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16834 res=0 21:23:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf19000000c4a37bf0c50141e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:23:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$apparmor_exec(r0, &(0x7f00000001c0)={'stack ', 'nodevvmnet0\x00'}, 0x12) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x1ff}, &(0x7f0000000100)=0x8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000280)={0x4, 0xb63, 0x7, 0x0, 0x0, [], [], [], 0xb1, 0x7}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x7fffffff}, &(0x7f0000000180)=0x8) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:23:03 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x8c', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:23:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x64000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:03 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:23:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x10010000}) 21:23:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x68000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0xdc, "52585ae3b44d780eeb37560817eb7ca39e27c73c65549cb067d5cd53acd22bca2d19a9070f7d3d6e83b7262508fc340c36a8639141c98d65613bae41025c00560d80b4b6fabd9f055682dd5b19083e048a1558041cd5f1d289f0f511c31da213e06578ae179529e71044513f1fbcafb42c09d949ef9ec7a588050544017d62cf94d08533174b842d8f367292ba071e39729d0fcfd613229a275298569ac015685cd70849082fd19a69b00a2b0548db0dc79145ae674fabccce8c3c2ed6f7e949db288b88d52ae2d2901b2be1658cbf79645eb276ea46801755de516a"}, &(0x7f0000000280)=0xe4) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000440)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000003c0)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00', r1}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e24, 0x100000001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}}, 0x100000001, 0x2, 0x5, 0x0, 0x11}, &(0x7f0000000380)=0x98) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x200000000, 0x2, 0xa00000000000000}) 21:23:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0x3f}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000100)={r2}) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:23:03 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xf5', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:23:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x70000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1046.951613][ T27] audit: type=1800 audit(1556832183.680:967): pid=11624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16914 res=0 21:23:04 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:23:04 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10000, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='.\xc7\x00\x00\x00\x14\x00\x00\x00\x00\x00\xe2\x00\x00\xd8!\x00\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000080)) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xa, r2, 0x0, 0x0, 0xa00000000000000}) 21:23:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x11000000}) 21:23:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x71000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:04 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:23:04 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\xf6', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:23:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x73000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:04 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7ff, 0x0) bind$pptp(r0, &(0x7f0000000100)={0x18, 0x2, {0x3, @multicast1}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x2, 0x2000002) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)="c98a575dabc30f49be8367f498623437c6834e35fb5bf99568f23169f543fbb65e31f789b6052b7605a408925fc71f0adffc212c05c8f96b64146efc9c0e07237380b944d28b2d9635007fb6fa8656cf1e1a5b820a4cdf51d4c1fc1a8c35496c337d95afd8e89ab1d1549f53db8d103bd48b6c6e35fb1a2dfef11fbe5b639996c212b0e04eeff196b30d5b128cf4aa8427f1d66653421c5b0f48dbb5d75ac39d386142d21d5b77ca7d1626aceab55910dd493a753c74e609d081065bfa8f24dfd45fb9c72291e243acb1058c66cb4d522296cc9d0d5f0dcb472e69eaa6d144722b311300bf10520b0c3100ea321e89f778466caf", {0xffffffffffffffff, 0xfffffffffffffff9, 0x49323159, 0xb, 0x4, 0x0, 0xb, 0x8000}}) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cachefiles\x00', 0x8000, 0x0) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xa, r2, 0x0, 0x0, 0xa00000000000000}) 21:23:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x74000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:04 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2p', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 1047.804855][ T27] audit: type=1800 audit(1556832184.540:968): pid=11776 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16539 res=0 21:23:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x0, 0xa668, 0x3) fallocate(r0, 0x0, 0x0, 0x110001) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x10300, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) [ 1047.975461][ T27] audit: type=1800 audit(1556832184.710:969): pid=11761 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16772 res=0 21:23:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:05 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:23:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x11010000}) 21:23:05 executing program 3: syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x400000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xa, r2, 0x0, 0x0, 0xa00000000000000}) 21:23:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x83000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:05 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:23:05 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:23:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x8000, 0x30}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x16e, 0x5, 0x8004, 0x1f, 0x1, 0x9, 0x471dadb1, 0x1, r1}, &(0x7f0000000180)=0x20) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) accept4$netrom(r2, &(0x7f00000001c0)={{0x3, @bcast}, [@default, @remote, @default, @rose, @netrom, @remote, @null, @null]}, &(0x7f0000000280)=0x48, 0x80000) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r2, 0x0, 0x0, 0xa00000000000000}) 21:23:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x84000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) connect$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x2, 0x3, {{0x43, 0x1}, 0x4}}, 0x10) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000100)) 21:23:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x85ffffff}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1048.752550][ T27] audit: type=1800 audit(1556832185.490:970): pid=11824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16801 res=0 [ 1048.795169][T11924] gfs2: not a GFS2 filesystem 21:23:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x12000000}) 21:23:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x88000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1048.948475][ T27] audit: type=1800 audit(1556832185.680:971): pid=11930 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16657 res=0 21:23:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="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") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:23:06 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:23:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x8c000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:06 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2500000003000000703300"], 0x25) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000280)={0x4, {{0xa, 0x4e20, 0x4, @local, 0x8000}}, 0x1, 0x5, [{{0xa, 0x4e24, 0x9, @local, 0x1eb}}, {{0xa, 0x4e23, 0x2, @mcast2, 0x2}}, {{0xa, 0x4e24, 0x10001, @ipv4={[], [], @multicast2}, 0x8f87}}, {{0xa, 0x4e23, 0xfffffffffffffff7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}}, {{0xa, 0x4e22, 0x1f, @dev={0xfe, 0x80, [], 0x10}, 0x1}}]}, 0x310) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xa, r2, 0x0, 0x0, 0xa00000000000000}) [ 1049.551374][T11968] gfs2: not a GFS2 filesystem 21:23:06 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:23:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x13000000}) 21:23:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x3c, &(0x7f0000000000)=[@in={0x2, 0x4e24, @rand_addr=0x9}, @in6={0xa, 0x4e22, 0x3, @rand_addr="c2805c2cd9ce5588ca68af907b5cf171", 0x8000}, @in={0x2, 0x4e23, @multicast1}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000180)={r2, 0x40, "a489426e9f0b4150b499cd7e703d8b53e5a690d16606b13c02953a39392ff663acd2be90135d3d9300d0d650173736ffdabadc761c2523e04d2e1e6e556b807b"}, &(0x7f0000000200)=0x48) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000280)={r2}, &(0x7f00000002c0)=0x8) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:23:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x8f000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:06 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:23:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/84, 0x54}, {&(0x7f0000000280)=""/198, 0xc6}], 0x2) fallocate(r1, 0x0, 0x0, 0x2000002) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7ff) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) 21:23:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x90000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1049.890556][T12070] gfs2: not a GFS2 filesystem 21:23:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x8002, 0x2) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r0, 0x7, 0x1, 0x1b4, &(0x7f0000000180)=[0x0], 0x1}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) read$eventfd(r1, &(0x7f0000000000), 0x8) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000100)={0xffff, 0x14, [0x401, 0x2, 0x8001, 0x20, 0x8b2]}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xa, r2, 0x0, 0x0, 0xa00000000000000}) 21:23:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', 0x0) syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf1d000000c4a37bf0c50141e2e9b5c422ebaabb3c00ba00000fc7a4ea70db000000000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) msgrcv(0x0, &(0x7f0000000140)={0x0, ""/58}, 0x42, 0x0, 0x0) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) 21:23:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x97000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xa, r1, 0x0, 0x0, 0xa00000000000000}) syz_init_net_socket$rose(0xb, 0x5, 0x0) 21:23:07 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) [ 1050.562087][T12093] gfs2: not a GFS2 filesystem [ 1050.592546][ T27] audit: type=1800 audit(1556832187.310:972): pid=12090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16722 res=0 21:23:07 executing program 5: epoll_create1(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 21:23:07 executing program 4: syz_mount_image$ntfs(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x1000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@discard='discard'}]}) 21:23:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x0, 0x14000000}) 21:23:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x98000000}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:23:07 executing program 3: r0 = io_uring_setup(0x59b, &(0x7f0000000100)={0x0, 0x0, 0x2, 0x40, 0x3d5}) write$binfmt_script(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x244) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x40, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xa, r2, 0x0, 0x0, 0xa00000000000000}) [ 1050.770753][T12207] WARNING: CPU: 1 PID: 12207 at include/linux/cpumask.h:121 io_uring_setup+0x1399/0x1ac0 [ 1050.780726][T12207] Kernel panic - not syncing: panic_on_warn set ... [ 1050.787361][T12207] CPU: 1 PID: 12207 Comm: syz-executor.3 Not tainted 5.1.0-rc7+ #97 [ 1050.795359][T12207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1050.805465][T12207] Call Trace: [ 1050.808805][T12207] dump_stack+0x172/0x1f0 [ 1050.822717][T12207] ? io_uring_setup+0x12f0/0x1ac0 [ 1050.827832][T12207] panic+0x2cb/0x65c [ 1050.831785][T12207] ? __warn_printk+0xf3/0xf3 [ 1050.836430][T12207] ? io_uring_setup+0x1399/0x1ac0 [ 1050.841502][T12207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1050.847877][T12207] ? __warn.cold+0x5/0x45 [ 1050.852250][T12207] ? io_uring_setup+0x1399/0x1ac0 [ 1050.857325][T12207] __warn.cold+0x20/0x45 [ 1050.861612][T12207] ? io_uring_setup+0x1399/0x1ac0 [ 1050.866671][T12207] report_bug+0x263/0x2b0 [ 1050.871037][T12207] do_error_trap+0x11b/0x200 [ 1050.875666][T12207] do_invalid_op+0x37/0x50 [ 1050.880104][T12207] ? io_uring_setup+0x1399/0x1ac0 [ 1050.885160][T12207] invalid_op+0x14/0x20 [ 1050.889345][T12207] RIP: 0010:io_uring_setup+0x1399/0x1ac0 [ 1050.894996][T12207] Code: 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 f8 fd ff ff 4c 89 f7 e8 d1 7d e0 ff e9 eb fd ff ff e8 07 67 a8 ff <0f> 0b e9 27 f7 ff ff e8 fb 66 a8 ff 4c 89 ff e8 83 3b 7a ff e9 fd [ 1050.914618][T12207] RSP: 0018:ffff88806646fdc8 EFLAGS: 00010216 [ 1050.920813][T12207] RAX: 0000000000040000 RBX: 0000000000000040 RCX: ffffc9000e66f000 [ 1050.929074][T12207] RDX: 0000000000000245 RSI: ffffffff81c825a9 RDI: 0000000000000005 [ 1050.937070][T12207] RBP: ffff88806646fef0 R08: ffff88809f792280 R09: ffffed101405b724 [ 1050.945081][T12207] R10: ffffed101405b723 R11: ffff8880a02db91f R12: ffff888057924d80 [ 1050.953074][T12207] R13: ffff88806646fec8 R14: ffff888057924dc0 R15: ffff888057924dd4 [ 1050.961099][T12207] ? io_uring_setup+0x1399/0x1ac0 [ 1050.966191][T12207] ? io_uring_setup+0x1399/0x1ac0 [ 1050.972463][T12207] ? io_uring_release+0x50/0x50 [ 1050.977427][T12207] ? nsecs_to_jiffies+0x30/0x30 [ 1050.982320][T12207] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1050.987820][T12207] ? do_syscall_64+0x26/0x610 [ 1050.992539][T12207] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1050.998662][T12207] ? do_syscall_64+0x26/0x610 [ 1051.003396][T12207] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1051.008723][T12207] __x64_sys_io_uring_setup+0x54/0x80 [ 1051.014131][T12207] do_syscall_64+0x103/0x610 [ 1051.018763][T12207] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1051.024895][T12207] RIP: 0033:0x458da9 [ 1051.028832][T12207] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1051.048650][T12207] RSP: 002b:00007f0d592d5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 1051.057451][T12207] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000458da9 [ 1051.065445][T12207] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 000000000000059b [ 1051.073794][T12207] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1051.084587][T12207] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0d592d66d4 [ 1051.092669][T12207] R13: 00000000004bffde R14: 00000000004d2318 R15: 00000000ffffffff [ 1051.102434][T12207] Kernel Offset: disabled [ 1051.106889][T12207] Rebooting in 86400 seconds..