[info] Using makefile-style concurrent boot in runlevel 2. [ 50.667766][ T26] audit: type=1800 audit(1566693141.253:21): pid=8993 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [ 50.700665][ T26] audit: type=1800 audit(1566693141.253:22): pid=8993 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.16' (ECDSA) to the list of known hosts. 2019/08/25 00:32:31 fuzzer started 2019/08/25 00:32:34 dialing manager at 10.128.0.26:32985 2019/08/25 00:32:34 syscalls: 2487 2019/08/25 00:32:34 code coverage: enabled 2019/08/25 00:32:34 comparison tracing: enabled 2019/08/25 00:32:34 extra coverage: extra coverage is not supported by the kernel 2019/08/25 00:32:34 setuid sandbox: enabled 2019/08/25 00:32:34 namespace sandbox: enabled 2019/08/25 00:32:34 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/25 00:32:34 fault injection: enabled 2019/08/25 00:32:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/25 00:32:34 net packet injection: enabled 2019/08/25 00:32:34 net device setup: enabled 00:33:39 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000040)={0xef67, 0x9, 0x2a, "69f8b42d5694d95e9facf0c421ad2e26bf0c54907c49509f02f61ea53eb2ddd326bf1dfc66dff696e135820b44b3e73e4bdf9b19a11d0b7906a8d0a6", 0x12, "f7fc3dc806cd4534741868f2cccae26a82c0281621eef7463f6886e0be6523473a8d8a72a0717a080f8f1364df760f7def950d66e700784338ecfeb7", 0x10}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000100)={0xa, {0xffff, 0x2, 0x80000000000000, 0x5}, {0x8, 0x4, 0x8, 0x1}, {0x0, 0x1000}}) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000140)={0x3, @pix={0x8000, 0x7, 0x2036315a, 0x7, 0x1, 0x20, 0x0, 0x9, 0x1, 0x0, 0x2, 0x7}}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000240)=""/34) sendmsg$nl_netfilter(r0, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x10c, 0xc, 0x3, 0x200, 0x70bd28, 0x25dfdbfb, {0x2, 0x0, 0xa}, [@generic="19fa21c47683ee88808a46fb4b1b5ecc9cdc59fcc4f0d254a831d6ee4da991b3b0c029dfd0b417216c7ede316ad9384c5b01e5947ce92092e9b362963a8426f2f8e601105305416f34a0e041a860927852e9955a121a9f9d3c267f74a4756dc9204a3f2b510926f71f40f01f6bf5e1920b9f5e85ae8cf3400a1890c015064eacf8a4197f34f0918f096fa3be99e141", @generic="85be8dcb2e8323b9291fece18fec93c01c17471f087cfd6d1981f85b84ec73f47fc3736393caa652a68edbcf835048485e5dd7cdb4d048d5f4880475f14a731bb607cdd5c89b164da1b35356ffcace50d162524cad6fb641174911ff71dffb07bd9596dbbe9e"]}, 0x10c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000094) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000480)=""/20, &(0x7f00000004c0)=0x14) bind$rxrpc(r0, &(0x7f0000000500)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x4000000000000, @ipv4={[], [], @empty}, 0x80}}, 0x24) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000540)={0x400, 0x2, 0x1}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000580)=0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000005c0)) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000600)='/dev/btrfs-control\x00', 0x200, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000640)={0x8}, 0x4) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000680)) fallocate(r0, 0x11, 0x1c9, 0x3) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000006c0)='trusted.overlay.origin\x00', &(0x7f0000000700)='y\x00', 0x2, 0x2) syslog(0xa, &(0x7f0000000740)=""/20, 0x14) prctl$PR_SET_TIMERSLACK(0x1d, 0x6) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000780)={0x21}) sched_setparam(r1, &(0x7f00000007c0)=0x401) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000800)={[0x5000, 0xd001, 0xd000, 0x6000], 0x2, 0x80, 0x100000001}) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000880)='/dev/ubi_ctrl\x00', 0x80000, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000008c0)={0x3, @pix_mp={0x7, 0xd346, 0x64737664, 0x8, 0x8, [{0x400, 0x8}, {0x8001, 0x9}, {0x80000001, 0xffffffff}, {0x1, 0x6}, {0x52ed9532, 0x2}, {0x4, 0x9}, {0x0, 0x7}, {0x2, 0x10000}], 0x1, 0x8000, 0x4, 0x2, 0x6}}) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f00000009c0)=r1) ptrace$getregs(0xe, r1, 0x6, &(0x7f0000000a00)=""/143) getsockopt$ax25_int(r2, 0x101, 0x9, &(0x7f0000000ac0), &(0x7f0000000b00)=0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000b40)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000c80)=0xe8) bind$xdp(r0, &(0x7f0000000cc0)={0x2c, 0x4, r4, 0x1ff, r3}, 0x10) socket$rxrpc(0x21, 0x2, 0xa) syzkaller login: [ 129.077191][ T9157] IPVS: ftp: loaded support on port[0] = 21 00:33:39 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x802, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0x1a}, 0x4}, {0xa, 0x4e20, 0xffff, @dev={0xfe, 0x80, [], 0x1b}, 0x10000}, 0x6, [0x0, 0xc101, 0x4, 0x3, 0x9, 0x3f, 0x2a46, 0x5]}, 0x5c) ioctl$PPPIOCDISCONN(r0, 0x7439) r1 = accept4$bt_l2cap(r0, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x80000) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={'nr', 0x0}, 0x1, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x2, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @default, @bcast, @null]}) recvfrom$packet(r0, &(0x7f00000001c0)=""/15, 0xf, 0x10021, 0x0, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000200), 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x8, 0x20, 0x8, 0x8}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000002c0)={r2, 0xfffffffffffffff9}, 0x8) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000300)=0x9) r3 = syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0x1f, 0x82000) write$UHID_CREATE2(r0, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0x12, 0x2, 0x3, 0xf20, 0x3, 0x1, "c4e056054e4cfe148c8131b921b0d3c4192d"}, 0x12a) socket$caif_seqpacket(0x25, 0x5, 0x4) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000004c0)=0x10000) r4 = memfd_create(&(0x7f0000000500)=']!@eth1.&}/@\x00', 0x7) write$UHID_INPUT2(r3, &(0x7f0000000540)={0xc, 0xbe, "3832889b09166cf411a642601cc66a47871bcc82ae7bb809272605d5f5c2da8fcaabcd9e6fad9f7fdc9c8afe0efd414894e02979cfe138f264713bfb00dbe68499282e06af3e3d3b5ce67b3f075a10e06773ad9b44ebb93221168b7c3008ecddb721503050ee0512989be06af9a12f1e0e524065f4061682d928ae88340abb452e4f8050e52b09f239b6247e6ba956bd3c99b1f87288c7aef26bed9c0c0b6910a51d4ba9fc9a87e470aea19a3295199bfe66c425d90bba172875d1c57991"}, 0xc4) r5 = syz_open_dev$vbi(&(0x7f0000000640)='/dev/vbi#\x00', 0x0, 0x2) ioctl$BINDER_THREAD_EXIT(r5, 0x40046208, 0x0) lseek(r1, 0x0, 0x0) read(r4, &(0x7f0000000680)=""/115, 0x73) r6 = socket$xdp(0x2c, 0x3, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000700)={0x0, 0x0}) ioprio_get$pid(0x3, r7) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) write$binfmt_elf64(r1, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x1ff, 0x3, 0x2, 0x101, 0x2, 0x3, 0x0, 0xa6, 0x40, 0xd, 0x9a, 0x1, 0x38, 0x2, 0x32, 0xc1b, 0xa3c}, [{0x7, 0x5, 0x0, 0xfffffffffffff830, 0x2, 0x2, 0x56, 0x200}], "c7607e1e9b96b2c88a844f2caf46100661104fc0f2a9d335c2305b2cc37a770932c8a2a198ef8aa19e9690fda844ad5823a89d87767181ded94ec66a86f2f19498959f9d0d3d223865ad4822bfc234c94c91e61fcb0c882aa1550d284176b753c27ea8d688f599216c3aefeb19150d283772be6900596d85c222fc646068d52b"}, 0xf8) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r8, 0x84, 0x7, &(0x7f0000000840)={0x81}, 0x4) migrate_pages(r7, 0x8, &(0x7f0000000880)=0x8000, &(0x7f00000008c0)=0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000e00)={{{@in=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@initdev}}, &(0x7f0000000f00)=0xe8) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000f40)={0x0, 0x0}, &(0x7f0000000f80)=0xc) syz_mount_image$f2fs(&(0x7f0000000900)='f2fs\x00', &(0x7f0000000940)='./file0\x00', 0x4c4d, 0x4, &(0x7f0000000d80)=[{&(0x7f0000000980)="ebccc4002f1738d0b431f81395292f0567f31307e238557d5f63c3085b591837294a87f42bcc56bd5e30a04c21f2e7c580246c539cdf1679ad7a31b0f96fa158585ed3d6a7d0a34985e81b6e0265610052e38fd792b3a47009e954dd4dc0449f4caba66ee8db8fd310c39f7115bbf5ebfbc4b8246cbba98b74471ff975fe4728bb362357dc7b80086cd4bcc757e69baf1779c6bbc5564220f2777240131af556831fd5ef8bf3d3f71349c2f36e29dc8a2c9b427691a52dd64b940865be09c2be562e17a1f4a01bdcbefacb", 0xcb, 0x4}, {&(0x7f0000000a80)="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", 0xfc, 0x20}, {&(0x7f0000000b80)="e14644edbcb92744d51ce639627c9c7661e0c214160d90dfdf8f84a45badb174a97e77eb52b810c2a56492bd6eb7a6b4a11b0d33824d37e8180936584ee146884dca741a04f26dfc7642df0b52a5268da29c9052fbcaba7a20ce21dd1959148f2d19e4a5bc151a344f671b76bba7bd770bbff42933aaeeeb26d380f05c20b21fc197d4bace94c42f9910951905c1fe08c508225dfc375a7195165a8298afe0dfb433c49105fef7501fc708f4a12355f85069f8dc83d6c4e8b3159d9d27828f8586d344089b8f8e862f2834de86b5a02c3fbb5e2060b7a92098fc5d8aa12c28c1e37ca17e0a428a1477f0bde4b183", 0xee, 0x40}, {&(0x7f0000000c80)="8ced43e4e9f788c1bcb004f3ec4eb4050b6d9669247c1500d65bb5030b45a254d65b4ee2a2ffb8bfbd68d85202273103e763fe64732f4f81a987f3406b5a7c949aef41a6084e13e57dff352473f18c10f63f4720d84ceefc234648959aa8b329ecd5728224431bbee390f47ed4954ac32a33b8a1a5ed37f56ac6a3b549f30012a83e173cb1b0355aee6a29341a29a9038d2125b4db74c171173472c69c6309363c9b3212b48c875f1b5dbd63270f667024fb9c41e53aba84a20173e0bee958343dc01d3115e83e5e12d83d09ffa5724660b28c2a1a0294e63f3c2b6ee96eff3cd35748fedda3bec5775788236c4bcce5cc66", 0xf2}], 0x2000, &(0x7f0000000fc0)={[{@noextent_cache='noextent_cache'}, {@noinline_data='noinline_data'}, {@whint_mode_user='whint_mode=user-based'}, {@fsync_mode_posix='fsync_mode=posix'}, {@noquota='noquota'}, {@inline_xattr_size={'inline_xattr_size', 0x3d, 0x5}}, {@norecovery='norecovery'}, {@noacl='noacl'}, {@lfs_mode='mode=lfs'}], [{@fowner_eq={'fowner', 0x3d, r9}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x100000000}}, {@fsmagic={'fsmagic'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@pcr={'pcr', 0x3d, 0x5}}, {@subj_role={'subj_role', 0x3d, '/dev/full\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'syz0\x00'}}, {@fowner_lt={'fowner<', r10}}]}) [ 129.159770][ T9157] chnl_net:caif_netlink_parms(): no params data found [ 129.192041][ T9157] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.214386][ T9157] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.232998][ T9157] device bridge_slave_0 entered promiscuous mode [ 129.252255][ T9160] IPVS: ftp: loaded support on port[0] = 21 [ 129.258538][ T9157] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.265655][ T9157] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.276240][ T9157] device bridge_slave_1 entered promiscuous mode 00:33:39 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x200, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2080, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000080)="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", 0x1000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000001080)=0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000010c0)={[], 0xbb, 0x1, 0x8, 0x8, 0x1, r2}) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000001140)=0xfffffffffffffa6e) fstat(r0, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001200)={0x0, 0x0, 0x0}, &(0x7f0000001240)=0xc) write$FUSE_ATTR(r1, &(0x7f0000001280)={0x78, 0x0, 0x7, {0x3, 0x3ff, 0x0, {0x0, 0x7, 0x64f7, 0x5, 0xe934, 0x1000000000000000, 0x0, 0x7ff, 0x299d, 0x6ee6, 0x2, r3, r4, 0x7, 0x10001}}}, 0x78) socket$caif_stream(0x25, 0x1, 0x2) read$eventfd(r1, &(0x7f0000001300), 0x8) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001380)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001440)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x2503020}, 0xc, &(0x7f0000001400)={&(0x7f00000013c0)={0x24, r5, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x0, &(0x7f0000001480), &(0x7f00000014c0)=0x4) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001500)='/proc/self/net/pfkey\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000001540), &(0x7f0000001580)=0x4) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000015c0)={0x1, 0x5, 0x4, 0x5, 0x7, 0x6123, 0x9b4, 0x3, 0x7, 0x5}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000001600)={0xffffffff}, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f00000016c0)={{0xa, 0x3, 0x9, 0xffffffffffffc2e4, 'syz1\x00', 0x4}, 0x6, 0x20, 0x7, r2, 0x9, 0x8, 'syz0\x00', &(0x7f0000001640)=['/dev/md0\x00', '/proc/capi/capi20ncci\x00', '!wlan0\x00', 'o\xe3!\x00', 'nodevselinuxwlan1\x00', 'wlan1nodev\\[]vboxnet0<{\'.\x86]\x00', '\x00', '/dev/md0\x00', '\'$\x00'], 0x65, [], [0x400, 0x74, 0xc7e1, 0x3]}) ioctl$TIOCLINUX7(r6, 0x541c, &(0x7f0000001800)={0x7, 0x20}) fspick(r6, &(0x7f0000001840)='./file0\x00', 0x1) ioctl$SG_GET_SG_TABLESIZE(r6, 0x227f, &(0x7f0000001880)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) ioctl$DRM_IOCTL_AGP_ALLOC(r6, 0xc0206434, &(0x7f00000018c0)={0x25, 0x0, 0x79728edae7567e24, 0x75e}) ioctl$DRM_IOCTL_SG_FREE(r6, 0x40106439, &(0x7f0000001900)={0x7f, r7}) msgget$private(0x0, 0x101) getsockopt$llc_int(r6, 0x10c, 0x4, &(0x7f0000001940), &(0x7f0000001980)=0x4) lstat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) [ 129.304927][ T9157] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 129.325601][ T9157] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 129.377522][ T9157] team0: Port device team_slave_0 added [ 129.406116][ T9157] team0: Port device team_slave_1 added 00:33:40 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x100) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000040)) sysfs$3(0x3) syz_mount_image$erofs(&(0x7f0000000080)='erofs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000000100)="ce5b5464ac9c6a75f31c3dcc8757de8695a922c8193b4bef29101258bfd4c1b9a9c20b07b6ef7b1bbfc3828c4b3880f7f1110dbe668089c1c0f0c4aa30fc10322170fcb7cd308aa57009b3ce0f2ae2a74ed592e36d412cd8e0f48433259cd173cc969c285a714d34a44cabd1713ecd7d93e8565b936a0416db3db38dbbad084c8c71f4dde17871e613a9e7f70891942b2a1fa46ca4adc40f766e919ea707d07403e7454cd538a3fb21c747d584424c11b51a1aec86f6398c9a1e89cbf4bbd8e1f0008a06f47be1400da54b1ac54c441160c435fca5c190476293872533d498ce96f6", 0xe2, 0x7}], 0x800000, &(0x7f0000000240)={[{@noacl='noacl'}], [{@measure='measure'}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@smackfshat={'smackfshat', 0x3d, '/dev/admmidi#\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x72, 0x0, 0x62, 0x16dd8573aa96d0b8, 0x65, 0x64, 0x66], 0x2d, [0x37, 0x77, 0x1705119186101080, 0x36], 0x2d, [0x38, 0x1c7e30b103a78111, 0x77, 0x63], 0x2d, [0x31, 0x36, 0xe319cc508f584d58, 0x62], 0x2d, [0x61, 0x33, 0x64, 0x34, 0x62, 0x31, 0x33, 0x30]}}}, {@context={'context', 0x3d, 'system_u'}}, {@seclabel='seclabel'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) r1 = socket$unix(0x1, 0x1, 0x0) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x100000001, 0x3, &(0x7f0000000600)=[{&(0x7f0000000380)="3cb25edd6fdd64523de8526713cf273915980d7c2d5cdb972e9194bdcb235cfba3392a80bb0b6b54f786248d82de7974a355b7a59e1edebd9426b17b684c29fe24e471924d142f06b9", 0x49, 0x3f}, {&(0x7f0000000400)="e9da3bcb2e42df01626c374c4a1b8f0089d4c2a791999e6057928cb5fa78f2d6ed47a62fbe2526c25cc4af394093d5e3f1626578e1bc4e4710f046da89084259076fe42ced996d250d645800e8d7a94fded55da5377ddb4975e7991834cfb8e0916fc853394c696c224ff5d9b3fd2da335b2553633f5fb8e348f1cfdf1a00c4de03b800126bf860a0815187090f98ba4d89a6bf20e8e463b5c0383dda0b598d74eb4a6367cbb83ad4d882304ab26bcbee3daad12700b227f82ffa9216488f46daf6e10904d600a0b18dc0c83d8db0825c3f0237b316e7a9c", 0xd8, 0x992}, {&(0x7f0000000500)="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", 0xfb, 0x76}], 0x2, &(0x7f0000000680)='cpuseteth1proc\x00') syz_mount_image$ceph(&(0x7f00000006c0)='ceph\x00', &(0x7f0000000700)='./file0\x00', 0x800, 0xa, &(0x7f0000001c40)=[{&(0x7f0000000740)="37900ff12a568dc690eabd0156422dc30c3602ea5ba0094dd9d30f97dae1fd", 0x1f, 0x7}, {&(0x7f0000000780)="a95e14e5b7c466b51a865d0a021bda07221f97061cb758371addffc32720e27a487cafd15cecde735d31cadcd47e8089220aad0ce2e117af87d024f7801febf6d6237185b1e61e358d3b1579ff762aa0fd27d1718b72b3f8efa507e89e1aa544e361a04bb1a9492002ed8466907a4d146a78291b0bb662b828221970ba4ee974f824e26f9b18e8cd6c75b716727dfc20e4a741853fbe95a43b0bd96184bbaa57886f10826e933aed91d9909f99bdc70bd02d691c7f8ce4603a39b6d5c9c805e0c1cd9b35607513641e408eeb37b364f0ed8408a9d65c9933", 0xd8, 0x3}, {&(0x7f0000000880)="048c135cb17977c6522ab89eb98fb8138fdf81333f59cd92a4a337cf25130f6e347b12739cc433130c4f78b63704d82662b9d828eae1aa4c08bd97d7567cc443", 0x40, 0x401}, {&(0x7f00000008c0)="6d33049079b9646c57d35c414a3bc7659841cca2684c4db8cae89d168be84702823754d31efccda5d1905a79dffaabad0c73afaf758d24a7e24c9eeaace4cefdd10151bf7eef64fc0f422b3f15f600c28cc5304759c0cdcee88d80cf678bfb53", 0x60, 0x8}, {&(0x7f0000000940)="7ce4f40107e63f0c8483", 0xa, 0x2}, {&(0x7f0000000980)="1a67eb0c09788814e9c7e544cc890b3715e2be5453acdad929e779c412241ffcdbe4c93b534a1b99549c8facbe55e880", 0x30, 0x8001}, {&(0x7f00000009c0)="becc73cf22c75351e153ffeb414b3b9f9dbd0d85b6068371d9ce9ab53313a45496c23f82a9e834ab1bc63f229248455070eb7eba64d7b02ad7d77dbd1ac20d5fdeabe6be5411129314fade4d974e50a123223092d52a9aa2fa08fedf6d5f7e7fa4c31482a40ff233e7be1943a17ef429a578cf8cc3ec5606a3bcadae65c9441ce67a964d68d57704e675123e45afc6336a7eb1ca4f9546c77952bba2051ce8dad0c479e06069ac79be13882cf46a5df457a204c6d94aefd8969a62b17e3a832400b5b620f95de0a0557ab2ed04749abf9908", 0xd2}, {&(0x7f0000000ac0)="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", 0x1000, 0x1}, {&(0x7f0000001ac0)="1e3b129cf101b9e151e35b3a5ee17acb48b49f2d009fe21fb7c2a3ac05e133cacb70c6925171300ff21b4dd2d8274acda70868beca0de83352e99226e2fcd7908d8a3a24bd627c0344158bd629b971857c94e345395944217e6e0763ed1049c6e815f912c90ccfa0c0aec578c442358a0a41980dd6aefe6f7904103b6892741d9ec251268a572e3bfd13392af9548d766b1e43ca2b6c26858ca7ba2bf2ea6d8da0033d5b3e6debead742d1037e5737a04613fa788f3f039303a0d945814986dfee261310a3a3a7f3bab4bc8374ec4f13b7c04b7a4ca32c17945a1c2e8434f29b", 0xe0, 0x1a}, {&(0x7f0000001bc0)="72542d6adb03f9e4d398037d7757a3031dce9f6c977c3d677954d9c8f742b23bfb81d2a5d4dc797b0162630a355d9692ea9024298716c3d6d0231632f7240a71fce0bb6fa9fdf324c9bca9d81807004ae36ba7f727b07b", 0x57, 0x81}], 0x2800000, &(0x7f0000001d40)='}mime_typenodev\x00') arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000001d80)) ioctl$VFIO_IOMMU_MAP_DMA(r0, 0x3b71, &(0x7f0000001dc0)={0x20, 0x2, 0x1, 0x3028000000000000, 0x7}) ioctl$sock_ifreq(r1, 0x8917, &(0x7f0000001e00)={'vlan0\x00', @ifru_flags=0x100}) r2 = syz_open_dev$vcsn(&(0x7f0000001e40)='/dev/vcs#\x00', 0x8, 0x80) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000001e80)=""/4096) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000002e80)=""/104) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000002f00)={@mcast2}, &(0x7f0000002f40)=0x14) recvmmsg(r0, &(0x7f0000003800)=[{{&(0x7f0000002f80)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000003680)=[{&(0x7f0000003000)=""/90, 0x5a}, {&(0x7f0000003080)=""/206, 0xce}, {&(0x7f0000003180)=""/212, 0xd4}, {&(0x7f0000003280)=""/201, 0xc9}, {&(0x7f0000003380)=""/166, 0xa6}, {&(0x7f0000003440)=""/148, 0x94}, {&(0x7f0000003500)=""/94, 0x5e}, {&(0x7f0000003580)=""/225, 0xe1}], 0x8, &(0x7f0000003700)=""/222, 0xde}, 0xb97}], 0x1, 0x2000, &(0x7f0000003840)) sendmsg$can_raw(r0, &(0x7f0000003980)={&(0x7f0000003880)={0x1d, r3}, 0x10, &(0x7f0000003940)={&(0x7f00000038c0)=@canfd={{0x1, 0x89, 0x3edf, 0x1000000000}, 0x1b, 0x0, 0x0, 0x0, "58a9f72e245aa9396269089e8ad4752300b655819a19198d933c61c52d2c1e0e12d23a836a6b5b3d8dec82e68051af9df42d84c5e28ea7a94d19e3b25b649917"}, 0x48}, 0x1, 0x0, 0x0, 0x48080}, 0x4) lsetxattr$trusted_overlay_upper(&(0x7f00000039c0)='./file0\x00', &(0x7f0000003a00)='trusted.overlay.upper\x00', &(0x7f0000003a40)={0x0, 0xfb, 0x26, 0x1, 0x0, "c46c60bd65803505892a5a11063b13b1", "77bb30b7cadd1a79ac459fd4fac763f666"}, 0x26, 0x1) rename(&(0x7f0000003a80)='./file1\x00', &(0x7f0000003ac0)='./file0\x00') socket$vsock_stream(0x28, 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000003b00)='keyring\x00', &(0x7f0000003b40)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000003b80)={r4, 0xd0, 0x1c}, &(0x7f0000003bc0)={'enc=', 'raw', ' hash=', {'digest_null\x00'}}, &(0x7f0000003c40)="2c544b375d79b3e4b66366687982d02f43c802e1138f090b7f20f6576c33f1f2dcbd332f72a660cacd48918545243742d16042e909d55cb1eddb1e7b22f87078fb3873dd3526f7bb377ea368aba345d1dd0dee17537a2574ea145f9942b47754fb2c931a54ada7bdafef70d4f6dd8e819df8a602f958f25204547ebd7fd5e5c5b838815988e916cb1f56036ed9b4e49086044ef01b35716bec3e366870a08fcb1faddc363eecc16f44b2796e77029ebab8a8f811cdc180ab4c89bac922a0178193c6037fdb0abb58a4ffc23202721907", &(0x7f0000003d40)="7d089f6baccb73fc985cb2349504fbddb03e4e0fc61a43825439b8bb") socket$inet(0x2, 0x8080f, 0x8) openat$md(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/md0\x00', 0x200, 0x0) sendto$inet6(r0, &(0x7f0000003dc0)="459f1f1a2bae00134b83f5a47625e72ad6e3479088c5a9b6473dff57f8c86d1617f20262044716382e97f5eedf63dc634624aa526516ffb9d2aa5b8fd119899121773a6b6d08c284b9ebab425c83191bf53b5cf993224e00a5e5eda90fd20c6a0928e5b22147095b0f91f21da5ca332338", 0x71, 0x40810, &(0x7f0000003e40)={0xa, 0x4e21, 0x80, @rand_addr="5eb674dc4738d0e207a2b68d9d8ee8e4", 0x1}, 0x1c) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000003e80)={0x4, 0x0, 0x3, 0x7ff, 0xffffffff, 0x191, 0x5}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000004300)={0x7, &(0x7f0000003ec0)=[{}, {}, {}, {}, {}, {}, {}]}) r5 = syz_open_dev$dspn(&(0x7f0000004340)='/dev/dsp#\x00', 0x0, 0x2000) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000004480)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000004440)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000044c0)={0xb, 0x10, 0xfa00, {&(0x7f0000004380), r6, 0x7}}, 0x18) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000004500)=0x0) waitid(0x3, r7, &(0x7f0000004540), 0x4, &(0x7f00000045c0)) [ 129.464746][ T9157] device hsr_slave_0 entered promiscuous mode [ 129.563198][ T9157] device hsr_slave_1 entered promiscuous mode 00:33:40 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x400000) ioctl$KDSETLED(r0, 0x4b32, 0x7fff) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x6, 0x4) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0xc, 0x2, 0x12, 0x10, 0x8, 0x101, 0x5, 0x18}) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000000c0)={0x8, {0x7, 0x40, 0x0, 0x1}}) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000100)={'ip6tnl0\x00', {0x2, 0x4e20, @loopback}}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x4, 0x4, 0x5, 0x0, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r1, 0x1}, 0x8) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000200)={0x0, 0x4, [{r0, 0x0, 0x1000000, 0x1073569ef838f09c}, {r0, 0x0, 0xfffffffffffff000}, {r0, 0x0, 0xfffffffff0000000, 0xfffffffffffff000}, {r0, 0x0, 0x100000000, 0x4000}]}) r2 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000002c0)={{0x2, 0x3, 0x1000, 0x1, 'syz0\x00', 0x7}, 0x5, 0x1, 0x1, r2, 0x5, 0xffffffffffff8000, 'syz0\x00', &(0x7f0000000280)=['{\x00', '/dev/vcs#\x00', '-\x00', '/dev/vcs#\x00', 'ip6tnl0\x00'], 0x20, [], [0x4800000000, 0x4e28, 0x1, 0x82000000]}) sendto$unix(r0, &(0x7f0000000400)="5c2c2d9f6286f8a30beecb7d354b87bb8322e6713196e888a832b5e8e6f7887eb1e5a98f9abf6959cf920449d07b53965f91bfb4ff788bab3f495d5540c3449915ea9e0204b08e6083b6f77496592e176820b8a32e6952f8faafd073", 0x5c, 0x844, &(0x7f0000000480)=@abs={0x1, 0x0, 0x4e20}, 0x6e) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000500)={0x0, @speck128}) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000540)={0x7f, 0x7fff, 0x1000}) getpriority(0x2, r2) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000580)={r1, 0x4, 0x1, 0x9, 0x1, 0x3}, 0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000005c0)=0x5e, 0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f00000007c0)={0x3, &(0x7f0000000600)=[{}, {}, {}]}) lseek(r0, 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000980)={0x6, 0x91f, &(0x7f0000000800)="de55506c140a71903503a34643cf23418a0398509d68eff882226ffb8eb63f34ad272476bd0f5452e0505383828e1a76ce899632075dede7b85f6902afdbc56498cee9568027b3fdbc300663fb708099741c9b62d29d75631b4218506de848337d4df7784e656634dccbddb26367ffdb4c0f79858e915cae812a9a0b33667c6cbd0417eea40e8aff723ae9eec3f62bdc18988e448bb53d4735bf0836c2a3dac685e3915a968f82", &(0x7f00000008c0)="846f35d0063882333ef8ea7a9b1c9910a4c4506ab91b4a9edc2457f9173e029989161c719050e6418fd08f916c887a46e9627c93b06872b796b08839f8ba485692a8032ecee402329181b24bb229172011854475f14aa1ee0e9a6c2c59ae5cee859732455475d4d3dccb18cccf20e41efef5aef8cfd240cca47f526518657846258e49b0afea1e75cbcdef864913caef06009b9cc81d63521ecbbc669d87437f", 0xa7, 0xa0}) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000009c0)='trusted.overlay.nlink\x00', &(0x7f0000000a00)={'L+', 0x2}, 0x28, 0x2) getpeername$unix(r0, &(0x7f0000000a40)=@abs, &(0x7f0000000ac0)=0x6e) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000b00)={r1, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x7f, 0xffffffff, 0xc6d6, 0x3ff, 0x81}, &(0x7f0000000bc0)=0x98) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000c00)=0x1) r3 = syz_open_dev$admmidi(&(0x7f0000000c40)='/dev/admmidi#\x00', 0x7, 0x2) syz_open_dev$dri(&(0x7f0000000c80)='/dev/dri/card#\x00', 0x80000001, 0x100) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000cc0)={0x22, 0xe, 0x15, 0x19, 0x6, 0x6, 0x3, 0x68}) link(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)='./file0\x00') [ 129.631152][ T9163] IPVS: ftp: loaded support on port[0] = 21 [ 129.642985][ T9160] chnl_net:caif_netlink_parms(): no params data found [ 129.661948][ T9165] IPVS: ftp: loaded support on port[0] = 21 [ 129.675566][ T9157] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.682645][ T9157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.689943][ T9157] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.697012][ T9157] bridge0: port 1(bridge_slave_0) entered forwarding state 00:33:40 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x101200, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f00000000c0)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x200) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000140)=0x6) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x10003, 0x3, 0xd000, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) nanosleep(&(0x7f00000001c0), 0x0) r2 = getpgrp(0xffffffffffffffff) sched_getparam(r2, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x7f, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5199}}, [0x8, 0x6, 0x0, 0x88d0, 0x9, 0xfffffffffffffffc, 0x9, 0x100000000, 0x4, 0x800, 0x401, 0x0, 0x8b, 0x97, 0x9]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000380)={0x2, 0x8, 0x8000, 0x4, 0x7fff, 0x400, 0xb9, 0x81, r3}, 0x20) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f00000003c0)='syz1\x00') r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000400)=@sack_info={r3, 0x6072, 0xfffffffffffffe00}, &(0x7f0000000440)=0xc) accept4$x25(r1, &(0x7f0000000480), &(0x7f00000004c0)=0x12, 0x800) fcntl$setown(r4, 0x8, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000500)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000580)={0x7, 0x8, 0xfa00, {r6, 0x3f}}, 0x10) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) r7 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) fcntl$F_SET_FILE_RW_HINT(r7, 0x40e, &(0x7f00000005c0)=0x4) write$cgroup_pid(r1, &(0x7f0000000600)=r2, 0x12) r8 = socket(0x8, 0x1, 0x6) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000640)={0x2, 0x7654910c}) pipe(&(0x7f0000000680)={0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r9, 0x40045402, &(0x7f00000006c0)) connect$netlink(r8, &(0x7f0000000700)=@kern={0x10, 0x0, 0x0, 0x4000040}, 0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000740)={r5, 0x8}, &(0x7f0000000780)=0x8) [ 129.831245][ T9160] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.839248][ T9160] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.848300][ T9160] device bridge_slave_0 entered promiscuous mode [ 129.864157][ T9167] IPVS: ftp: loaded support on port[0] = 21 [ 129.878042][ T9160] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.885605][ T9160] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.893580][ T9160] device bridge_slave_1 entered promiscuous mode [ 129.906643][ T9157] 8021q: adding VLAN 0 to HW filter on device bond0 [ 129.954913][ T9170] IPVS: ftp: loaded support on port[0] = 21 [ 129.962890][ T9165] chnl_net:caif_netlink_parms(): no params data found [ 129.979971][ T9160] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 129.990451][ T9160] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 130.022314][ T9160] team0: Port device team_slave_0 added [ 130.034073][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.043204][ T9169] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.050846][ T9169] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.058761][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 130.070115][ T9163] chnl_net:caif_netlink_parms(): no params data found [ 130.079071][ T9157] 8021q: adding VLAN 0 to HW filter on device team0 [ 130.086517][ T9160] team0: Port device team_slave_1 added [ 130.093068][ T9165] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.100095][ T9165] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.107758][ T9165] device bridge_slave_0 entered promiscuous mode [ 130.116708][ T9165] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.123837][ T9165] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.131193][ T9165] device bridge_slave_1 entered promiscuous mode [ 130.151002][ T9165] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 130.161187][ T9165] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 130.182296][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.190706][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.197780][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.205696][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.213950][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.220958][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.244337][ T9165] team0: Port device team_slave_0 added [ 130.256956][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 130.303691][ T9160] device hsr_slave_0 entered promiscuous mode [ 130.352758][ T9160] device hsr_slave_1 entered promiscuous mode [ 130.422443][ T9160] debugfs: Directory 'hsr0' with parent '/' already present! [ 130.436749][ T9165] team0: Port device team_slave_1 added [ 130.446265][ T9163] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.454105][ T9163] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.461529][ T9163] device bridge_slave_0 entered promiscuous mode [ 130.468933][ T9163] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.476781][ T9163] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.484405][ T9163] device bridge_slave_1 entered promiscuous mode [ 130.498779][ T9163] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 130.519453][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 130.552936][ T9163] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 130.570689][ T9157] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 130.581117][ T9157] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 130.599372][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 130.609305][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 130.618080][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 130.627353][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 130.635895][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 130.644122][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.652215][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 130.660562][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.668691][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 130.676429][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 130.707483][ T9167] chnl_net:caif_netlink_parms(): no params data found [ 130.716391][ T9163] team0: Port device team_slave_0 added [ 130.734807][ T9157] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 130.784396][ T9165] device hsr_slave_0 entered promiscuous mode [ 130.812731][ T9165] device hsr_slave_1 entered promiscuous mode [ 130.852441][ T9165] debugfs: Directory 'hsr0' with parent '/' already present! [ 130.860828][ T9163] team0: Port device team_slave_1 added [ 130.889908][ T9167] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.897080][ T9167] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.904760][ T9167] device bridge_slave_0 entered promiscuous mode [ 130.911775][ T9167] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.918857][ T9167] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.926280][ T9167] device bridge_slave_1 entered promiscuous mode [ 130.948978][ T9167] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 130.971586][ T9167] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 131.024343][ T9163] device hsr_slave_0 entered promiscuous mode [ 131.072707][ T9163] device hsr_slave_1 entered promiscuous mode [ 131.112453][ T9163] debugfs: Directory 'hsr0' with parent '/' already present! [ 131.122755][ T9170] chnl_net:caif_netlink_parms(): no params data found [ 131.141010][ T9167] team0: Port device team_slave_0 added [ 131.169042][ T9167] team0: Port device team_slave_1 added [ 131.201462][ T9170] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.208788][ T9170] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.216332][ T9170] device bridge_slave_0 entered promiscuous mode [ 131.225776][ T9170] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.233870][ T9170] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.241346][ T9170] device bridge_slave_1 entered promiscuous mode [ 131.295323][ T9167] device hsr_slave_0 entered promiscuous mode [ 131.332656][ T9167] device hsr_slave_1 entered promiscuous mode 00:33:42 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) prctl$PR_GET_KEEPCAPS(0x7) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x6042, 0x0) [ 131.382473][ T9167] debugfs: Directory 'hsr0' with parent '/' already present! [ 131.398976][ T9170] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 131.410019][ T9170] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 131.443774][ T9160] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.466661][ T9163] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.479841][ T9170] team0: Port device team_slave_0 added [ 131.486869][ T9170] team0: Port device team_slave_1 added [ 131.497741][ T9165] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.519809][ T9163] 8021q: adding VLAN 0 to HW filter on device team0 [ 131.530137][ T9160] 8021q: adding VLAN 0 to HW filter on device team0 00:33:42 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) prctl$PR_GET_KEEPCAPS(0x7) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x6042, 0x0) [ 131.547138][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.556323][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.566773][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.574631][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 00:33:42 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) prctl$PR_GET_KEEPCAPS(0x7) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x6042, 0x0) [ 131.595371][ T9165] 8021q: adding VLAN 0 to HW filter on device team0 00:33:42 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) prctl$PR_GET_KEEPCAPS(0x7) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x6042, 0x0) [ 131.636433][ T9170] device hsr_slave_0 entered promiscuous mode [ 131.672807][ T9170] device hsr_slave_1 entered promiscuous mode [ 131.692588][ T9170] debugfs: Directory 'hsr0' with parent '/' already present! [ 131.719658][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.728923][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 00:33:42 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) prctl$PR_GET_KEEPCAPS(0x7) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) [ 131.737399][ T9169] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.744493][ T9169] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.754651][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.763720][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.772748][ T9169] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.779787][ T9169] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.788140][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 131.797737][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.808076][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.815734][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 131.826404][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.835174][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 00:33:42 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) [ 131.843716][ T9169] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.850761][ T9169] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.858914][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.867510][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.881028][ T9169] bridge0: port 1(bridge_slave_0) entered blocking state 00:33:42 executing program 0: execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) [ 131.888111][ T9169] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.896091][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.904639][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.912969][ T9169] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.920012][ T9169] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.927917][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.936921][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.948229][ T9169] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.955306][ T9169] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.962862][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 131.971256][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 131.979735][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 131.988245][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 131.996867][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.005114][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.013512][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.021822][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.030184][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.038592][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.046760][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.054976][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.063353][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.071430][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.079591][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.088006][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.096274][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.104646][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.112955][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.120974][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.134621][ T9163] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 132.145613][ T9163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 132.158537][ T9165] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 132.170421][ T9165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 132.181403][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.189283][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.197921][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.206108][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.215298][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.223484][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.231003][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.239425][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.247618][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.256038][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.264089][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.272111][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.280162][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.288365][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.310204][ T9163] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 132.336604][ T9160] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 132.359032][ T9165] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 132.374186][ T9167] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.389087][ T9167] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.401004][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.409262][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.422435][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.430851][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.440127][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.447199][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.462912][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.471421][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.481663][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.488736][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.500163][ T9170] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.525805][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.533517][ T9242] debugfs: File 'dropped' in directory 'md0' already present! [ 132.537732][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 132.556459][ T9242] debugfs: File 'msg' in directory 'md0' already present! [ 132.564759][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 132.573897][ T9242] debugfs: File 'trace0' in directory 'md0' already present! [ 132.575681][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.589623][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.597937][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.606189][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.618762][ T9167] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 132.633244][ T9167] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 132.652444][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.660743][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.669880][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.678565][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.687055][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.695592][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.703512][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.711275][ T3025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 132.733391][ T9170] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.745299][ T9253] erofs: read_super, device -> /dev/loop3 [ 132.751708][ T9253] erofs: options -> noacl,measure,mask=MAY_APPEND [ 132.765540][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.781079][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.797100][ T9253] erofs: cannot find valid erofs superblock [ 132.803944][ T9169] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.810985][ T9169] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.826647][ T9167] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 132.836273][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.845869][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.855412][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.867351][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.874531][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state 00:33:43 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000540)={0x0, 0x10, &(0x7f0000000600)=[@in={0x2, 0x0, @dev}]}, &(0x7f00000005c0)=0x26c) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0xd, &(0x7f0000000000)={r1}, 0x8) r2 = open(&(0x7f0000000040)='./file0\x00', 0xa36851e8adef9a78, 0x4a) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x8, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x5, 0xded9, 0x9}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0xc0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000001c0)=""/245) 00:33:43 executing program 0: execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) [ 132.882302][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 132.897112][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 00:33:43 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0xfffffeac, &(0x7f0000000200)=0x1000000000000001) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000100)=0x63, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000340)={0x8001, 0x9, [0x8, 0x3ff, 0x4, 0x0, 0x4]}) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000080)={{0x0, 0x5, 0x3ff, 0x175, 0x80000000, 0x3}, 0x7f, 0x18ae000, 0x6}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x10000039a) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000000)={0x10000, 0x8, 0x0, 0x1000, 0x4, 0x3ff}) [ 132.932191][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.953312][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.981133][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.994597][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.015445][ T9170] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 133.026297][ T9170] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 133.044148][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 133.052322][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.060568][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.069237][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.077822][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.091998][ T9170] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 133.099353][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 00:33:43 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x200, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2080, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000080)="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", 0x1000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000001080)=0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000010c0)={[], 0xbb, 0x1, 0x8, 0x8, 0x1, r2}) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000001140)=0xfffffffffffffa6e) fstat(r0, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001200)={0x0, 0x0, 0x0}, &(0x7f0000001240)=0xc) write$FUSE_ATTR(r1, &(0x7f0000001280)={0x78, 0x0, 0x7, {0x3, 0x3ff, 0x0, {0x0, 0x7, 0x64f7, 0x5, 0xe934, 0x1000000000000000, 0x0, 0x7ff, 0x299d, 0x6ee6, 0x2, r3, r4, 0x7, 0x10001}}}, 0x78) socket$caif_stream(0x25, 0x1, 0x2) read$eventfd(r1, &(0x7f0000001300), 0x8) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001380)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001440)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x2503020}, 0xc, &(0x7f0000001400)={&(0x7f00000013c0)={0x24, r5, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x0, &(0x7f0000001480), &(0x7f00000014c0)=0x4) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001500)='/proc/self/net/pfkey\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000001540), &(0x7f0000001580)=0x4) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000015c0)={0x1, 0x5, 0x4, 0x5, 0x7, 0x6123, 0x9b4, 0x3, 0x7, 0x5}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000001600)={0xffffffff}, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f00000016c0)={{0xa, 0x3, 0x9, 0xffffffffffffc2e4, 'syz1\x00', 0x4}, 0x6, 0x20, 0x7, r2, 0x9, 0x8, 'syz0\x00', &(0x7f0000001640)=['/dev/md0\x00', '/proc/capi/capi20ncci\x00', '!wlan0\x00', 'o\xe3!\x00', 'nodevselinuxwlan1\x00', 'wlan1nodev\\[]vboxnet0<{\'.\x86]\x00', '\x00', '/dev/md0\x00', '\'$\x00'], 0x65, [], [0x400, 0x74, 0xc7e1, 0x3]}) ioctl$TIOCLINUX7(r6, 0x541c, &(0x7f0000001800)={0x7, 0x20}) fspick(r6, &(0x7f0000001840)='./file0\x00', 0x1) ioctl$SG_GET_SG_TABLESIZE(r6, 0x227f, &(0x7f0000001880)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) ioctl$DRM_IOCTL_AGP_ALLOC(r6, 0xc0206434, &(0x7f00000018c0)={0x25, 0x0, 0x79728edae7567e24, 0x75e}) ioctl$DRM_IOCTL_SG_FREE(r6, 0x40106439, &(0x7f0000001900)={0x7f, r7}) msgget$private(0x0, 0x101) getsockopt$llc_int(r6, 0x10c, 0x4, &(0x7f0000001940), &(0x7f0000001980)=0x4) lstat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) [ 133.188032][ T9300] debugfs: File 'dropped' in directory 'md0' already present! [ 133.199368][ T9300] debugfs: File 'msg' in directory 'md0' already present! [ 133.212180][ T9300] debugfs: File 'trace0' in directory 'md0' already present! [ 133.246081][ T9305] QAT: Invalid ioctl [ 133.254617][ T9305] QAT: Invalid ioctl [ 133.258926][ T9305] QAT: Invalid ioctl [ 133.269536][ T9305] QAT: Invalid ioctl [ 133.274922][ T9305] QAT: Invalid ioctl [ 133.286779][ T9305] QAT: Invalid ioctl 00:33:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x7fd) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000905ffff0000000000000002003f00020000006603000038000000360100000400000032082000010007004000030000000000050000000500000001000000000000007f00000002000000090c0000030000000400000069dd936502000000001000000300000006000000010000000300000024c66e64d7aba80b198d20558f765fd502449e92411b42d9422250959ee94176ab02705b90ae3dc478d0f984aeb3e2616fa5f74fd7bec1c1ceffbbe422c0c4a56dc6320be78676575ee5b46a9166203accde3c218559740851900d191a23f5b9f7cbebe4250d9dc60a9bbcd3ebf8d8bdadb64f2694bf48608ead8838a74000308b39db0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000257cbe84f032572ce150fbac6c6be9ce0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000032d91a56e79bf333c1f3803e9b4f007490d0940507355024d34f08194e485896db5cc251c0c0f827dd216adfa4ce323ae69fe16e37bcdceff44f4dc90bcc29d6721745a3984976de3241b4bd71a13"], 0x54a) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0) 00:33:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) setsockopt$llc_int(r0, 0x10c, 0xe27f5dfe0de40003, &(0x7f00000003c0), 0x4) write(r0, 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000200)={0x2, 0x20001000, 0x400, 0x5, 0xff, 0xfffffffffffffffb, 0x200, 0x2, 0x80000001, 0x1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x114, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xf4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x10000, @mcast1, 0x2}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9b6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x1, @local, 0x2}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x8, @empty}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x429c6f9b}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x4040004}, 0x4004000) writev(r0, &(0x7f000063e000)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) read$rfkill(r1, &(0x7f0000000000), 0x8) 00:33:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood\x00', 0x9) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 00:33:43 executing program 0: execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:43 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0xfffffeac, &(0x7f0000000200)=0x1000000000000001) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000100)=0x63, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000340)={0x8001, 0x9, [0x8, 0x3ff, 0x4, 0x0, 0x4]}) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000080)={{0x0, 0x5, 0x3ff, 0x175, 0x80000000, 0x3}, 0x7f, 0x18ae000, 0x6}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x10000039a) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000000)={0x10000, 0x8, 0x0, 0x1000, 0x4, 0x3ff}) 00:33:43 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x200, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2080, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000080)="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", 0x1000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000001080)=0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000010c0)={[], 0xbb, 0x1, 0x8, 0x8, 0x1, r2}) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000001140)=0xfffffffffffffa6e) fstat(r0, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001200)={0x0, 0x0, 0x0}, &(0x7f0000001240)=0xc) write$FUSE_ATTR(r1, &(0x7f0000001280)={0x78, 0x0, 0x7, {0x3, 0x3ff, 0x0, {0x0, 0x7, 0x64f7, 0x5, 0xe934, 0x1000000000000000, 0x0, 0x7ff, 0x299d, 0x6ee6, 0x2, r3, r4, 0x7, 0x10001}}}, 0x78) socket$caif_stream(0x25, 0x1, 0x2) read$eventfd(r1, &(0x7f0000001300), 0x8) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001380)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001440)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x2503020}, 0xc, &(0x7f0000001400)={&(0x7f00000013c0)={0x24, r5, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x0, &(0x7f0000001480), &(0x7f00000014c0)=0x4) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001500)='/proc/self/net/pfkey\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000001540), &(0x7f0000001580)=0x4) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000015c0)={0x1, 0x5, 0x4, 0x5, 0x7, 0x6123, 0x9b4, 0x3, 0x7, 0x5}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000001600)={0xffffffff}, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f00000016c0)={{0xa, 0x3, 0x9, 0xffffffffffffc2e4, 'syz1\x00', 0x4}, 0x6, 0x20, 0x7, r2, 0x9, 0x8, 'syz0\x00', &(0x7f0000001640)=['/dev/md0\x00', '/proc/capi/capi20ncci\x00', '!wlan0\x00', 'o\xe3!\x00', 'nodevselinuxwlan1\x00', 'wlan1nodev\\[]vboxnet0<{\'.\x86]\x00', '\x00', '/dev/md0\x00', '\'$\x00'], 0x65, [], [0x400, 0x74, 0xc7e1, 0x3]}) ioctl$TIOCLINUX7(r6, 0x541c, &(0x7f0000001800)={0x7, 0x20}) fspick(r6, &(0x7f0000001840)='./file0\x00', 0x1) ioctl$SG_GET_SG_TABLESIZE(r6, 0x227f, &(0x7f0000001880)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) ioctl$DRM_IOCTL_AGP_ALLOC(r6, 0xc0206434, &(0x7f00000018c0)={0x25, 0x0, 0x79728edae7567e24, 0x75e}) ioctl$DRM_IOCTL_SG_FREE(r6, 0x40106439, &(0x7f0000001900)={0x7f, r7}) msgget$private(0x0, 0x101) getsockopt$llc_int(r6, 0x10c, 0x4, &(0x7f0000001940), &(0x7f0000001980)=0x4) lstat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) [ 133.296934][ T9305] QAT: Invalid ioctl [ 133.301999][ T9305] QAT: Invalid ioctl [ 133.309949][ T9310] QAT: Invalid ioctl [ 133.316046][ T9305] QAT: Invalid ioctl [ 133.320051][ T9311] QAT: Invalid ioctl [ 133.324034][ T9310] QAT: Invalid ioctl [ 133.328071][ T9305] QAT: Invalid ioctl [ 133.332195][ T9310] QAT: Invalid ioctl [ 133.336659][ T9310] QAT: Invalid ioctl [ 133.341018][ T9305] QAT: Invalid ioctl 00:33:43 executing program 0: open(0x0, 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:44 executing program 1: r0 = socket$inet(0x10, 0x5, 0x80000001) prctl$PR_SET_DUMPABLE(0x4, 0x5be4b5ab13b6cf0f) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="240000001a0007041dfffd946f6105000a00000a1f000003002008000800030004000000", 0x24}], 0x1}, 0x0) r1 = msgget(0x0, 0x40) msgsnd(r1, &(0x7f0000000100)={0x0, "1f029f82801896a5f636c2a5a9b5f5144893c2679234ba1055702f0c9de5acca9ae18d44221794209306e78fe7ae218092e80ff048accde8199eac4946b46fca08f6a2ee8cfdbd2448e3a1f68614ca381725a7d1030998e4a90c45e8837992347600b35346964abc036071464ac54a97672476d78aee30c6125dfc7d42de3b5a04f77df7baca39e496b2e5793ff2c9ec961bd6af040947d3e4f3f3e7c451da454b9ecfa2650639196cf83acb8e983e4594253100c85cfb09074e57bad81b074b217ef552c59e2c0b46a6c2eae0de144a62ac4785fb31b2a9058eec"}, 0xe3, 0x800) [ 133.445007][ T9328] debugfs: File 'dropped' in directory 'md0' already present! [ 133.464201][ C1] hrtimer: interrupt took 23243 ns [ 133.481999][ T9328] debugfs: File 'msg' in directory 'md0' already present! 00:33:44 executing program 0: open(0x0, 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) [ 133.505064][ T9328] debugfs: File 'trace0' in directory 'md0' already present! 00:33:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) setsockopt$llc_int(r0, 0x10c, 0xe27f5dfe0de40003, &(0x7f00000003c0), 0x4) write(r0, 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000200)={0x2, 0x20001000, 0x400, 0x5, 0xff, 0xfffffffffffffffb, 0x200, 0x2, 0x80000001, 0x1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x114, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xf4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x10000, @mcast1, 0x2}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9b6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x1, @local, 0x2}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x8, @empty}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x429c6f9b}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x4040004}, 0x4004000) writev(r0, &(0x7f000063e000)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) read$rfkill(r1, &(0x7f0000000000), 0x8) 00:33:44 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25DELUID(r0, 0x8916, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x4080) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000004c0)={'team0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r1, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x100, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x8, 0x2}, 0x0, 0x0, &(0x7f00000000c0)={0x5, 0x3, 0x10001, 0x40000}, &(0x7f0000000100)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x9}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x7, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x1}, 0x0, 0x0, &(0x7f0000000300)={0x5, 0xb, 0x3, 0x7}, &(0x7f0000000340)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x1}}, 0x10) 00:33:44 executing program 0: open(0x0, 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x7fd) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x54a) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0) 00:33:44 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:44 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x200, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2080, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000080)="554ff45cc92e0773e331cc733e53fd5b3a723161e167f35fd9351e31e7f0438f4703d41b2da2bd86f679cfba40bc558522666f1f0b80ce2470da63cdf8eaaa24d9fce230ad7382700760946f0589ca92f229a83f555b768e5736b922105943b46863820675535685f8a5bf962728af0f601b31a74d31a369dde34cb02e8ad008af4e55ce50da1ad792c0986e264b7630a9ddbfdaedbba774f4b211a3e03c088f88b122bcec8d93074be0de79ca7eaf00610609f353bc1b952bcf5545f5e2e7f3eeacf253c936fa948385edad085482694b49a130dac1edff20e81e6061ff800f55979f60f1b2458ffa82c2dc6a3d5e344f8a46b04805cb183b465febac331015298affedf95abdfec8e0d36c14923208c974f79c23fce209d0986753e996b1bb9b41b222e7fc75fab5ffb72f77f0082573b164d0b584c1c44cb7f5c004703e506cfffdb287b826b1f69f363f6da4242ed433bb36cca2b26c38bbccb43eae7f3fbee7facc2ebe65e0e0692904d921173467c53cda7832a1ffdc2382045c6df8382f5fe40184a80bfbbd1c0384dd1b4ef46b5c31cb50bd6d9174faaab9c77e87bc5096a876065e1933898345bae2f2b5ef8897c9322908a7fd4dbdc1d2dc70ee5b1da4f524818b9a6d5f571acd67c99eb7832a7714e49132ddc93ae6c1db311d068bfb90bd3c242573417652c7caf588e399ac01e7d2785022f20337f329067e53cfe846a577843ab7cb97f3811328e5ff1dd196a592d22b12bc79dd6d8675b38dd66775ff539b2d3ff0cb52f022e610f87d3d2ef3dc627f6517d9950cbc636e086214aadf04fb5a7d3e44904bb0b62011954b598f834859a0b38d94dd03c9dc7a7ec9908465d315959d052f0a073c0abab1ef48dc33211d3e16ff9b11f51db05f383ce16a7d36b99778abdec2c1b2f31b9f9e7ef08152cc7cd621e9fc6f883f27f14d8cdf3ed22e75f20969b043921179e5f8d5fdd27cec716a42a6551426a61e520a9d3f86808da0a30d54e9fb8b804e774e4b435625f57751ac07485838d14d05d9f8c8eeff69c59d61a80c0c5161c7e34bd67d79e499192652193303d3851194bc69ed7465809b03d07d0271d907df59d9dc9961921a658621dce963fb1bd4ab0f245fdc8d67ae97aa27e6c208dffed678974fc1409a4d270e2bb3efa2f6668f1c9e1fa522f17ae8d9b5ff4a1a98bd93a9c5f3e5d01495c49e2f3d7fc0cc499c953953e94146218187faa87036d2a6ee7665b48047dce52d045818a1b9f7a5fc641230d8a81cd23dce2f1201fd4323119c0d96ee3efb064f6d6be232ff025f1a9c5106a9a704c21c0c6157a194b7145bac845881f03f6730bfbda75fc3d1cf60dfc504bc375dcddb944680762b5a0ee38fe41672277f6ac32511b057f3c4afae5b50cfeb6220b2935531e564a62c3ca937a449855b91debf481b708b940db25e8bc1dcdc9218229d6b0dfc25b9c20da85eef93f61c63ce59c4a259725f3424844ffe5d25fb0079bca0ee44b201b29fff232409f10f6a30e97d6b0217e00f6afa6635d474e6b4dbc37ad6f6a878858f1391047098f544e47d1fccdf06c86d68a6d94e3c771f87e02db720436565bfe91b333acc261453039a5ef5811e24c3a80d6475b94fae86cdb180f57affb1b174e32a58ee92580e33abd3dbeb767006a638bb7c129149bb394ae0b91b99531197ab742cd54e0248b850b0e964207d0e35ddec31e92c9786dc6c60c9c4e4697d83bfa9bbf825d97673cc76a53b9d278b924bc4f9614c2bbff715a2e8d3624a0e634e2d4cd122b8def6d47d52a16da3cd1e8a3616e31cb4d183e829f85e029c0df2ab34899458c804826443c12122cbd71517469d751384bc06dbadae9de4f3aeab73cf9254831a735126c4e9467c834fb879f7eb13085bd50892918a785379a7f3b5d0e4aeb90e00da2eddaddaca2e8a1a4c7c7f78d6189147b5fa223eb80da8c6418273b0cf91840e0109a0833e803a6bf93f9217598ec3ebadc244b889fd229921a4b437f9eafcaedbdd33e51cf5174191814afe1184d3f60d61d225050e2d994ffdae61e3a6df80d87a1d39dc659dae2de4c815169523c93f4a595a9bf223fdab43a0b230097db4e1c4786a7edb0e79e8d1d994a141acb442fb89a739e14b9c2f585ae8a047310f6581851bd364aa2900a033f579267bfa0335d4f33524b728cb0e8f97d45b1b0242a5d05721d46b6dd2703846ccb595df16abc3384d7ddabba4fc5c0f9c92ee802ced5e0591a9a35d06c49f7eb6a3cd06a757a94deda9bff9ef1e41716f993a9450ad01150c602c057e77acc041d1319d463bd9d2938c3b32783b0f769539e6ea0c5854949eec322c163fe098abcf0b41afef4d5285f11f398e1d498426c4bfac6819c55c9899681d005679291dadc6c028b1d3dc5ea2852ad395f1e2f456685116d941d8ed7376d4729d3a26806b860c37f8bd829e9b4fb8e167b1ee2a6a98be2835cb777e5e9b316121fcf060b7d62e34d63f771c2f50f2a440c06cedaf7558871de6ff173f878358ab6bec315b817bef1f9d1e6ee5fc569d2c7582f7c1dfcbaaed9af57144599514fcf7bb2e5a3887620c6ab4c19e572b178e695e1f42296256bce6615fd810257f9e5ea93b5c8a042214c0c150a00cf28a5295c136959aa284f9f816f1bac74a3005015e26401d22be490b04b21a53d739080b0589465496e1075dfc9e6ba2527816b023fa513fc197baf639884d97a6fba99464b31f2131069936cad6d5a999317a3151e0fbcd513ef39219d63f8c1deee40432371d88f49dd58b9e0ae8bcd1a7520ec7fb859e1d4b3818f9e59639b757e54e09b805798715d87cfc03d80748f8747e0a7dee5546816ded5575a1f8bcd51558f6da5d65b10c68bc5c6c3471e273ee3fd1f0c1a582ba5943ec0d45d8d680060d4e9210db59f50d5879840b93293b66428c171a8b1e16034735e8944205d8b5af28c5ac0f1a4cda77e890d01740fcf0230aa0ccf66c5edf631f42aa753f7eda86fef06c6bf086a8309325fac90d92bd470ee8b18f9dd758ec2e3ba8e39258bf9dd5ba424260c78ea12dd81e882648724ed7bb1e256b41a540ab797926474fd4254db6e9d26caef6c087e22baa9e6a9a274b078125c888afe7237396cf99b772eca0eb1a901dff40099e7902450b959aa5460368bbce3077a81f2a451a340db7c8a301e26faa75a0cdb6e518c250f7387dfad9c3472976632b02ee2311966641f9a5cf3c9bbe6046ca85eeddbff8134e3e76a4a11d8d63e0441afef15e457865d133275812bb5cfb32315f84194a74ba2c8eb9181d1352b390f715d4c47491ec546df7b0d9b453e27bc69383c5a327d5a50fdf9bda43f18b519418e1c2bb80bd5d11ba15247e8a44df7b5ec92ecdebeac6b85a72e85b0f23c69f7922516739083f3fd0c77d3a8a714e5d73953ef88f507bcc30f2caa46c314362cb30499fb4b1d06e1ae4817c2728069f848a9fa5e5ad7e61aa40eef5816fb71027ef1d34f0ff5c5ee0a223aac281c6d8de3be0ff9fb8d012e0083c4e670b44bbb9cdda7e13a0a02e8c57ff9cd68e73468acd98934abedac3f541a407656bd955037dbebef98c9c3119fbf54dc2ad2d01d798bc43109793d9a09c8dd9b2f25fa0c47afbaddd188176942c95bb63ef7e4f02bac30697862dccb8c5765ef474f418c7993c7130c2c4e494339f33ebceaf93cf1c1cbce910f7d25b4df75a214037f1678b409bb97fcc7f6d444de7acade8bec88ac336aabf8e4dd26098dfd8cd31ecc137a0afd4f83858c935ccde68689d4bab0c4c8ccd7c9557595ce6933ed2a636f2b59a17ad3e794078400d167ee41ad432e3704690d8bc713b1151df5c8b48494af9ca1e7f6cac6fce1531749db103dd0bf1fcb0f1380e44106f40fa03aeaf0181c1ce39bf3c8e8a54226804dd08381dda41f323f162785b4db2c340411639edc0b014e868700c90adc8ad53fd25f3bb80ae1b285821d7a4b23fc47efda9d0a097a63173b5fd387ef431ba8c19bb91d9a309859048835e84df4ffbc6320b0ea9951deed0bd602a2fae2770ecfec12bda3089e933a9aebc9ea8db5c169616d09eb6e1b283fde2b5c60ef60c58a0ebc526ce268453eaf8f570218ad2b0c7f0c7e6b027cf3b9b7bf2b5a6e41cf4da0bfe9071db81146a0087f270e6491e91f85fb21f6f81de7822ea8c0833103a75b9983abab858c2ec524e59dc5384fea2d07832b5f49ff104ede97786608fdb243b07a61378c7b508462406e1b771419864517c005c5936b83177df0c8daacb6b510c2296bfba5d8a3b08bf7d1ec6d536216a044d24e0a8d4c1d19240cf2eea6848b6bd775f56fa96e6d1b6d19bbd2ec2b5361bab9ee20b28b57fb746d5e986ffc382afdc78a6d02c860f1887307f21975e774aa77d889931e8b1eadcdeecd155a55299762db0398f97232070522ed558d7162f57ef47e2bf45dfd5999e291fc3c318a8367325c31b91bb56639cd0be4a008c8aa1cad3626b6b6e899db64636a04540caa0732d66c1c948ab7b1d421069cf23c62aad4cb2d62ee51b25101935ed418b2fcf3c2b6aee6ff446d9008d327aadaa00c5fa541241b9d2bb9e293a30ac8a8e40bc782a4ab0923abbd81f3f67a85528c8ddb3289bae419eed3cad95d9a935affc884ce927b34d89d13bf221e89d1287fed731d6679c037c81ff8a3545ba50f59de8bd6b718091320ca391ae8a76b09200b7417dd6664255a0cc02105ae0c592410da74ed44336fa902786cfec35afc50371aab1650dba11643aef355c29d07b528b9aa079fca943ff9d9f1e2ee88e9212498a1618aa9b28d1e81ea52cfb4c9397dd7217a00397e991145e1c27c99464af4f67e6dac0530faf871d28e979dbd92f93275b1ce5caf04dd9987d7841aeeed5e78f44eac7ecf8f6d2eb0940d294a9544f13e0f56093cd8ef68226b04cbedf421082c0294ca336023ce5582e1e40d479274a4e3e0a3729f34670da012173713e688bb4c6c5a348e19ff4131a72a7e699a45fc8929c35330fd385cc27d208e8cf6b0a2a61499dda91044c2d97a2364c41b730f3c3baea5c58d48389d8163283aa9187ae6f5e6908b96d336cd2c57e57a6797ef7851c8a4937573d43a8bf3142929e66dd0706bb15061dd1523b3d41d15cc32b083ba1157a8f8301c56c7e94d4c9766c43753bce3c83cecb8a87779e4c0a71a084acff7c51f96da54d68e131673e35bf7e3f56834e2f67fde41bea4b434027f5381261d06c96e0063fc048f12681ad1cc18c0497b5cd2bc56ad21e9447640397c9d382eb0c694901c16218e8c3014397f6a03a4068662c20a2e974646616b53546dcba08f9999e0da4a22eabca7644fbacbaaa78c1c7aa8ca67a47613d11b295f276900d4ec3fee1057ce9966d1046f0119fc08250591fedbbb9695e37b80b977419d13ee3b492917fa7444d37123c0b42357c8ca6fb820fb33563a4733f23bcd15f019924e0d8ac9a1528ed47355aa119a6c6ba7785e5ec17ecdd6e2dcbdf878e90558f8c51f93fbaf04dc540a98e9992a43f1d97791ab9477fbd7331bc86e1ddc3076edbdf157d560138099e044bef76ebee551c1efc7d002d2e737374e68494c276501376b636ea19cab04fb4ebd95b45cd7235a68616636990c343b11b4e95be364897526d4af45261b0a791ef19b0736eaabcf487ee2dbcaeab80a0735b38fa3723d17dc449476b7ed814b67e9c100630cab781b7c7f61d7e08da5e9e9f1792849bc59a5f2805e829353624a1f680b962880421af0822d71193ebbd2426e572", 0x1000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000001080)=0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000010c0)={[], 0xbb, 0x1, 0x8, 0x8, 0x1, r2}) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000001140)=0xfffffffffffffa6e) fstat(r0, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001200)={0x0, 0x0, 0x0}, &(0x7f0000001240)=0xc) write$FUSE_ATTR(r1, &(0x7f0000001280)={0x78, 0x0, 0x7, {0x3, 0x3ff, 0x0, {0x0, 0x7, 0x64f7, 0x5, 0xe934, 0x1000000000000000, 0x0, 0x7ff, 0x299d, 0x6ee6, 0x2, r3, r4, 0x7, 0x10001}}}, 0x78) socket$caif_stream(0x25, 0x1, 0x2) read$eventfd(r1, &(0x7f0000001300), 0x8) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001380)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001440)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x2503020}, 0xc, &(0x7f0000001400)={&(0x7f00000013c0)={0x24, r5, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x0, &(0x7f0000001480), &(0x7f00000014c0)=0x4) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001500)='/proc/self/net/pfkey\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000001540), &(0x7f0000001580)=0x4) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000015c0)={0x1, 0x5, 0x4, 0x5, 0x7, 0x6123, 0x9b4, 0x3, 0x7, 0x5}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000001600)={0xffffffff}, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f00000016c0)={{0xa, 0x3, 0x9, 0xffffffffffffc2e4, 'syz1\x00', 0x4}, 0x6, 0x20, 0x7, r2, 0x9, 0x8, 'syz0\x00', &(0x7f0000001640)=['/dev/md0\x00', '/proc/capi/capi20ncci\x00', '!wlan0\x00', 'o\xe3!\x00', 'nodevselinuxwlan1\x00', 'wlan1nodev\\[]vboxnet0<{\'.\x86]\x00', '\x00', '/dev/md0\x00', '\'$\x00'], 0x65, [], [0x400, 0x74, 0xc7e1, 0x3]}) ioctl$TIOCLINUX7(r6, 0x541c, &(0x7f0000001800)={0x7, 0x20}) fspick(r6, &(0x7f0000001840)='./file0\x00', 0x1) ioctl$SG_GET_SG_TABLESIZE(r6, 0x227f, &(0x7f0000001880)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) ioctl$DRM_IOCTL_AGP_ALLOC(r6, 0xc0206434, &(0x7f00000018c0)={0x25, 0x0, 0x79728edae7567e24, 0x75e}) ioctl$DRM_IOCTL_SG_FREE(r6, 0x40106439, &(0x7f0000001900)={0x7f, r7}) msgget$private(0x0, 0x101) getsockopt$llc_int(r6, 0x10c, 0x4, &(0x7f0000001940), &(0x7f0000001980)=0x4) lstat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 00:33:44 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0xfffffeac, &(0x7f0000000200)=0x1000000000000001) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000100)=0x63, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000340)={0x8001, 0x9, [0x8, 0x3ff, 0x4, 0x0, 0x4]}) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000080)={{0x0, 0x5, 0x3ff, 0x175, 0x80000000, 0x3}, 0x7f, 0x18ae000, 0x6}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x10000039a) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000000)={0x10000, 0x8, 0x0, 0x1000, 0x4, 0x3ff}) 00:33:44 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="7f450001edc04d0000"], 0xc) close(r2) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="73797a30991bca6c3cd27a92013b3804abc3edb69c23645bbd22c3c68907763089d3763663d5badeace1a986060819384670bc20880e82afe9bcce763a598e8002cbace1a3b930eb23c9"], 0x4a) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0xfffffffffffffffe, 0x7, {0x7, 0x1f, 0x5, 0x300000, 0x80000000, 0x8001, 0x6, 0x3}}, 0x50) socket$netlink(0x10, 0x3, 0x8) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) vmsplice(r0, &(0x7f00000024c0)=[{&(0x7f0000000240)="d62781f0e5c9db143746f6abd3fdec48b67bed5018f8121bdb5e10c4f9ce46fe99db97189e4f0e888d1c942370f885c9fb28c467d9d4f35d5a27afa58341e02e1f3cbd15ea55881957a59e9d0073599eebb684d255ff69643dcbe87fa0cba2b2cf6d20a99609ec9e2606d0effd531b7ffe0adb5c1740a529211856471895d3d85f35dbf6686d34c44e38426e69ed59c2b151f69a21acb0d91cdf8c734976f4564bc3420495cb48c349c3d521e20269abacb3e5264207527fd6e816e7c37875b55c4f5070306274e00de24cce769c9a9c52f52db1f97a72b652a912bf5ee9fcb3b8e3ca61faba3c9d6e6503b06f0ab4f071147b", 0xf3}, {&(0x7f0000000340)="36583598d585d6a16183b3da2a77e191c0a91bd03eb3ef6ae160aa9cbe4cd8252cee4c923df57678c9bfa0664793e12dff50ef7eadf43d2bdfa79c517607a495eb1b9b2cb584e1c0e8ff93b301d551a57f86c909b8560fbe5b2d900e810471e6f62919ccb7f6e09434c143a80b15", 0x6e}, {&(0x7f00000003c0)="b71f9195aa28b8b8b2af067d2a960703e89f4390398d192ec4b27dd4bf07c8cde3bf29ef4ee19245458c7e7d41f28407b5190896c041f30ed6305eff24ff7c5298178f396f9282b22d00f4a6f8ab9da69290d84ee3f29cb7dc1fe4544e417df9a4c2c0042d78bc9b518c5b3ac5ea2a77c78cc866c0e8468300fcd0412a5ec94f7e5fd2ffa1ef635979a91ea9f243b7cbe606970d3b8c83782140712583e7b4481567ce0493226ff664b1a5153927237397b04384f06dada88d2baf4db4c35dc62cfb7d0489250703a22198343ec5bf164fc2564aa5c33af28ebb33bdeb9aeeda5d13e0f839c2e2882f4bc1230ab02d2a08a93e2f8d32f8b2315411ff66ce4cfa2e6f0f778af3ccddea3d31f8230e6457fc152f568f796fb7518d461f1c79a58f91053466003213e32aed76e4ae93fb26270a6fce7290c2c16581499467977a9e5e5ab7a597339a92f98cb430552368e09063000fda3a3434829a209e3c02973ccc9860c84c370d1cb5e6fb416c8ee6a61bbd19071dc24c95fb866751a3331feec6ffcf36d0ae41093452f36a62d60fa26c5deb454917e4baa43cec233fbd8b7a14a9dcb8f03df62f24d52698688b39331efd7db5c70c982552b30116469c9c04807afd12fb8d0749fa835960462f351418d60d3c627221babc86ebfa2ff9025d84b5c506bab0772a63a337904f59d1470ff6e865cfdb23663b0a7539049c71d745d8e7f11ff714595cce135ed78cfa3a47c0ac05ee03bc8c7d5084c4da510eb4467ac32493ba581753a3044ec3b264c12bbdbab848c01b1277ddee4b36531381ef30c3c5dd31ebf05174034e054d8ea3b82a11ad852c685cd6a198ca8391441fff21f9aa3892f3e7e489184a34430580dc0f2899556565d1ce33bbbb49355cca6644ac68e9b00892217903a944283ad408ce969078c4bd183993511769df29a7bafb975ad8cbca11ba99e3e4cedd641e0aedf8bfaa8cf5d24f092a74d9e584ddf6de02ab2e84a8e9b1aeeec7017013649149e1befb41100746cbc483bf0f7eb373ebd6ae2bc6cb9b64db30dd3ee6c4e8631cc200933d29996bd5c8ba7704a2e6aeddfa7c873fd28717e11faf60280f0988895dd75ecda0a2850c1bc82235522736c4c4352bf5075eae1685c38a99675e769cc569e7cdade7d28761f0e8b28cc2d40bb6f47a2a494a5e3801f9fc647d1b2a2d6050f8d6e31d4463736a1c5248bc12c7a29ca152095399079abcd8e7e840352f788824a84a45752aa835c3d9d39685107629cb69488fbe4417694f445b83d5d5131ff8ac716d136b0e6b41bfc6982fbf732ec41356b6a4edc4a73bd2c0b90aba0b71950c004cacda371fe6661a30b66bb544f6b8a8abb94b4a9603c08ba09b0fe6206d7a19a36f18ff91fb205fda646180b16d3d4a455a3935275aceb2ea115e311fc60f8070d850ff6f9bca61d9923fd4b23e8a6d4d6e916d3145b138c0e32c93c2882064253b19f8654bfc2d9083869c586565169a25de6d62f757496bfe430026a84cafc4e49910b4bd8cf6ec133ca37f195ff8108a0a18b14ab9f99cb9bc7185d09e918554d37106956d3bc2f4111e7f480d3040eb58c24bf6178d8f7cbfcd91a05ddf86a41ecb740de79c2ebbf8530c437dbf9de87a796ce7289afe5440c9beeae77bc06dad904dbc62c64ab4989bf150e49cc3e217b914b8cf627ec3416df95a2c6f2d583db847387ff1c0db0464440488f4e4d6c4256c63ece7f740df040baa5c8a76de740694cb5f8bf1e54777cfd0750c3b1d73c244ba35f567a8fbf1f8762a5584d9ac509f0783756ce6a9b909eb90213b09bb34cd4dffe86cc68aff7f3f335cbc5698054716ca8f2f9fe6d7c146300915d329e1f9d65f61beda64449799756d5d65ea622c72750bbc56d4f22ced74e813a014774e9b81755a08d53d37bd42f963e653c490b5ec9fa77ab339f9c5a226a8667482d12ea576c44c52e97c4ce8b0b54c0720e480493ec35440f4f886a7bc8d9d29e1560e754513cb80613bd9f16492254a6a611e74eb6f0a0a3543e93331daf86ea68db13a7ef07815e894c73401e1275581d666008c754666de0e4b637f0934f2f9902e20c027ef538d89ec4ecd690f7efae84537836d07b708d074f3eb49bbf5dd55d926e360c7f866707c41e320a72bde030381ce25271c29b50bcde1fa719d538c72c73d8026f21a4e16ebddcd1541db1b3467309ed77bcff537e8df1607a12f0908a16a2a3e8506453c60d4792ed3bbdc1a3539c51f5a16b2d5e4bbc7969b12bdfa24601c1b88f3b83c6ee4c0639f841219fc5a089add887bc12a9067f554840a41eead83d30d75c21929c761c25fd9cece5b35fa4ae8aa4ee26382d594b96a173cc9b43c0754679d45356ca127adde9fe30461584f6f007b9ad201ee9c3dfbb51b1710a42c7b9005e27ab886ad69743cfaedfd7202979431a1f774ed3ae9a078edf490083414f77e6c2bea2427ff670678ca4f7c1f435fd006abecb6e388ebe111e036d7add175f3b7f0b359f64c439ab89f7198f862e9b7541804c537613f97d366009166941584e17bfa39372ae48b0b648818848b361fd70ad0b3923bad3f071b5e717edc867952c15ebd8b0e35fb6993934f71b655d6bb499bf1edf1177512109ce2c010538cdd2a689473e73b19416f9047c6d591de485ea9ee7c986dd11101692192995cc8af1ee7e600fb9b9ad4d01d4c69abcebcf3233f9a8ba459af2d2f1a0f5f8f8044c450c1e8c0f7e5dc8d47860b10f98155112e490cb59efc7920595f6a2e8ca6bdbe9336e84261cdb1a2bbbf8a58657556a808231ffa303aa3e171b149c4ec14e11951adc0f55acd21c12cb7e449290d7d2629b8884e0956757cbedd1bfd817e39c16b3e11004eea0956fc4f40e2e3155f26e9caabc79dd9f5d5368feaade1f6b1eb56fa2b1bb937a6985fdb46f845a360e861842e2c31bb12abcc8b786c1114226ea574df328d23f3768a88662887acfb6d3d0a1ab369640e224cf35b48d827d1179e69431cccf41bf7e035c4feeac65e59bf25da31c673ade17eefb739e024a7ca262cbf2f57b3a13942a0409c628f94b08e34ef883004a33c3ffa5cd16ff00a1cc79c6e6d468073e567f5396a7541552980185784d2b4e000ee64a29304b1bec3f5eeadab3ab015767b61f947b70867e84efb2b3cc66c0e9f4f3e9397ce278e7f7069e57fd4fe09fe176cfc316f3bf6449c27427a5f7209ea7668be39b0c652b392cadf362ca8397add162d8afdfc190bc35adb4ffc03062166a07bbc73e9f7d9df6f78143cd9d4e3d2a99281421298a95f443415bc32259a2967105befc3108bd386ab2e943833ddfb48aabbcbe21bce5b5c57681d6f35d4ad6136379e7a64eb20960167f7031cae93e5ecbd318f7bea1c64a1a45c64c781f7719c59136ea8da53f95c0416527f11699673426f00fcb29ad9befadd97bbbc98b31e1d23dbe1560f4cbffdbe2b6d37d08f6c132646ab53b8b8895f85bc92848249b54abd021f7f91158c3fbfebf55091352a7725e3fa1c6de46b45190bc217df9df492a47fb885cf35fc26d86141dfbd9ba83e668a1ab1bf0bf48ad8842c391827cb8bb2b300470685e739603b0051718179b8bb06d780fd9f807d33a6c992da4845b930babbad42ac9c3c1cada6c1e0f0f9e132c991fffdff69a84fdfba46951c6e7f95232cea5620398fe3ddf451520db139686dea3a445bd4b5840ab4f1ba16462c3a05a3860c6c5da65227c53123ee44194cfda14db5cc5e9e41ecd9533e7d92cdb4e37bd2e448805bdc02fc275c3e69e1fd7456095e82258dbf28fe4c9de1028557916ea2267a0b4c1ed00e4545fedca5c91e491f612aff2961cd4eba2a2bd7453af85d4abdfbd55654a0b373b946479f101c5bdea46c4753b36dcc743f486f0b9ccdad21482c14c3f9ba4504b720395622392f46babfbe2d2a7c9d80da196d182e70a7e14e2e793b0a4b69932e529140cd07dc815f5d09baee403ceeb613157e6a79c9cd6faa4bba2e481c45f3d390fcc297a30aa96de862a92b4df5007388c708c0490268e37e3da758ded2b2914eddbb8c68c811999b9801edc86aba11476100bb217d042491005dbd859208e7a04328541167e0e7bc59aa58482bd29faab70244d780bd2de09a7816d0acfcd0ffd4e04d8cda16195d3d8d019c268e6d9959a40d0029900ab0b9c6f306f995479dce677260c9fe7ee329bb53a5bba77b367b202e0969b56291f62c7e7be29f16e809d5b6e37aae5ea031ba1c21aae4559f5a0eb8f6afd701715da5337f350bb38bde0b987f47fa0727f15ab477ddb8d53d5d32038f3f9379bc7c5898b36d0f462c945edac4609ad88dfef79dd0ebdce49d4e42ec866e97ec9dc9a5e391ce24e08b3a61649537b1dbf064c6f060fce2e766347b7a1d733fa693c1c4ea0b0a90a8b2ee522372080e5d6d56c1d392f7f97d1d0091bbd36e4ef9d2fbd4023e39ec34c90268d83c1e1c85a1c4a6264f5fda4da1d1fee40153137c24d907501a281ccb80dc819443d48027d6307a335c65c86a5094f80d37e3fb4fa8411a8153ee333fa701c68f48448464bf34c47ae4c00fdb73d7d30bf96c365c2436508085c8a9eb948378c17cbf351401d2e306d1b96032e49dec5088c8c32fba7c33b7437ee84e369cce64c25431fd8f3186a37f1c170e39e370793aa6c2065346c269f9bcdc947b077b7b22f16992a21e49a752dd98e68b678cbc24815c6f2ee29faa1189322384ad6b9ecb2bdbde3f51367258d01693ec28070e86dd63c59ee91f0cf5171c1b3e886dabc1d732fed3be3d616ae524fec0e05ff905c036879878a22b66c04a8abeea076e3d33cc57b3c03c10f0f54d01b2337b32a6abc96840d00dc36b42326a496369a1eeabc0fcdfcd0554451a9ca493899dca96acb7ff647d8959050ff716480b2060d6497c96e7aa2ee3ec0dff7ba1a7bce80c4d6816641cf2490ceda8b01e9c2be472d954f2b5cf8f98ac586754a396c7504239ed16af7ae8b3b2ce8a5f06c5ea792b9ee1216c487dd0ddd2eb81a7dbaacf8d525ee2b755248c9d1564b4dca056d0433924a52f0e996725a137130f9c3685e5d854fb89cf9dc489f2f481ef611d7036d3e0fca0e8ffc055f5ded27e9266614ea22c4c3ce484b6a76384a271f7c0875680e58bb7f99e96e9aded5a79708bfdeb5451ef7a2c57f0ce7a2b50921fba235a9f99c4868f16721742a4e7d901d78edcd41f6a2059a4cdde15d6d83c149811695787b9cc06c16dbf4e2a999fc5de86142e5154bda3b8105fd6c34e93e5ac10d2a409255626501b50fe8c1417d9c6f3cf24424f92bbac6d1cd942c97d0a80f80729d20ada0b4341a8e73a49811d802d37865679cbbd1fa9c1c824e831242a0b25c361c44729ad45197a39daf3ffd2225d26ed896287c9d0be101292836e6af31312b61d177bcf094dacf0d88cb0ab4f3d799549db808f1f30cf8ccc97885db2451bec56cd6cd66e7ee924d81edcb1a538f9029a78d4a0433f3d44156f4df729b5809fbc7dc38804d3bf71bd85e271fb2d198738d17a629753c6426861f4ecaeee54e7f40ec3d3a9ce6761b7b81fdbdfa4b60ec8a7253a27fc49662994449fa2b9b7b25ebb57cbfc9ef5a8c20043221eefcd1d25a3ec13b685db6968210d709f5d462c2413fb0522f583d5842ff2dfb1d1092ca29df952b6dc9a894bff1e4703279b7bf60fcecc9d6269daf5fcf93c26a4d09112dbe8ceaf84da5183adebbe6fd8f8823647d01165c45e6db771cfeec1b7ddc2c541d082b254109181e5", 0x1000}, {&(0x7f00000013c0)="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", 0x1000}, {&(0x7f00000023c0)="97cb33ff0ed83b49638f4911b00924716d62b5cf1d725d0296a639305d2bbe5fad18d5e2df2a1774ce0874029af9d44c5d354b53f9c6eb8311da412f6142d96c71362f4bdbe66b7ab35deeaf20f8a496590f8a54a74388a27b8475ad69b68acb4c7328bf28150c272d822d6911ef5796d7caacc9c3f46021e3abe3d44fc4342ee733e459512bbce28559e6b9b562c2c889ffbe099e798a1b8f1599b27c9e09daef844790ea18dd169a7a5d8685bee608c45893264798088c1015d1d8599e2189999da612de2531e8f72651dfb892b62951b64c838c661f203bf79502fb31aec4a9c40af6", 0xe4}], 0x5, 0x1) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 00:33:44 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x7fd) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000905ffff0000000000000002003f00020000006603000038000000360100000400000032082000010007004000030000000000050000000500000001000000000000007f00000002000000090c0000030000000400000069dd936502000000001000000300000006000000010000000300000024c66e64d7aba80b198d20558f765fd502449e92411b42d9422250959ee94176ab02705b90ae3dc478d0f984aeb3e2616fa5f74fd7bec1c1ceffbbe422c0c4a56dc6320be78676575ee5b46a9166203accde3c218559740851900d191a23f5b9f7cbebe4250d9dc60a9bbcd3ebf8d8bdadb64f2694bf48608ead8838a74000308b39db0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000257cbe84f032572ce150fbac6c6be9ce0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000032d91a56e79bf333c1f3803e9b4f007490d0940507355024d34f08194e485896db5cc251c0c0f827dd216adfa4ce323ae69fe16e37bcdceff44f4dc90bcc29d6721745a3984976de3241b4bd71a13"], 0x54a) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0) [ 133.891079][ T9372] debugfs: File 'dropped' in directory 'md0' already present! [ 133.963116][ T9372] debugfs: File 'msg' in directory 'md0' already present! 00:33:44 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) [ 134.031051][ T9372] debugfs: File 'trace0' in directory 'md0' already present! 00:33:44 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0xfffffeac, &(0x7f0000000200)=0x1000000000000001) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000100)=0x63, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000340)={0x8001, 0x9, [0x8, 0x3ff, 0x4, 0x0, 0x4]}) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000080)={{0x0, 0x5, 0x3ff, 0x175, 0x80000000, 0x3}, 0x7f, 0x18ae000, 0x6}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x10000039a) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000000)={0x10000, 0x8, 0x0, 0x1000, 0x4, 0x3ff}) 00:33:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) setsockopt$llc_int(r0, 0x10c, 0xe27f5dfe0de40003, &(0x7f00000003c0), 0x4) write(r0, 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000200)={0x2, 0x20001000, 0x400, 0x5, 0xff, 0xfffffffffffffffb, 0x200, 0x2, 0x80000001, 0x1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x114, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xf4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x10000, @mcast1, 0x2}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9b6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x1, @local, 0x2}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x8, @empty}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x429c6f9b}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x4040004}, 0x4004000) writev(r0, &(0x7f000063e000)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) read$rfkill(r1, &(0x7f0000000000), 0x8) 00:33:45 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000040)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x7a, &(0x7f00000002c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "9bc89b", 0x44, 0x6, 0x0, @mcast2, @loopback, {[], @gre}}}}}, 0x0) 00:33:45 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x7fd) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000905ffff0000000000000002003f00020000006603000038000000360100000400000032082000010007004000030000000000050000000500000001000000000000007f00000002000000090c0000030000000400000069dd936502000000001000000300000006000000010000000300000024c66e64d7aba80b198d20558f765fd502449e92411b42d9422250959ee94176ab02705b90ae3dc478d0f984aeb3e2616fa5f74fd7bec1c1ceffbbe422c0c4a56dc6320be78676575ee5b46a9166203accde3c218559740851900d191a23f5b9f7cbebe4250d9dc60a9bbcd3ebf8d8bdadb64f2694bf48608ead8838a74000308b39db0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000257cbe84f032572ce150fbac6c6be9ce0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000032d91a56e79bf333c1f3803e9b4f007490d0940507355024d34f08194e485896db5cc251c0c0f827dd216adfa4ce323ae69fe16e37bcdceff44f4dc90bcc29d6721745a3984976de3241b4bd71a13"], 0x54a) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0) 00:33:45 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89f0, &(0x7f0000000040)={'b+-$\xa6e0\x00*\x01\t\x00'}) semget$private(0x0, 0x1, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f00000000c0)=0x1d) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000000)) 00:33:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) unshare(0x600) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) fadvise64(r0, 0x0, 0x0, 0x0) 00:33:45 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0affefff7f000000001e6ea64aa8e1c9", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x12139d25c0503e94) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, &(0x7f0000000040)={0xf2f6, 0x32525942, 0x3, @stepwise={0x7, 0x8001, 0xf98, 0x20, 0x100, 0x2}}) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000dcae60e939c125400000", @ANYRES16=0x0, @ANYBLOB="00000080000000d48c61f533bf577100090008000200000000000840020000000000"], 0x10}}, 0x0) 00:33:45 executing program 4: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000380)=0x100008001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x7843b548ee1f8f9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000003c0)={0x2, 0x100000001, 0x5}) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8000, 0x40) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$UI_SET_SNDBIT(r3, 0x4004556a, 0x4) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f74856f64653d30303030303030303030303030303030303030303030302c757365725f69643d4bac656bc69cfb681fe8c167303850fd842df7eeb12d02cc94eb9da77cf76d0472811af21cf17cd7527a93b28968ef5dadfddeed7a7c200e0822c3a07a74b6d723bc19a591cfff", @ANYRESDEC=r4, @ANYBLOB="2c67050000005f69643d", @ANYRESDEC=r5, @ANYBLOB=',max_read=0x0000000000000001,default_permissions,allow_other,blksize=0x0000000000000a00,default_permissions,blksize=0x0000000000001800,default_permissions,allow_other,max_read=0x00000000000000e3,euid>', @ANYRESDEC, @ANYBLOB=',defcontext=staff_u,\x00']) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) mkdirat(r6, &(0x7f0000000000)='./file0\x00', 0x80) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x1ff, 0x4) 00:33:45 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000640)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x50009404, &(0x7f00000000c0)) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000000)={0x0, 0x10000}) read(r0, &(0x7f0000000100)=""/252, 0xfc) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:33:45 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) [ 134.767042][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 134.767050][ T26] audit: type=1800 audit(1566693225.353:31): pid=9422 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16546 res=0 00:33:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0affefff7f000000001e6ea64aa8e1c9", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x12139d25c0503e94) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, &(0x7f0000000040)={0xf2f6, 0x32525942, 0x3, @stepwise={0x7, 0x8001, 0xf98, 0x20, 0x100, 0x2}}) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000dcae60e939c125400000", @ANYRES16=0x0, @ANYBLOB="00000080000000d48c61f533bf577100090008000200000000000840020000000000"], 0x10}}, 0x0) 00:33:45 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x101004, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000200)={0x7, &(0x7f0000000180)="5fbf83f22524e49f900d979f7352ea8bf5c8b5a46a25f4f994ec0ac1ead628ec0fd2114c297a0d9edc25287bdd4588b0cb6475def13ff7c8235c06c60451a13b7023120e597767259fc1ad743184ba98a682f3bac4e6b0ddf7d7d7f6bdb34d78179d8a7c477008cc66243b80624656bb"}) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x7fffffff, 0x80) ioctl(r1, 0xf9ae, 0x0) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x100000001, 0x80000) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000000c0)) fsetxattr$security_selinux(r1, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:semanage_read_lock_t:s0\x00', 0x2a, 0x3) 00:33:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7ff) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x3) read(r1, 0x0, 0x0) 00:33:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b400000000002ec175629b00000000b6cd0000000000000000000000020000007c417270f42860285595df59ed17978e33f53ca6fb3a97170b3a04719cbdd44b371fed2de15f66857dd5092757c45c6ae9396f1b6985a13a911bee2b6ffdd2748006d0ca656661f861355db6376c087da1b467a8526f1d45beccfe19"], &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 00:33:45 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="66643dd20dc4f768a2a6b402df0c6bb3861e257bf0a47ddaf56f5245b6da33b76504293392273391abb6c49b99a6c2eac83b3b21db2bd1c3da451607bc8fc2ec524908bc686e4d5fe37d093f4bb7951ef8c6528e0e796f6afa1282e25cdf76d4174a723dc854b7efa99cd03bbe5ffc169255867c17431f1b0f4eacf7350acb6c46a9e3746fc69321b0367e117134f0bcdebb3106963ffd4ef1dbfe127aef5e25583874c8fa6545676da239f6f5f475da39aea9667bdd8ba536cc73", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000180)={0x28, 0x2, 0x0, {0x1}}, 0x28) stat(&(0x7f0000000940)='./file0\x00', 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xb880000000, 0x80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000980)=ANY=[@ANYBLOB="908999922bde84373e351273d533b6020000928d2bd43b61784d499356f46f1a9f334e9af049ce6529ce857d929c9562002918d7118cb590f698287217cfb063d97faafb394f2390e54f844bd8c09a084cdd89813b1871575dbc41fe98ec63c1fb45e5a0d6b9c40bc75f33f391721aaa8027046c2ffe2864e97ceb7542c2d5673dcc40363874c6c1953f9ac8880252b3be6df90025ee98b420d733f532045f36a02f9f1f15948de3fc4e6f131d746a4e2e48c50ea36a4253956c720700b336153f5683a78900"/213, @ANYRES16=r2, @ANYBLOB="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"], 0x290}, 0x1, 0x0, 0x0, 0x10}, 0x800) [ 134.959374][ T26] audit: type=1800 audit(1566693225.543:32): pid=9422 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16546 res=0 00:33:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x2000, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@loopback, 0x4e22, 0x0, 0x4e22, 0x9, 0x2, 0x80, 0x80, 0x6c, 0x0, r2}, {0x5, 0xf97d, 0x3, 0x8000, 0x3ff, 0x5, 0x3, 0x200}, {0xffffffffffff8001, 0x2, 0x25cc, 0x6}, 0xffff, 0x6e6bba, 0x1, 0x1, 0x1}, {{@in=@multicast2, 0x4d2, 0x33}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x10}, 0x3507, 0x3, 0x3, 0x4, 0xe87, 0x68}}, 0xe8) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x801, 0x0) io_setup(0x9, &(0x7f0000000000)=0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) fcntl$dupfd(r4, 0x406, r0) io_pgetevents(r5, 0xff, 0x3, &(0x7f0000000040)=[{}, {}, {}], &(0x7f0000000180)={r6, r7+30000000}, &(0x7f0000000240)={&(0x7f0000000200)={0x7}, 0x8}) dup2(r3, r4) 00:33:45 executing program 4: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000380)=0x100008001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x7843b548ee1f8f9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000003c0)={0x2, 0x100000001, 0x5}) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8000, 0x40) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$UI_SET_SNDBIT(r3, 0x4004556a, 0x4) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f74856f64653d30303030303030303030303030303030303030303030302c757365725f69643d4bac656bc69cfb681fe8c167303850fd842df7eeb12d02cc94eb9da77cf76d0472811af21cf17cd7527a93b28968ef5dadfddeed7a7c200e0822c3a07a74b6d723bc19a591cfff", @ANYRESDEC=r4, @ANYBLOB="2c67050000005f69643d", @ANYRESDEC=r5, @ANYBLOB=',max_read=0x0000000000000001,default_permissions,allow_other,blksize=0x0000000000000a00,default_permissions,blksize=0x0000000000001800,default_permissions,allow_other,max_read=0x00000000000000e3,euid>', @ANYRESDEC, @ANYBLOB=',defcontext=staff_u,\x00']) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) mkdirat(r6, &(0x7f0000000000)='./file0\x00', 0x80) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x1ff, 0x4) 00:33:45 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:45 executing program 3: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000380)=0x100008001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x7843b548ee1f8f9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000003c0)={0x2, 0x100000001, 0x5}) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8000, 0x40) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$UI_SET_SNDBIT(r3, 0x4004556a, 0x4) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f74856f64653d30303030303030303030303030303030303030303030302c757365725f69643d4bac656bc69cfb681fe8c167303850fd842df7eeb12d02cc94eb9da77cf76d0472811af21cf17cd7527a93b28968ef5dadfddeed7a7c200e0822c3a07a74b6d723bc19a591cfff", @ANYRESDEC=r4, @ANYBLOB="2c67050000005f69643d", @ANYRESDEC=r5, @ANYBLOB=',max_read=0x0000000000000001,default_permissions,allow_other,blksize=0x0000000000000a00,default_permissions,blksize=0x0000000000001800,default_permissions,allow_other,max_read=0x00000000000000e3,euid>', @ANYRESDEC, @ANYBLOB=',defcontext=staff_u,\x00']) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) mkdirat(r6, &(0x7f0000000000)='./file0\x00', 0x80) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x1ff, 0x4) 00:33:45 executing program 5: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000380)=0x100008001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x7843b548ee1f8f9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000003c0)={0x2, 0x100000001, 0x5}) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8000, 0x40) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$UI_SET_SNDBIT(r3, 0x4004556a, 0x4) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f74856f64653d30303030303030303030303030303030303030303030302c757365725f69643d4bac656bc69cfb681fe8c167303850fd842df7eeb12d02cc94eb9da77cf76d0472811af21cf17cd7527a93b28968ef5dadfddeed7a7c200e0822c3a07a74b6d723bc19a591cfff", @ANYRESDEC=r4, @ANYBLOB="2c67050000005f69643d", @ANYRESDEC=r5, @ANYBLOB=',max_read=0x0000000000000001,default_permissions,allow_other,blksize=0x0000000000000a00,default_permissions,blksize=0x0000000000001800,default_permissions,allow_other,max_read=0x00000000000000e3,euid>', @ANYRESDEC, @ANYBLOB=',defcontext=staff_u,\x00']) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) mkdirat(r6, &(0x7f0000000000)='./file0\x00', 0x80) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x1ff, 0x4) 00:33:45 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:45 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000380)=0x100008001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x7843b548ee1f8f9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000003c0)={0x2, 0x100000001, 0x5}) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8000, 0x40) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$UI_SET_SNDBIT(r3, 0x4004556a, 0x4) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f74856f64653d30303030303030303030303030303030303030303030302c757365725f69643d4bac656bc69cfb681fe8c167303850fd842df7eeb12d02cc94eb9da77cf76d0472811af21cf17cd7527a93b28968ef5dadfddeed7a7c200e0822c3a07a74b6d723bc19a591cfff", @ANYRESDEC=r4, @ANYBLOB="2c67050000005f69643d", @ANYRESDEC=r5, @ANYBLOB=',max_read=0x0000000000000001,default_permissions,allow_other,blksize=0x0000000000000a00,default_permissions,blksize=0x0000000000001800,default_permissions,allow_other,max_read=0x00000000000000e3,euid>', @ANYRESDEC, @ANYBLOB=',defcontext=staff_u,\x00']) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) mkdirat(r6, &(0x7f0000000000)='./file0\x00', 0x80) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x1ff, 0x4) 00:33:45 executing program 2: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000380)=0x100008001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x7843b548ee1f8f9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000003c0)={0x2, 0x100000001, 0x5}) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8000, 0x40) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$UI_SET_SNDBIT(r3, 0x4004556a, 0x4) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f74856f64653d30303030303030303030303030303030303030303030302c757365725f69643d4bac656bc69cfb681fe8c167303850fd842df7eeb12d02cc94eb9da77cf76d0472811af21cf17cd7527a93b28968ef5dadfddeed7a7c200e0822c3a07a74b6d723bc19a591cfff", @ANYRESDEC=r4, @ANYBLOB="2c67050000005f69643d", @ANYRESDEC=r5, @ANYBLOB=',max_read=0x0000000000000001,default_permissions,allow_other,blksize=0x0000000000000a00,default_permissions,blksize=0x0000000000001800,default_permissions,allow_other,max_read=0x00000000000000e3,euid>', @ANYRESDEC, @ANYBLOB=',defcontext=staff_u,\x00']) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) mkdirat(r6, &(0x7f0000000000)='./file0\x00', 0x80) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x1ff, 0x4) 00:33:45 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) [ 135.306168][ T26] audit: type=1800 audit(1566693225.893:33): pid=9484 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16553 res=0 00:33:45 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:46 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000380)=0x100008001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x7843b548ee1f8f9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000003c0)={0x2, 0x100000001, 0x5}) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8000, 0x40) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$UI_SET_SNDBIT(r3, 0x4004556a, 0x4) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f74856f64653d30303030303030303030303030303030303030303030302c757365725f69643d4bac656bc69cfb681fe8c167303850fd842df7eeb12d02cc94eb9da77cf76d0472811af21cf17cd7527a93b28968ef5dadfddeed7a7c200e0822c3a07a74b6d723bc19a591cfff", @ANYRESDEC=r4, @ANYBLOB="2c67050000005f69643d", @ANYRESDEC=r5, @ANYBLOB=',max_read=0x0000000000000001,default_permissions,allow_other,blksize=0x0000000000000a00,default_permissions,blksize=0x0000000000001800,default_permissions,allow_other,max_read=0x00000000000000e3,euid>', @ANYRESDEC, @ANYBLOB=',defcontext=staff_u,\x00']) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) mkdirat(r6, &(0x7f0000000000)='./file0\x00', 0x80) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x1ff, 0x4) 00:33:46 executing program 3: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000380)=0x100008001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x7843b548ee1f8f9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000003c0)={0x2, 0x100000001, 0x5}) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8000, 0x40) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$UI_SET_SNDBIT(r3, 0x4004556a, 0x4) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f74856f64653d30303030303030303030303030303030303030303030302c757365725f69643d4bac656bc69cfb681fe8c167303850fd842df7eeb12d02cc94eb9da77cf76d0472811af21cf17cd7527a93b28968ef5dadfddeed7a7c200e0822c3a07a74b6d723bc19a591cfff", @ANYRESDEC=r4, @ANYBLOB="2c67050000005f69643d", @ANYRESDEC=r5, @ANYBLOB=',max_read=0x0000000000000001,default_permissions,allow_other,blksize=0x0000000000000a00,default_permissions,blksize=0x0000000000001800,default_permissions,allow_other,max_read=0x00000000000000e3,euid>', @ANYRESDEC, @ANYBLOB=',defcontext=staff_u,\x00']) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) mkdirat(r6, &(0x7f0000000000)='./file0\x00', 0x80) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x1ff, 0x4) 00:33:46 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) [ 135.419640][ T26] audit: type=1800 audit(1566693225.923:34): pid=9500 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16542 res=0 00:33:46 executing program 2: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000380)=0x100008001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x7843b548ee1f8f9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000003c0)={0x2, 0x100000001, 0x5}) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8000, 0x40) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$UI_SET_SNDBIT(r3, 0x4004556a, 0x4) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f74856f64653d30303030303030303030303030303030303030303030302c757365725f69643d4bac656bc69cfb681fe8c167303850fd842df7eeb12d02cc94eb9da77cf76d0472811af21cf17cd7527a93b28968ef5dadfddeed7a7c200e0822c3a07a74b6d723bc19a591cfff", @ANYRESDEC=r4, @ANYBLOB="2c67050000005f69643d", @ANYRESDEC=r5, @ANYBLOB=',max_read=0x0000000000000001,default_permissions,allow_other,blksize=0x0000000000000a00,default_permissions,blksize=0x0000000000001800,default_permissions,allow_other,max_read=0x00000000000000e3,euid>', @ANYRESDEC, @ANYBLOB=',defcontext=staff_u,\x00']) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) mkdirat(r6, &(0x7f0000000000)='./file0\x00', 0x80) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x1ff, 0x4) 00:33:46 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) getgroups(0x2, &(0x7f0000000000)=[0xee01, 0xffffffffffffffff]) lchown(&(0x7f0000000640)='./file0\x00', 0x0, r0) 00:33:46 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) [ 135.540606][ T26] audit: type=1800 audit(1566693225.933:35): pid=9490 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16533 res=0 00:33:46 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:46 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:46 executing program 5: unshare(0x400) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0xa400, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'rose0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) fdatasync(r0) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, 0x0) [ 135.675612][ T26] audit: type=1800 audit(1566693225.963:36): pid=9495 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16543 res=0 00:33:46 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x2000000000) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000a00), 0x0) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000480)=0xfffffffffffffd1b) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000cc0)=ANY=[], 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000a00)='cgroup.stat\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x3b3a309b4685d809, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) unshare(0x40000000) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000940)) socket$inet(0x2, 0x0, 0x0) socket$inet(0x10, 0x800, 0x6) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0), 0x0, 0x0, 0x1af}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f0000000140)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000100)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000540)={0x3, {{0xa, 0x0, 0x2, @remote}}}, 0x88) getsockopt$inet_int(r1, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000680)={0x0, 0x0, 0x1000000000000, 0x0, 0x40000, 0x1}, 0x0) r4 = socket$inet6(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000002c0)={r3, 0x0, 0x3fe}, 0x3d8) setsockopt$inet6_int(r4, 0x29, 0xc8, &(0x7f00000004c0), 0x38) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0)={0x3, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}, 0xb}, {0xa, 0x0, 0x7, @loopback}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x5c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 00:33:46 executing program 1: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x20000000001, "01b6"}, 0x4) [ 135.802424][ T26] audit: type=1800 audit(1566693226.043:37): pid=9509 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16530 res=0 00:33:46 executing program 5: r0 = socket$inet6(0xa, 0x454e33f7053a5dc4, 0x200001001) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x200}, 0x1c) connect$inet6(r0, &(0x7f00000005c0)={0xa, 0x0, 0x0, @local, 0x7268}, 0x1c) [ 135.883881][ T26] audit: type=1800 audit(1566693226.193:38): pid=9521 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16560 res=0 00:33:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xfffffffffffffff8) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000001503000028feffff720af0fff8ffffff71a4f0ff00000000b706000000000001dd400300000000003406000001ed000171185400000000006c640000000000007b0300fe00000000850000002e000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf11c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599aceaebbdbd7359a48f5b0afc646cb779"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 00:33:46 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) [ 135.928884][ T9555] IPVS: ftp: loaded support on port[0] = 21 00:33:46 executing program 2: r0 = socket$packet(0x11, 0x4000000000002, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454e00065b05007311"], 0xa) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f0000000080)={'team_slave_0\x00', {0x2, 0x4e24, @multicast1}}) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r5, 0x4020565b, &(0x7f0000000100)={0x8001002, 0x9, 0x1}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x2) 00:33:46 executing program 1: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x20000000001, "01b6"}, 0x4) [ 135.997148][ T26] audit: type=1800 audit(1566693226.223:39): pid=9517 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16559 res=0 00:33:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x100) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000000)={0x21, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x1, 'dh\x00', 0x8, 0x5f, 0x28}, 0x2c) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x68) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 00:33:46 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000940)='system.posix_acl_default\x00', &(0x7f0000000980)={{}, {0x1, 0x1}, [{0x2, 0x3, r3}, {0x2, 0x7, r3}, {0x2, 0x6, r1}, {0x2, 0x1185bd5e4e618c44, r1}, {0x2, 0x7, r4}, {0x2, 0x4, r3}], {0x4, 0x2}, [{0x8, 0x4, r5}], {0x10, 0x4}, {0x20, 0x5}}, 0x5c, 0x3) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000580)=0xe8) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="78020000000000000500000000000000010000000000000003000000000000000200000000000000b2000000000000000600000008000000060000000000000000000000000000000300000000000000060000000000000006000000000000005f0000000000000000000000040000e58b33fc8f126e14570e67c8244e6c00050000001f000000f9ffffff", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="1f00000001000000000000000600000000000000010000000000000000002f0f2f0a000005e1000000000000030000000000000003000000000000000000000000000000ff03000026dab53d652b23e02b56e2210b001004000000000000000800000000000000060000000000000008000000000000001f00000000000000020000000000000002000000ff03000009000000070000632a82aea4", @ANYRES32=r3, @ANYRES32=r5, @ANYBLOB="000000807e5e00000000000002000000000000002f0d000000000000000000000101000002000000000000000000000000000000010400000000000081000000000000000800000002000000020000000000000003000000000000001f0000000000000001000000000000000600000000000000090000000000000007000000090000001d9c0000010000002f080000", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="c60e000002000000000000000300000000000000ffff00000000000004000000010000007573657200000000020000000000000001000000000000000700000000000000ff0f000000000000070000007f0000000600000000000000030000000000000003000000000000000600000000000000d70d000000000000000000000000000000c02f0100000004080000007e06000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="1e01000007000000000000000200000000000000ffffffff00000000000000003f000000"], 0x278) mlockall(0x1) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) 00:33:46 executing program 1: r0 = socket(0x11, 0x3, 0x3) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x617383a09d843321) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) unshare(0x22000400) fcntl$F_SET_RW_HINT(r0, 0x4, 0x0) [ 136.104220][ T26] audit: type=1800 audit(1566693226.433:40): pid=9551 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16555 res=0 00:33:46 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x100000001, 0x0) [ 136.341680][ T9561] IPVS: ftp: loaded support on port[0] = 21 00:33:47 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000000)={0x6f}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f00000000c0)={0x1, 0x2, 0x81, 0xffffffff}, 0x10) ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f0000000100)={0xb1cd0000000000}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000000090001000000000000000000000000080001004599aa27bad95f0e03176c1b8755d9e16ae89ba2b9290510b6718381930de366fcededdc1b045bae52dca4174982cdb7614fc2843f279b482c4575b5fb41e50ef290ef8b6b2d45096642eabac94fcd06682f9de42bafc32812782e3c715bed1dbcfff30bbe99fbfa90f8a090ef45cb845435d2fbf87da2d0c043adce1da85a19af29841862a7fcc5def48736d1ddfc58c65f76", @ANYRES32, @ANYBLOB="04000200"], 0x20}, 0x1, 0x0, 0x0, 0x2}, 0x0) 00:33:47 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) accept4$netrom(r2, &(0x7f0000000100)={{0x3, @rose}, [@bcast, @remote, @rose, @bcast, @null, @null, @bcast, @default]}, &(0x7f0000000180)=0x48, 0x80800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 00:33:47 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:47 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a2, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfaD\x00\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfaD\x00\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 00:33:47 executing program 3: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x41fe, 0x0) bind$rxrpc(r1, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e24, @rand_addr=0x7}}, 0x24) truncate(0x0, 0x4) futimesat(0xffffffffffffffff, 0x0, 0x0) [ 136.752454][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 136.752457][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 136.752490][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 136.758260][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:33:47 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) unshare(0x40600) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3}) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000000)) 00:33:47 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x4, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:33:47 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000100)=""/157) listen(r0, 0x4d) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0x88, &(0x7f0000000040), &(0x7f00000000c0)=0x3b8c3dfc45cf9699) 00:33:47 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:47 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) sendmsg$nfc_llcp(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000080)=""/215) 00:33:47 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="7b303a5d3a205c35363a6b92fd03d4ad270000e7c89cf57c67000000007accdf6259"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ceph\x00', 0x0, 0x0) 00:33:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x6) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000000)=0x3) 00:33:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00000002c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xacV.-0\xdd\x1f+\x1c\xe5\x81\xb5\x86\x971\xe9\xf3}\xda\t\x8fJ\x92fDF\xe1>\x1c\xf4\xbb\x8fUE\xad\x03\x8e\xa6\x156\x11\x89Z#$\xfc\xe7\x1b3\xa9}\x14X\xde\xffy\xd6r%\xb5i\xf5&V^`\x8dZ\x80\xd3\xfc\x9c\xbb%\x90\xa5Kl\x91\xde3\x83\xc5|Q1TP\x1f\x98t\v\x01n\xect\xf2)V\xa9H\f:9Y\x1d\xdf\x15\x98\xc2\xde\xb4\xcf\xe7\xa3\x8fcj\xd8[v\x0fs\x1b@\xaa*Lt\xb7\xd4\xe7\x88\"\x85\xf0\xaa\xf6\xbf\xb4\\qC\xb5\xf1\x84\x8an&\x05Z\x15N\xdd\xcb\xd5\xe9\xb5\x85F\xfb\xad\xb3<\xef*8A\xb5\xc7\x13\xafPZ\xab\xcf\x95/\xe2\xb5\x14\n\a\xf0\x84\x9d\xbeJ\x14\x92\xf8X\xb3\x9aKs.\x8e_G\x92\xcd\xed\xd8}h\xba\xabI\xaak\xe8~\xe3\x88\x12\xc1Q\xc3ro\x81\x01\x1bGU%$\xd34\x8e\xb6\xd0\xa33\x01)\xc1\xaa\xb6\x8b\xcb\xb5\t\x96J\xb4+\xa2\v\a\xbe\x01\xd62\xda\x84\x97\xdau\xcc\xcf\x9a\xc3\xe4\b\xa9\xae\x19\xd7!\x17vo\x80\xa0:\x7f\x1e\xbd\v\x9e0\xdf\x06,ov\xe9I$0\xac\x18\x1f\xc6\xe1*\xdb\xa9\xd7\x86=Ku\t8!\x93\x02a\xb6\x00\bA\xd7\xae\x85\x88\x98{\x16\xe5\xe4X\xa3\xf3\xf8N5\xd6L\x1ch\x90\xdc\x11\xe7T\xe2\xf8\fNf^0\x98KH\xfe\xba\xa2{\xf8\xa7W\xd12S\\\x1a\x1d\x84\xaa\x92\x15\xe64\rv\x80`\x19\f^B\xe3\xb2\t\x1aF\xe7\x91\xf8\xcfO\v\xb0\x8f*\xd8\x9a9\xf9u\x90<\xb4\xd2\x04\x9d\x83.N0\xf6\xca\xe6\xd9\x04\x1b\xee\xe8\x06\v\xcb\x84*\xb6\x02\xd0\x16w\xc4\xce\x12\xb9\x8a\xea)\a\xb5k\xac\x874\x1e\xc0\x13\xf6-\x9f\x89\xf4\x97fs\x8a7\xbf\xbc\xde\x18/\x94\xf9\xf2\xc6\x1fix^\x13\x8as\xe0\x98J\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x3) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESDEC=0x0, @ANYRES32=r1, @ANYRES64=r2, @ANYRESOCT=r0, @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESOCT=r2, @ANYPTR, @ANYBLOB="5194d852080d0b37700616dd717d2c243b9268bb6b2d1d1dc8c7a6e5ac1a3a98d33c88528ac6147010309fa6d9bf9eb8be81343ebc309a43f0a563037cfa88bbf9f669096990", @ANYPTR64, @ANYPTR, @ANYRES64=r2, @ANYRESDEC=r0, @ANYPTR64, @ANYRESDEC=r0]]], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(r2, &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) write$input_event(r3, &(0x7f00000001c0)={{0x77359400}, 0x4, 0x7, 0xfffffffeffffffff}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r2, 0x0) 00:33:47 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000300)={0xfffffffffffffffc, 0x0, 0x0, 'queue1\x00'}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x41) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000040)={0xfa, "dda985e91cad2cd423d187e99648a1633fb7000e419efc4cb8c8612c6d8062b4", 0x0, 0x71, 0x9, 0x1, 0x1}) [ 136.988759][ T9652] ceph: device name is missing path (no : separator in {0:]: \56:k’ýÔ­') 00:33:47 executing program 2: r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000080)={0x7fffffff}) 00:33:47 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/251, 0xfb}, {&(0x7f0000000380)=""/137, 0x89}, {&(0x7f0000000440)=""/132, 0x84}, {&(0x7f0000000040)=""/115, 0x73}, {&(0x7f0000000500)=""/244, 0xf4}], 0x6) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) stat(0x0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000c40)={{}, {0x1, 0x3}, [{}, {0x2, 0x3}, {0x2, 0x2}], {0x4, 0x7}, [{0x8, 0x0, r1}, {0x8, 0x2}, {0x8, 0x2}, {}, {}, {}], {0x10, 0x6}, {0x20, 0x7}}, 0x6c, 0x1) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 00:33:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) r2 = accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10, 0x80800) fgetxattr(r2, &(0x7f0000000080)=@random={'user.', '/dev/audio\x00'}, &(0x7f00000000c0)=""/53, 0x35) syz_open_dev$sndpcmp(0x0, 0x0, 0xd4dc5) dup2(r1, r1) 00:33:47 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:47 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000300)={0xfffffffffffffffc, 0x0, 0x0, 'queue1\x00'}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x41) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000040)={0xfa, "dda985e91cad2cd423d187e99648a1633fb7000e419efc4cb8c8612c6d8062b4", 0x0, 0x71, 0x9, 0x1, 0x1}) 00:33:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000300)={0xfffffffffffffffc, 0x0, 0x0, 'queue1\x00'}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x41) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000040)={0xfa, "dda985e91cad2cd423d187e99648a1633fb7000e419efc4cb8c8612c6d8062b4", 0x0, 0x71, 0x9, 0x1, 0x1}) 00:33:47 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0x5, 0x4) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0)=0x1, 0x4) connect$tipc(r0, &(0x7f0000000000), 0xa4) 00:33:47 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000a80)=0xfff) syz_emit_ethernet(0x66, &(0x7f00000009c0)=ANY=[@ANYBLOB="0180c2000000d6de8e219d5586dd6008de060030210000000000000000000000ffffe0000002ff0200000000000000000000000000010200907800000000609433df00000000000000000000000000000000000000010000000000000000000000000000000135b436c0d9f6acb579d24f457bc1ed6ef6857d7f1c34c6d9d0d63096804d2dceb96225fd4343e479b40763ca1bc622a632e0437230e912aac716761615938412e9aa75fdadc13c"], 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000ac0)={[], 0x0, 0x2f2, 0x7ff, 0x3f, 0x4}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000140)="4c53771ba2094cb18274af155337907d", 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0xfeffffff00000000, 0xe, 0x0, &(0x7f0000000040)="5400fffc4418805345e2eaf0d1d9", 0x0, 0xeffc}, 0x28) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) getresuid(&(0x7f0000000180), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000900)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000008c0)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000940)={0x13, 0x10, 0xfa00, {&(0x7f00000006c0), r4}}, 0x18) accept4$rose(r2, 0x0, &(0x7f0000000300), 0x800) r5 = getegid() write$FUSE_ENTRY(r0, &(0x7f0000000600)={0x90, 0x0, 0x8, {0x3, 0x2, 0x5ad5df60, 0x9, 0x200, 0x929, {0x5, 0x6, 0xf1, 0x9, 0x5, 0x1, 0x9, 0x9, 0x7b2, 0x2, 0x0, r3, r5, 0x2, 0x5}}}, 0x90) ioctl$VIDIOC_DBG_G_CHIP_INFO(r2, 0xc0c85666, &(0x7f0000000500)={{0x2, @name="1b7472c8e6fae5076838f1d9dc8bce0f676ab4823586048b5a1bee45b894baf1"}, "25bb8b9d9cce3c2a5c579b3743f6f5973585c51f89aea64b0d32e874db594266", 0x5298153268bea4c7}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000b40)={[0x116, 0x9, 0x80000001, 0x9, 0x3a, 0x0, 0x9, 0x1c00000000000000, 0x0, 0x5, 0xf, 0x9, 0x100000001, 0x180, 0x100000000, 0xe000000000000], 0x6000, 0x40}) 00:33:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f00000000c0)=0x200003, 0x9b06ac4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 00:33:47 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) [ 137.353937][ T9708] overlayfs: filesystem on './file0' not supported as upperdir 00:33:48 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[&(0x7f00000007c0)='\x00']) 00:33:48 executing program 5: mremap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000005000/0x1000)=nil) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) socket$nl_xfrm(0x10, 0x3, 0x6) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x0, 0x401}, &(0x7f0000000300)=0x90) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000200)) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000002c0)={0x0, r0}) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r1, 0x1ff}, 0x13e) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x100000010) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000280)={r1, 0x4b}, 0x8) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000007000/0x2000)=nil) 00:33:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000480)=ANY=[@ANYBLOB="0400000000000000ff0f0000000000000500000000000000", @ANYRES32=r0, @ANYBLOB="000000000200"/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r0, @ANYBLOB="000000006b00000000000000000000000000f2e700000000000093d6", @ANYRES32=r1, @ANYBLOB="00000000ff0700"/28, @ANYRES32=r1, @ANYBLOB="000000000400"/28]) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap(&(0x7f0000fee000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0xbffff000) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffe, 0x1, 0x7}, &(0x7f0000000140)=0x2c6) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x2, 0x2, 0x0, 0xbd71, r2}, 0x10) 00:33:48 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x6c05, 0x0, 0x0, 0x0, 0x0, 0x7fff}) 00:33:48 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200000, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="19b29034eb561bcffc7a75ae62a29dbb", 0x4b, r1}) r2 = socket$inet6(0xa, 0x1, 0xb4) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) 00:33:48 executing program 2: r0 = creat(&(0x7f0000000400)='\x00', 0x100) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000440)={'filter\x00', 0xd2, "fe706e9eaf13289d6404b45ce44d5c66efe5215c4d7e17ec55db42e5d01a985e12db54229c5553248a62333800dd083496027bf42e6adcffb074d17fcad22d9edbfdbef5f72b26ad73bf943f490932ea6da0527287df8251f5f7c4ee7756610599937330f5d12b3c10bb3712d1ce564c45d5495d5b84fbdfcd0d44f4cc7984925771751985bf0cfc9ed629b1faa84227fa32db0ed5fda792fa57f4464269b9716d43236ae5ac6fa4d3fcc88540d49d9377ddebc18173c24ed2ae5af7c27e3f6092fff34adfbc1a36212cd0db4958cd939972"}, &(0x7f0000000540)=0xf6) syz_read_part_table(0x0, 0x3, &(0x7f0000003600)=[{0x0, 0x0, 0x80000001}, {&(0x7f0000000000)="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", 0x1e1}, {&(0x7f0000000200)="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", 0x1da, 0x4}]) 00:33:48 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) mount$9p_unix(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000000)={'trans=unix,', {[], [], 0x5c00}}) 00:33:48 executing program 5: mremap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000005000/0x1000)=nil) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) socket$nl_xfrm(0x10, 0x3, 0x6) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x0, 0x401}, &(0x7f0000000300)=0x90) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000200)) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000002c0)={0x0, r0}) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r1, 0x1ff}, 0x13e) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x100000010) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000280)={r1, 0x4b}, 0x8) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000007000/0x2000)=nil) [ 137.609015][ T9740] EXT4-fs warning (device sda1): verify_group_input:105: Cannot add at group 27653 (only 16 groups) 00:33:48 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:48 executing program 1: mremap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000005000/0x1000)=nil) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) socket$nl_xfrm(0x10, 0x3, 0x6) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x0, 0x401}, &(0x7f0000000300)=0x90) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000200)) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000002c0)={0x0, r0}) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r1, 0x1ff}, 0x13e) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x100000010) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000280)={r1, 0x4b}, 0x8) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000007000/0x2000)=nil) 00:33:48 executing program 2: mremap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000005000/0x1000)=nil) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) socket$nl_xfrm(0x10, 0x3, 0x6) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x0, 0x401}, &(0x7f0000000300)=0x90) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000200)) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000002c0)={0x0, r0}) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r1, 0x1ff}, 0x13e) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x100000010) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000280)={r1, 0x4b}, 0x8) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000007000/0x2000)=nil) 00:33:48 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0xa989) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffe58) r1 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x2, 0x24080) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @mcast2, 0xa72}}, [0x6, 0xff, 0x7fff, 0x7fff, 0x8000, 0x8, 0x8fd2, 0x9, 0x9, 0x9, 0x8, 0x3, 0x5, 0xffffffffffffffcd, 0x970]}, &(0x7f0000000000)=0x100) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f00000002c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @bcast, @netrom={'nr', 0x0}, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @null, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r2, 0x3}, &(0x7f0000000200)=0xc) fallocate(r0, 0x3, 0xa000, 0x7ffd) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000280)={0x1, 0x0, 0x0, 0x1, {0xffffffff, 0x1, 0xffffffffffffffb0, 0x6}}) fallocate(r0, 0x3, 0x5e89, 0xfff9) 00:33:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40100, 0x0) shmget$private(0x0, 0x200000, 0x800, &(0x7f0000dfd000/0x200000)=nil) syz_open_dev$vivid(&(0x7f0000000240)='/dev/video#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000000c0)={0x1, 0x7, 0x40, 'queue0\x00', 0x80}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="25bca274769e620aa734faff94e0612687463915e38802a9d8aea872943afd874e2f98b579a71862700402000000000000003cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="7374726970653d3078303030303030302c407ddb9e12ff2a7a97a389884d4ad68abb11ce4a097b6a0cf286fe938bce0d8c09a10d76849f267db963a5e6ccf5833bb8cea5d2ef942929e6512bb8e0570de95c8803d582bbe0aedfdcc9f71728f81bdf82ab4dd6ee94510e7eaed27f62e998983d437c1fa669aabe986783d3dc6bd0496608e40364789e15a6af1d12aed8c18ae8e61e76daec284a1de97282f2b6ac22d35c269a80a52cb033b8157fcc5f95f8316d3ab2abcd2b10402ea275943789ebb14dc09b9b750239b152930f9536b4415deeaeb7ad472821"]) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000280)={0x2, 0x7f736520}, 0x2) 00:33:48 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:48 executing program 1: mremap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000005000/0x1000)=nil) r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) socket$nl_xfrm(0x10, 0x3, 0x6) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x0, 0x401}, &(0x7f0000000300)=0x90) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000200)) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000002c0)={0x0, r0}) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r1, 0x1ff}, 0x13e) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x100000010) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000280)={r1, 0x4b}, 0x8) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000007000/0x2000)=nil) 00:33:48 executing program 3 (fault-call:1 fault-nth:0): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 138.079000][ T9792] FAULT_INJECTION: forcing a failure. [ 138.079000][ T9792] name failslab, interval 1, probability 0, space 0, times 1 [ 138.142894][ T9792] CPU: 1 PID: 9792 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 138.150805][ T9792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.160852][ T9792] Call Trace: [ 138.164146][ T9792] dump_stack+0x1d8/0x2f8 [ 138.168473][ T9792] should_fail+0x555/0x770 [ 138.172886][ T9792] __should_failslab+0x11a/0x160 [ 138.177815][ T9792] ? getname_flags+0xba/0x640 [ 138.182484][ T9792] should_failslab+0x9/0x20 [ 138.187067][ T9792] kmem_cache_alloc+0x56/0x2e0 [ 138.191824][ T9792] getname_flags+0xba/0x640 [ 138.196320][ T9792] getname+0x19/0x20 [ 138.200201][ T9792] __x64_sys_execve+0x78/0xb0 [ 138.204871][ T9792] do_syscall_64+0xfe/0x140 [ 138.209364][ T9792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 138.215252][ T9792] RIP: 0033:0x459879 [ 138.219133][ T9792] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:33:48 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f00000000c0)={{0x255c9dd53ec781ea, @addr=0x2}, 0x8, 0x100000001, 0x8}) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0xfffffffffffffff, @random="b7bdbcd6c259", 'rose0\x00'}}) r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000080)={0x5}) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000140)={{0x3, @addr=0x7}, 0x8, 0x1}) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000180)={@empty}, &(0x7f00000001c0)=0x14) 00:33:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x800) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000080)) lsetxattr$security_capability(&(0x7f0000000280)='./bus\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000001c0)=@v3, 0x18, 0x0) clone(0x4000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) [ 138.238824][ T9792] RSP: 002b:00007f7d92d6ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 138.247233][ T9792] RAX: ffffffffffffffda RBX: 00007f7d92d6ac90 RCX: 0000000000459879 [ 138.255202][ T9792] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 138.263169][ T9792] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 138.271130][ T9792] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d6b6d4 [ 138.279095][ T9792] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:49 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x100, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x204}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r1, 0x100, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0x7, @bearer=@udp='udp:syz1\x00'}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4008000) r2 = epoll_create1(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='syscall\x00') name_to_handle_at(r3, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="25000000c31d4703c656a63a0e9b6ab3f1b54129c4d479a900000000000000000000000000272ea65499049f2f7c31ea8327a32c302d050fb202a14b00df33bedd3595e751aaca6cc87161a7006f"], &(0x7f0000000140), 0x1400) r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) modify_ldt$read(0x0, &(0x7f00000003c0)=""/211, 0xd3) fcntl$lock(r2, 0x400000007, &(0x7f0000000040)={0x0, 0x0, 0x3f}) 00:33:49 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0xe, &(0x7f0000000080)=[@window, @timestamp, @sack_perm, @sack_perm], 0x4) 00:33:49 executing program 3 (fault-call:1 fault-nth:1): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:49 executing program 1: syz_emit_ethernet(0xe2e0b47aac81a450, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c28800000180c200000019480000060016770c7e502073432064c0fbc8de6bf5967c96a4ece2af38f391342735a8148341"], 0x0) r0 = accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) [ 138.508943][ T9751] 9pnet: p9_fd_create_unix (9751): problem connecting socket: éq‰Y’3aK: -111 [ 138.560891][ T9821] FAULT_INJECTION: forcing a failure. [ 138.560891][ T9821] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 138.574112][ T9821] CPU: 0 PID: 9821 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 138.574118][ T9821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.574122][ T9821] Call Trace: [ 138.574136][ T9821] dump_stack+0x1d8/0x2f8 [ 138.574149][ T9821] should_fail+0x555/0x770 [ 138.574165][ T9821] should_fail_alloc_page+0x55/0x60 [ 138.592076][ T9821] prepare_alloc_pages+0x283/0x470 [ 138.592089][ T9821] __alloc_pages_nodemask+0xb2/0x5d0 [ 138.592105][ T9821] kmem_getpages+0x56/0xa20 [ 138.592115][ T9821] ? trace_lock_release+0x135/0x1a0 [ 138.592126][ T9821] cache_grow_begin+0x7e/0x2c0 [ 138.592136][ T9821] cache_alloc_refill+0x311/0x3f0 [ 138.592145][ T9821] ? check_preemption_disabled+0xb7/0x2a0 [ 138.592157][ T9821] kmem_cache_alloc+0x2b9/0x2e0 [ 138.629777][ T9821] ? getname_flags+0xba/0x640 [ 138.639514][ T9821] getname_flags+0xba/0x640 [ 138.639527][ T9821] getname+0x19/0x20 [ 138.639539][ T9821] __x64_sys_execve+0x78/0xb0 [ 138.654711][ T9821] do_syscall_64+0xfe/0x140 [ 138.654725][ T9821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 138.654733][ T9821] RIP: 0033:0x459879 [ 138.654741][ T9821] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.654746][ T9821] RSP: 002b:00007f7d92d6ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 00:33:49 executing program 5: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8001, 0x40200) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0xd2, 0x220002) ioctl(r1, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x20}, {0x6, 0x0, 0x0, 0xffffff7f7fffdffe}]}) 00:33:49 executing program 4: r0 = fsopen(&(0x7f0000000300)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x8400, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000040)={0x2, 0x954}, 0x2) 00:33:49 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:49 executing program 3 (fault-call:1 fault-nth:2): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x2, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000080), 0x1d5) 00:33:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0xfffffffffffffd00) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) r1 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x402}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @local, @multicast1}, &(0x7f0000000680)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004800)={0x0, @dev, @dev}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f0000004880)={@local}, &(0x7f00000048c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000004a40)) readv(r2, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) accept4$alg(r1, 0x0, 0x0, 0x0) io_setup(0x20000000001005, &(0x7f0000000880)) [ 138.654754][ T9821] RAX: ffffffffffffffda RBX: 00007f7d92d6ac90 RCX: 0000000000459879 [ 138.654758][ T9821] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 138.654763][ T9821] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 138.654767][ T9821] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d6b6d4 [ 138.654772][ T9821] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x6, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x800}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={r1, 0x3ea, 0xfffffffffffffffc}, 0x8) [ 138.837204][ T9854] FAULT_INJECTION: forcing a failure. [ 138.837204][ T9854] name failslab, interval 1, probability 0, space 0, times 0 [ 138.883240][ T9854] CPU: 1 PID: 9854 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 138.891158][ T9854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.901205][ T9854] Call Trace: [ 138.904479][ T9854] dump_stack+0x1d8/0x2f8 [ 138.908785][ T9854] should_fail+0x555/0x770 [ 138.913194][ T9854] __should_failslab+0x11a/0x160 [ 138.918104][ T9854] ? dup_fd+0x71/0xc90 [ 138.922149][ T9854] should_failslab+0x9/0x20 [ 138.926635][ T9854] kmem_cache_alloc+0x56/0x2e0 [ 138.931370][ T9854] dup_fd+0x71/0xc90 [ 138.935243][ T9854] unshare_files+0xc4/0x270 [ 138.939721][ T9854] __do_execve_file+0x1f4/0x1c50 [ 138.944637][ T9854] ? getname_flags+0x214/0x640 [ 138.949374][ T9854] __x64_sys_execve+0x94/0xb0 [ 138.954022][ T9854] do_syscall_64+0xfe/0x140 [ 138.958510][ T9854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 138.964375][ T9854] RIP: 0033:0x459879 [ 138.968261][ T9854] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.987839][ T9854] RSP: 002b:00007f7d92d6ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 138.996221][ T9854] RAX: ffffffffffffffda RBX: 00007f7d92d6ac90 RCX: 0000000000459879 [ 139.004166][ T9854] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 139.012109][ T9854] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 139.020053][ T9854] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d6b6d4 00:33:49 executing program 5: mlockall(0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x56, 0x200) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) r4 = getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002400)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000002500)=0xe8) r6 = getgid() r7 = getpgid(0x0) getresuid(&(0x7f0000002540), &(0x7f0000002580), &(0x7f00000025c0)=0x0) getresgid(&(0x7f0000002600), &(0x7f0000002640), &(0x7f0000002680)=0x0) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000026c0)='cgroup.threads\x00', 0x2, 0x0) sendmsg$netlink(r0, &(0x7f0000002780)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfc, 0x80220000}, 0xc, &(0x7f00000023c0)=[{&(0x7f0000000240)={0x2168, 0x7ff, 0x0, 0x70bd26, 0x25dfdbfb, "", [@typed={0x80, 0x33, @binary="fb6b9cb78e30eadd7b83bbe730bf6673b47c18bec9c084e51a0a14d83c7955c6cbf3ef05748b7aad91ecc8817241b7249ff70d6122413e1f3ad43eb5e0b4d0edb9c035c4dbc7fd87c1fc048cb20c27f4a27c1251108285b6da5478453f14ca6437c853b36e0ef3940fbe712c31eeaf0559278a03056ac53c3c6c59"}, @nested={0x20c8, 0x5e, [@generic="997f4b5a0e7c460b35410dc7abe33ee1db6fb8b710a89dfd5e25cf3d6b3367cfce08efcd3a4db5d1700864028bb63731290513ed54906bbb391c7eeff3ded6d0bc1ebde6e18f158bfafbd9199f0dfeefa8d759372cd690d2907e68377f57cd49a5e30191c4664a2d11315fd7586acf4fbe976802c519d0e2c3c2d755a4650f1d36cd8c7370a4a8936f7693068c50000b0047ff4845b04cb3f9e14a1ad9b0b0f20faa58ebe3075684c0482a8ac8fe67b9a9b9fea17a56a5be52c718a451f56e81b6eb7b5bf2977a6242e8e2aaf05ec6774126793057e8f2a7ba17b4468f143b58e0a191540bf4e9e36e9cfee8c586de8301d7b7dcb68e6b083729dda67cceef186a50bcabb7b22e53b3cc09526feb61e9b6ab1759e26be1f2110c1d1fd8d51b8009d000fe8910398e9fc2120cf25454e18ee5e82cde7fd26ee97ef3ef7bd9eccc84f792feb6eaa88ccd2aa4b80b2d8796c58e11c6755e17f242bfa27d5e2900c8b48f91bf89e62d5cee03c3e31415405ec9553a11acdda0ef50bb770eeaadb9c93c2e32b05c78efea8525601ffafff3f236c523f512592fd98dfb6fd56eccf11a604c8c923c4e7056c4ffabb0b87b35ec2ce369c0b995ae7904a6b682af7b7fe40376a7c3fb2fbea0112b5ec7469f36cbb8962dc92e4f9e17dd3d537e627e8eb055bda9351887a8591b6e93cc0458d5bf3efaaba62c476e3eaa398feeed3912593192c47f5e29cf222dd721ea089e0f2e37a425fa619766fe406c8d3f164ab35f7078a71ce5957809e6b3883070e957a037e3257943c92504f2d78a66c0606348759da45a58106e827343a67ef38144b108c064ec405d65d9802c6b26b2693b211611e81f42bb6a4c3450874d609d0bdb376d47a16727e38b82be402f167be50e67b823745f61ae10f7b5bd03c421dee3ce501c8740c7342806041453fed0d0b011f3ab048527e42ad466140ee26dbb99f2b983b969cc2100d42d372a0786c5dacf2e752e2604c2bfaa637e0fec7fca3e7b6c796dddcc128262e981022d55bd6d9945099e6dd7e20e8e7144e0ce638a8ef85405eee5643ba23b65886d7db44be46996e58ead83cc2e87d4c457ed54f3bb1230333ed604e722ea467b73e07620c619b3001792dbf9a8e722177d9edcc2f486e9a9fe05d83c32209afa1845ab413742c937306d2cad93a0f1bf50ed9ee464202d7a5ae9c419a6ab51e9224ce39aae02c46c1b9e6fb118a68a7fda111453f2cc2e6acb8b24ad7b59526f5f237b1d15ac386cd1b2a1b5824e95ca33836a5d73f450e401f332d0978feba538dcb0ee62da614ed271e9540153aabc1f818667953e22ba21639c1a27ea76e37237e335702883790d9f96290f0397104b4048e58e300940210bc6f3137a227168bca648076dae1cd5e6cdb697a7c2087b022148f332bc3b1bf79db06f09fd47b3adc07deada84e7413d56bb00a1e61541e9b2a178c8d3579f245bfdd0d53e5774d36c39f732baf32f6e94a4f84e480ec2121642d95c477c2f6631f3d7e63aa179fc2d8d17b1301fc185ad3258a0b466fe711b6b8032ed6f6478dc6b57cd2fdfac89fff816f6e4acd883b8e7467dcd3bf1c05c11d25327bfcdb3056ef18433ca9625c474c36a734a5060032d942fe283e0497a1c55f8d1b2af9bd8a5a859d9fb8a94e6b3d31199ab3d1261b444da356a98ba2062f6233e4e8e30d7c2d42ebed06f89bca77ea62642fcdccde94f7771c4440f43be6ddd6f25e1348221abcd44c627c625574c47537d9f83b9d7ebc93825368a9a89165789365d9d1af6bd9bbc16064cd2d15ae7dec1c043dcc785d61e0b2a20685970a45e3d500e5f568f2dd8101dc7ae8c70a73d017da3e71ba834534d43f39daab564ab27d1fb811607e1cf4b3b17cf83db1e65e5ea07483f81492b1b70dd87bc856cb61f0426c1506dbd2921e3b3bcffd416177b1ce7440af32b9287cc017dbb0a462a2383dc6bdbd28df9401b67e1222b85533f51a8adae55149cb16873e7b9faad13714f299d364e2e2afac88c8bb25e1e30011fdc486b45991829e929784ad3008bf394022b086095c457b67b54cf64bb8f5aedfee1ef695fae99e284dcaf73ac11f1ce208a4942a1e7d1e7c02d586ba64941d882ea05704097774a9223994b9d2b5471d1545166d76e7102e678fd6478a65ca847f11c496758dc988cb4680f7ca1ff245d5e03b1fbba91430d56d981f31e6cdde6376e5a273e245166ad3dbc7ae75f0c4496fa96caa6bc09ea3ba5186480810d9eb218becaea4b4e5c60c3b6985981dd88b8b8487e91dec8305b71970a53f85d5be1c2f154d36b0b955435c7a86db6a078e515df3183065a393a74edc43a59911781642a1b9bbb5332a9ba7f720283a5839c859490b515ae9601ff6a2bccd4f7fd5bf5d70295286be3f70be44c8d957afb489f397479c5b2e8218f41b7ad64774dea71852dd0b518138d26238c7b5d0df36cd3749c2944bfa7f8a019e7f66152d24e1e792424c71a62dd82513d58f9dcb027935e493c220b3145f6abe4486966d386992c9c41072b23496f21a3c7358d7f09c64a0838c8665434320f35bf9ddcf146ad7b23c0ffa186ccc4b6f119ffa05f08e33c9eee65ea76bdfa8410f787e3c61c82c3cef0dd46a47452fda19ade1f27946fb47be1f198202ebaaa945919c4b9503d8f678abbff3189cb16f548a407bcb170f0ca64f033b922c5dc05a9eb5a87938d4a337ec7f9f8e4f0d899ec0b55122e8845fa66d7d323b585d8e557ec8aeec21dcec0ab26f33552876b214ad1fab94dc9b2002479dc28e3cc21fcc8aa7dbe063ccbcbfc46c730a32cd56bdb3041e328bcfe7f6eec1dfa35b8ac77cbcd05baa1c1e8104e92b7a660f24e2c59468aef089c4da31fed53a5153ba1813e78d6241c6c2d7772254c847c18f737d8dc6b92dbe72ef0f3f88380f3ad2bb1fdb4336e6f7226f8a21a4c4304a8de20278dbe673a894e62f5a7bfcedf376b0032f1818b647823d41639f70e100997b064695937178359323ff3c4bfa2d8cba3fe42251143ded70d58797d4c893d374b947e7722bd023849f8cdc8560a0bbf3462268b3e2b0c982eeeb657e0f7df3fc464b630f1822a58f1ef88b1349dfc54591bf9aa082bed523046b53434e66c1d3266357542a70b9c5f9e74564ea7e991bf1aa82cdc7b3f1d856b2f0f315eab748fb3682262d4e66d4ed1567f02a491f110c56c48c34753d89a3ac11ec7b4b52aaefa7150a23f36519e26fd29b8a6ca1e1a015043e6e4df9fe2cc8bd14bb1f9882f17b9741fc455e1a63d250e6d13bdd0a49b502a55036114ffa60c0b10a6163aa60e0aa79f41e30f503d61c144e31d8fd58179600c85b3ae72290f0a9c513074c4fa0ea1a81ec3c260f6216a3d05bbeedf1acb3cdfd0441f9b396b160d2fc37c92d88bc22fd88ee60fd5beceb27f9873f6e9706fbed03825f9489954941bc1fcd9330285932167ab8694d92c14da7cef374c477c4c7345f949ce362d26879b9eee383a213f77e0683321ded662ee9000774c2befc57f3672271b9ea6df1abedfda632165de4c6b0982769fe931f63ab01e7b0defb6ef1f19ec15cb4e64f27d2bdd1c1b7f764c8d4d3e710ee4d44c8d9a829b846012bf0ef6fdc41a337b4011ec68ecfc0a90b096e0c45ba8b4b417d2f650d994777b5b8f21ddec0455b29ae929abd5dd33521202e083ecc40640c8528d057314c5486029f45ee3f5082137314ae91b0c6868a8d357ce5f7db51fd8f3b2b33cd033bd154b3b348543a6e655fcf2c6bc855d18c6ff351393bceb09bb5a7479460cfa31a2fe87892a2101d25a5db89a84a7d7aa481e9b1aa1086833cc86c12ecab48dea0c453cc1c08ce73c1e712d54a0a57f94d0cd78383c92f5cfff523e9c315e4b651d4eedc0ad9f2b5f9f25db95f5c34eacc7b87f6af4e3f5b0eadaf24100ee5f90eae59af838ce7fe11136ff14d4abfe71e148100975c700ec6046d747d7c623ab639ebd93f4a542ca406ac000b810c7071d5c6d95721a68da64d2d1061118d885cfce1c4cf36ad912608c62a9b8fbf64c61c8def3346c07fa438bfaef181da07aa6ea9c1b440a8cbbf6f3018877c3b6047fb2c71a5b0caeaeec554c4c3a5ef34d4848b6235930c866196122c96cb1eff713f7f2785994b0baa426a18e17e6db6179dbffdc1f9ecd9220f5018384eeab3b15b24ec4eaec65e5efea333a14e4b35d5ef691c42aaba5ba64414abb3d6c5dacaecea632e32ac9edf80c514720dd8550d8ef68b1a353a025937be41728f38e23f3045ec27e7b51aaf7121cc40565811ee5edb1c80449781071e7b32644868281f8966c2ed165e2595e016d4b5c51f872b7da91de3fa2ed8787fe351081f8069b8bccd2de72ca07315b41e10c2ca7d6463e9083893318fa839844ac352776f725f0d95093ebdd9cd04c10aaddb7a8b2e66b7bb5f3be82d0f9786f69160b9894ec08f3290d2a29ded94990769c0cd7d6761275b08c348e87eec0d8be384844efa4e3290c11cb0de5e0390fb1fb5de42c4b8634d4de7daf464ba3ced2766b4b39ee645a5eeba026df95e5adfb749749370c65091032b9f30d9c173ad34e477c4d5c30b5c5f042e0cb7dad16f4878c702972f7e9022c7589111feaead30ecd7ef64c500e02fb6e8f5d5b7f08f42b23222530227a8d88e3804dac08b0aca16cdc0fc93c800853d06d7c459633167edbd2718ec734572cbab9a201cb8b560ef1dbe5c83f2f12ce713571ecd9c69b666ecd5d23ea788c807e9d29a65737d6d7cf7a539effbefb786c28c8e45e8b86ad248707e10a8ad189616bbfae064c257e89b51a932e7b852abbbe6e31404fb641dd2f43f88bc5861db36cf31f4309912eadd4dff4d2800a22a69d69ecc091decf5121c9bf720075007ca51f456c9bb96af753318d146428094b84a98ad79ebdeb940cc6dfd90075a3f62de2d589e63573384d4db6bf2d236c3e67a2faf164860dad3bc996a4e6d81f210a46e4ded0df61387b683d69e9625cc02644b6458c78eaf5a9e06f284fea22993b217d51818b7919cf5e3ae3713f787448663d963cebc1861f3a6ec0cd4532fe7527e186e1ee53ea387e1f5d6e673b5684a69a0d1dd377ec762bbeb8a7e1b621115a0468bdddc45afcf05127483b0bfbcf4821b973fcdc3c5198398bb186ffc2e5383acc11b2ca34a609ff7876b9a2ef44c51db0749782cf8228d26dc05ac5cca946f630755f3839e3cacec45ea4f9e8ba9e4f612515bdd5831a1e8456093d3ba12102316cc706454846ba98c39461dd19766c5617797013aa3a9c09c958e78b1c7e21f940b4c88328f8ced3030e9fccd5062b650083424b0fc3602b6fba58fbc65563d3af9cce519ddfadbfb1f8a42c07eb80f490cc3d4564c7ee723ec8df0b0672e7841802e4362f9744ca863b8b4978d1072b4df623c251dbc443f4a3f86c82e57e776a8a333dd47c6a2385be8712c9f3d5f77a687ac414ab7509609addc568a39185e02ca0f5e2c27bccbba34f467f6cda0d5ce801e7802d13cbb5d11e8c497c51d1661568b84c1bd5b99304576c3f2acf6de28f8e9ca635d134cfa2745c914590a80682885db54a6702808ecbfa3e951fbccbdcce059707b54751de22961161f58638fce53729211adc7fcf766604857f8eb71aeb8d4c2a5144694df6cc9cc87cb97c9502262d3d68188ef414a6fa4dbe71b08292f7c62084935a21c10cc0f44935f62e30162b0396e0369260f665b315f4b27eedf01b5c51ae35b1754a4c4d571cadfac39176f2db539a471464b59049864203", @typed={0x8, 0x37, @pid=r1}, @generic="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", @generic="f45bb026e9eb16e75e33ae59ca6426982fa9cd03d016f576829ca21bb6d53abb419305a50f86268a0083081f448bc310c479c93743140368f5551eecef973b2486b6d1c52a51c6a6c96576f2db5babc0d956fc770ca43db927515ce7cfaeae4193af90d9e89b6bfa2b1a76a567425f72cd3288ecb628b9b37aba2b5f5f6398fc659294db93ce034875ec", @typed={0x14, 0x71, @ipv6=@mcast2}, @typed={0x14, 0x57, @ipv6=@ipv4={[], [], @multicast1}}, @typed={0x8, 0x57, @uid=r2}]}, @typed={0x8, 0x70, @fd=r3}, @typed={0x8, 0x37, @ipv4=@local}]}, 0x2168}], 0x1, &(0x7f0000002700)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}, @rights={{0x18, 0x1, 0x1, [r10, r11]}}], 0x58, 0x4008800}, 0x0) r12 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r12) 00:33:49 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000d80), 0xd9) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x20040, 0x0) mmap$xdp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x10, r1, 0x180000000) [ 139.028084][ T9854] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:49 executing program 4: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x2000, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x100, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r3 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x80000) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x101000, 0x0) r5 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x81b) ppoll(&(0x7f0000000180)=[{r0, 0x8}, {r1, 0x2000}, {r2, 0x40}, {r3}, {r4, 0x2}, {r5, 0x4000}], 0x6, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f0000000200)={0xe000000}, 0x8) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x7ffffffe, 0x8072, 0xffffffffffffffff, 0x0) 00:33:49 executing program 0: execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:49 executing program 1: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vsock\x00', 0x42202, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0xfffffffffffffffe, 0x6, 0x40, 0x0, 0x4, 0xc8d3572303380000, 0x2, 0x1, 0x54a2, 0x5, 0x3f, 0x4, 0x5, 0x9, 0x3, 0x4, 0x3, 0x5, 0x4, 0x9, 0x171, 0xffffffff80000001, 0x1, 0x100, 0x8, 0x5, 0x400, 0x7f, 0x5, 0x40, 0x3ff, 0x1f, 0x0, 0x3ff, 0x40, 0x0, 0x8, 0x4, @perf_bp={&(0x7f00000007c0)}, 0x11212, 0x1f, 0x0, 0x3, 0x6, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x400200, 0x0) r2 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000600)={{0x1, 0x2, 0x4dd, 0x1, 'syz0\x00', 0x5}, 0x2, 0x20, 0x7, r2, 0x1, 0xc89, 'syz1\x00', &(0x7f00000005c0)=[',\x00'], 0x2, [], [0x1, 0xfffffffffffffffa, 0x90000000000000, 0x4]}) syz_open_dev$rtc(&(0x7f0000000740)='/dev/rtc#\x00', 0x6, 0x101000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000240)={@local, @dev={0xfe, 0x80, [], 0xc}, @remote, 0x3, 0x0, 0x3, 0x100, 0x4, 0x10020, r3}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000004}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x18c, r5, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2ce3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xea}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbb2}]}]}, @TIPC_NLA_MEDIA={0x4c, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x35}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0xa8, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xbab0}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7a54}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @mcast1, 0x1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x10001, @empty, 0x3bd}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xff, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}}}}]}]}, 0x18c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x5, 0x0, &(0x7f0000000200)) 00:33:49 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x220000) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000000c0)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000100)={r1, r2}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000200)={{0x2ab, 0x3}, 'port0\x00', 0x45, 0x10000, 0x498b142a, 0xffffffffffffff96, 0x4, 0xfffffffffffffc00, 0x3f, 0x0, 0x1, 0xfffffffffffff001}) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000140)={0x1, r3}) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_CALL(r4, 0x4008af00, &(0x7f0000000000)) 00:33:49 executing program 0: execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:49 executing program 3 (fault-call:1 fault-nth:3): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:49 executing program 0: execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x10001, 0x48000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000200)={0x10001, 0x0, {0x0, 0x1, 0x400, 0x1, 0x25}}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x88000000, @empty}, 0x1c) syz_genetlink_get_family_id$net_dm(&(0x7f0000000180)='NET_DM\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x8000400) renameat2(r2, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x4) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f00000000c0)) r3 = gettid() ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000280)=r3) [ 139.349569][ T9896] FAULT_INJECTION: forcing a failure. [ 139.349569][ T9896] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 139.362796][ T9896] CPU: 0 PID: 9896 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 139.370679][ T9896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.380737][ T9896] Call Trace: [ 139.384024][ T9896] dump_stack+0x1d8/0x2f8 [ 139.388355][ T9896] should_fail+0x555/0x770 [ 139.392761][ T9896] should_fail_alloc_page+0x55/0x60 [ 139.398129][ T9896] prepare_alloc_pages+0x283/0x470 [ 139.403231][ T9896] __alloc_pages_nodemask+0xb2/0x5d0 [ 139.408516][ T9896] kmem_getpages+0x56/0xa20 [ 139.413015][ T9896] cache_grow_begin+0x7e/0x2c0 [ 139.417785][ T9896] cache_alloc_refill+0x311/0x3f0 [ 139.422806][ T9896] ? check_preemption_disabled+0xb7/0x2a0 [ 139.428519][ T9896] kmem_cache_alloc+0x2b9/0x2e0 [ 139.433357][ T9896] ? dup_fd+0x71/0xc90 [ 139.437415][ T9896] dup_fd+0x71/0xc90 [ 139.441307][ T9896] unshare_files+0xc4/0x270 00:33:49 executing program 0: open(0x0, 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:50 executing program 0: open(0x0, 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 139.445810][ T9896] __do_execve_file+0x1f4/0x1c50 [ 139.450739][ T9896] ? getname_flags+0x214/0x640 [ 139.455498][ T9896] __x64_sys_execve+0x94/0xb0 [ 139.460174][ T9896] do_syscall_64+0xfe/0x140 [ 139.464671][ T9896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 139.470552][ T9896] RIP: 0033:0x459879 [ 139.474440][ T9896] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 139.494031][ T9896] RSP: 002b:00007f7d92d6ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 139.502436][ T9896] RAX: ffffffffffffffda RBX: 00007f7d92d6ac90 RCX: 0000000000459879 [ 139.510403][ T9896] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 139.518367][ T9896] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 139.526331][ T9896] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d6b6d4 [ 139.534301][ T9896] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:50 executing program 5: mlockall(0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x56, 0x200) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) r4 = getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002400)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000002500)=0xe8) r6 = getgid() r7 = getpgid(0x0) getresuid(&(0x7f0000002540), &(0x7f0000002580), &(0x7f00000025c0)=0x0) getresgid(&(0x7f0000002600), &(0x7f0000002640), &(0x7f0000002680)=0x0) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000026c0)='cgroup.threads\x00', 0x2, 0x0) sendmsg$netlink(r0, &(0x7f0000002780)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfc, 0x80220000}, 0xc, &(0x7f00000023c0)=[{&(0x7f0000000240)={0x2168, 0x7ff, 0x0, 0x70bd26, 0x25dfdbfb, "", [@typed={0x80, 0x33, @binary="fb6b9cb78e30eadd7b83bbe730bf6673b47c18bec9c084e51a0a14d83c7955c6cbf3ef05748b7aad91ecc8817241b7249ff70d6122413e1f3ad43eb5e0b4d0edb9c035c4dbc7fd87c1fc048cb20c27f4a27c1251108285b6da5478453f14ca6437c853b36e0ef3940fbe712c31eeaf0559278a03056ac53c3c6c59"}, @nested={0x20c8, 0x5e, [@generic="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", @typed={0x8, 0x37, @pid=r1}, @generic="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", @generic="f45bb026e9eb16e75e33ae59ca6426982fa9cd03d016f576829ca21bb6d53abb419305a50f86268a0083081f448bc310c479c93743140368f5551eecef973b2486b6d1c52a51c6a6c96576f2db5babc0d956fc770ca43db927515ce7cfaeae4193af90d9e89b6bfa2b1a76a567425f72cd3288ecb628b9b37aba2b5f5f6398fc659294db93ce034875ec", @typed={0x14, 0x71, @ipv6=@mcast2}, @typed={0x14, 0x57, @ipv6=@ipv4={[], [], @multicast1}}, @typed={0x8, 0x57, @uid=r2}]}, @typed={0x8, 0x70, @fd=r3}, @typed={0x8, 0x37, @ipv4=@local}]}, 0x2168}], 0x1, &(0x7f0000002700)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}, @rights={{0x18, 0x1, 0x1, [r10, r11]}}], 0x58, 0x4008800}, 0x0) r12 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r12) 00:33:50 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000900)='/dev/sequencer\x00', 0x200000, 0x0) bind$vsock_stream(r0, &(0x7f0000000940)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x4}}, {@quota_account='quota=account'}], [{@smackfsroot={'smackfsroot', 0x3d, 'task\x00p7\t9%\\\xc0\x98,\x96\xd0\xb2\x16\x982Y+\xfcr%Hn\xa3S\x12\xc3\xdc\x10\xa1y\xdd\x1b\xb9|5\xde\x04\xcd\xba9\x12\xcad\x9cr0\x8a\x86\xc2\xe9\x19w&\xa3\xa2\x05\xc4\xc7\xac\xbd\xc8'}}]}) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000000)={0x10004, 0x0, &(0x7f0000ffb000/0x4000)=nil}) 00:33:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fsetxattr(r0, &(0x7f0000000000)=@random={'trusted.', '\x00'}, &(0x7f0000000040)='{\x00', 0x2, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) modify_ldt$write2(0x11, &(0x7f0000000080)={0x100, 0xffffffffffffffff, 0x5e99ac1311966894, 0x3, 0x48, 0x65, 0x3, 0x7, 0x2}, 0x10) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 00:33:50 executing program 0: open(0x0, 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:50 executing program 2: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)=0xfffffffffffffffd) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040)=0x9469, 0x8) 00:33:50 executing program 3 (fault-call:1 fault-nth:4): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 139.912308][ T9923] FAULT_INJECTION: forcing a failure. [ 139.912308][ T9923] name failslab, interval 1, probability 0, space 0, times 0 [ 139.917771][ T9926] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 139.948879][ T9927] gfs2: not a GFS2 filesystem [ 139.973010][ T9923] CPU: 1 PID: 9923 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 139.980914][ T9923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.991039][ T9923] Call Trace: [ 139.994311][ T9923] dump_stack+0x1d8/0x2f8 [ 139.998629][ T9923] should_fail+0x555/0x770 [ 140.003024][ T9923] __should_failslab+0x11a/0x160 [ 140.007943][ T9923] should_failslab+0x9/0x20 [ 140.012420][ T9923] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 140.018111][ T9923] ? __kmalloc_node+0x3c/0x60 [ 140.022779][ T9923] __kmalloc_node+0x3c/0x60 [ 140.027270][ T9923] kvmalloc_node+0xcc/0x130 [ 140.031744][ T9923] alloc_fdtable+0xe3/0x290 [ 140.036219][ T9923] dup_fd+0x94f/0xc90 [ 140.040177][ T9923] ? __fs_reclaim_release+0x4/0x20 [ 140.045261][ T9923] unshare_files+0xc4/0x270 [ 140.049741][ T9923] __do_execve_file+0x1f4/0x1c50 [ 140.054657][ T9923] ? getname_flags+0x214/0x640 [ 140.059392][ T9923] __x64_sys_execve+0x94/0xb0 [ 140.064041][ T9923] do_syscall_64+0xfe/0x140 [ 140.068522][ T9923] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 140.074385][ T9923] RIP: 0033:0x459879 [ 140.078254][ T9923] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 140.097830][ T9923] RSP: 002b:00007f7d92d6ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 140.106209][ T9923] RAX: ffffffffffffffda RBX: 00007f7d92d6ac90 RCX: 0000000000459879 [ 140.114159][ T9923] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 00:33:50 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 140.122100][ T9923] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 140.130044][ T9923] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d6b6d4 [ 140.138002][ T9923] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:50 executing program 2: r0 = memfd_create(&(0x7f0000000140)='}[system+\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00y;\x84\xf0\x00'}) write$P9_RLINK(r2, &(0x7f0000000280)={0x7}, 0x269) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080)=0x3, 0x4) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000180)={0x0, 0x2, 0x1, {0x4, @raw_data="3fdaff9f8f94127a6b136f53f33a03e66bbd2a9ddbbd069f7f3f80fac4b966fe3fa699dddc8636f08f84ebc4b0750e14e4a4911cfad3ce1ff45b38255c8ad9fe743067af0ee3c4fb9acb25ff4a4a93f8860b014cc6c71fe9566aa1b4b21c22a262919544e7a06c1f10cbb42d2e3304fa84ed66f40472c20e4b40a55dd217ad38a07dcb16dc0236d01dc7fc30826bce74a04b713c477c8fcb63a8db243594c8171c14a89c4a42d13db1bfb6e7a4f6ff344a08e28b9dfd4ed0001a03daa096cd1567f31cfe53765197"}}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x2f2, @time}) 00:33:50 executing program 3 (fault-call:1 fault-nth:5): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:50 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 140.183698][ T9932] gfs2: not a GFS2 filesystem 00:33:50 executing program 4: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x80000000, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 00:33:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x3da, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) [ 140.633182][ T9957] FAULT_INJECTION: forcing a failure. [ 140.633182][ T9957] name failslab, interval 1, probability 0, space 0, times 0 [ 140.662426][ T9957] CPU: 0 PID: 9957 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 140.670329][ T9957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.680373][ T9957] Call Trace: [ 140.683654][ T9957] dump_stack+0x1d8/0x2f8 [ 140.687984][ T9957] should_fail+0x555/0x770 [ 140.692394][ T9957] __should_failslab+0x11a/0x160 [ 140.697326][ T9957] should_failslab+0x9/0x20 [ 140.701831][ T9957] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 140.707535][ T9957] ? __kmalloc_node+0x3c/0x60 [ 140.712197][ T9957] __kmalloc_node+0x3c/0x60 [ 140.716710][ T9957] kvmalloc_node+0xcc/0x130 [ 140.721198][ T9957] alloc_fdtable+0x16c/0x290 [ 140.725778][ T9957] dup_fd+0x94f/0xc90 [ 140.729755][ T9957] unshare_files+0xc4/0x270 [ 140.734250][ T9957] __do_execve_file+0x1f4/0x1c50 [ 140.739178][ T9957] ? getname_flags+0x214/0x640 [ 140.743930][ T9957] __x64_sys_execve+0x94/0xb0 [ 140.748593][ T9957] do_syscall_64+0xfe/0x140 [ 140.753082][ T9957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 140.758956][ T9957] RIP: 0033:0x459879 [ 140.762834][ T9957] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 140.782425][ T9957] RSP: 002b:00007f7d92d49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 140.792038][ T9957] RAX: ffffffffffffffda RBX: 00007f7d92d49c90 RCX: 0000000000459879 [ 140.799999][ T9957] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 140.807954][ T9957] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 140.815919][ T9957] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d4a6d4 [ 140.823878][ T9957] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x7d8562665206810f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r3}}, 0x48) getegid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000001bc0)) getresgid(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002080)) getegid() stat(0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec"}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r3}}, 0x48) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r4, 0x8, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8040}, 0xca90db382ad63c35) 00:33:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:51 executing program 4: unshare(0x20600) r0 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000000)=@id, &(0x7f0000000040)=0x10, 0x800) fcntl$setpipe(r0, 0x407, 0x800) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) close(r1) fallocate(r1, 0x0, 0x0, 0x0) 00:33:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000440)="11dca5055e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = accept4(r0, &(0x7f0000000500)=@generic, &(0x7f0000000400)=0x80, 0x80800) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80008000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="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", @ANYRES16=r3, @ANYBLOB="000125bd7000fedbdf250d0000000800050000080000080005006c0400004c000200080002004e23000008000600020000000800040007000000080002004e24000008000b000200000008000b000a000000080002004e23000008000b000a0000000800040006000000080006000000000008000600000200000800050020000000"], 0x88}, 0x1, 0x0, 0x0, 0x4}, 0x4) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000640)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0xe4a5357cb7f79480}, 0xc, &(0x7f0000000740)={&(0x7f0000000680)={0x14, r4, 0x8, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000080}, 0x44080) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x94000, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VHOST_SET_LOG_FD(r5, 0x4004af07, &(0x7f00000003c0)=r5) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000480)={0x0, {0x2, 0x4e20, @empty}, {0x2, 0x4e22, @remote}, {0x2, 0x4e20, @remote}, 0x4, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x7ff, 0x0, 0x1000}) sendmsg$nl_netfilter(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB], 0x1a8}, 0x1, 0x0, 0x0, 0x40004}, 0x40880) 00:33:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x3da, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) 00:33:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:51 executing program 3 (fault-call:1 fault-nth:6): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:51 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x2, 0x8002) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f0000000040), 0x267) 00:33:51 executing program 4: r0 = socket(0x40000000015, 0x80000, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x202000, 0x0) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000040)) 00:33:51 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={0x0, 0xffffff6a, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000206ffff00fc00000000090000000000"], 0x14}}, 0x0) 00:33:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x40000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x875c, 0x0, 0x4c51a1c6}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) add_key$user(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="29000000b4c867c5c9fb885c77bd3b3b1ab48bdf24bb9ea61cc352602e2efbee5558c6e528bd55e828d94d72b9"], &(0x7f0000000140)=0x31) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r3, 0x6}, 0x8) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000003c0)='dctcp\x00', 0x6) sendto$inet6(r4, 0x0, 0x243, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'lo\x00'}) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000940)='cubic\x00', 0x6) sendto$inet6(r4, &(0x7f0000000480)='t', 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x1f, 0x0, 0x8000, 0x7fffffff}, &(0x7f0000000280)=0x98) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)=@random={'trusted.', '\x00'}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 00:33:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x7d8562665206810f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r3}}, 0x48) getegid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000001bc0)) getresgid(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002080)) getegid() stat(0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec"}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r3}}, 0x48) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r4, 0x8, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8040}, 0xca90db382ad63c35) 00:33:51 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x7d8562665206810f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r3}}, 0x48) getegid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000001bc0)) getresgid(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002080)) getegid() stat(0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec"}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r3}}, 0x48) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r4, 0x8, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8040}, 0xca90db382ad63c35) [ 141.155188][T10005] FAULT_INJECTION: forcing a failure. [ 141.155188][T10005] name failslab, interval 1, probability 0, space 0, times 0 00:33:51 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x7d8562665206810f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r3}}, 0x48) getegid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000001bc0)) getresgid(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002080)) getegid() stat(0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec"}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r3}}, 0x48) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r4, 0x8, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8040}, 0xca90db382ad63c35) 00:33:51 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 141.230189][T10005] CPU: 1 PID: 10005 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 141.238180][T10005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.248214][T10005] Call Trace: [ 141.248229][T10005] dump_stack+0x1d8/0x2f8 [ 141.248243][T10005] should_fail+0x555/0x770 [ 141.248260][T10005] __should_failslab+0x11a/0x160 [ 141.265147][T10005] should_failslab+0x9/0x20 [ 141.269650][T10005] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 141.275364][T10005] ? __kmalloc_node+0x3c/0x60 [ 141.280038][T10005] __kmalloc_node+0x3c/0x60 [ 141.284538][T10005] kvmalloc_node+0xcc/0x130 [ 141.289029][T10005] alloc_fdtable+0x16c/0x290 [ 141.293618][T10005] dup_fd+0x94f/0xc90 [ 141.297593][T10005] unshare_files+0xc4/0x270 [ 141.302085][T10005] __do_execve_file+0x1f4/0x1c50 [ 141.307020][T10005] ? getname_flags+0x214/0x640 [ 141.311775][T10005] __x64_sys_execve+0x94/0xb0 [ 141.316443][T10005] do_syscall_64+0xfe/0x140 [ 141.316456][T10005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 141.316467][T10005] RIP: 0033:0x459879 [ 141.330771][T10005] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 141.350359][T10005] RSP: 002b:00007f7d92d49c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 141.350369][T10005] RAX: ffffffffffffffda RBX: 00007f7d92d49c90 RCX: 0000000000459879 [ 141.350374][T10005] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 00:33:52 executing program 5: syz_emit_ethernet(0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="80c327b44226a4cc794cba98cfd8d8d9dcc4c46e48e9a8649a194a96e49e96100eb4489dc92629bc2882e4b6eefd7f4f8f3ea8e7322cf45db9bb1d3b96653e00dcc6005412571e24f088ef7f38144277580fca8d39481910b3f11f3c022fecf15591b98ecfb951e503618f68b92f205b49f880124389105e9afb474055b2b0c41b844905f884ecd12678743d48b3f4811593bf42e7f1530aed2bc6d708c5c932cad31b48600a74ba9ac3c7407fda1d15de8fc45257c69039e584d457110dbc5ea73b07b08a1a6c310fded036596d3b16f9d9014899bc8b85261e3a5ae5c8", @ANYBLOB="0afeca7cc7ee737f9f352b0cfef3195632e11501767b1fb25be34560ab47161614a83e04a7557f1bada3d37cc1e1a2ee443cf003000000346ea1d885be6f0b637fc088c0f942d1e70b4414d5cb677550d4419ebdac2d9023ed39c11ac76058e5d593e1fea79d73aaf88841c880d7d86b431bdf9878da73bda15f69cd171c05000000000000009c8ad95357fa275e96505b4539f93c0440584b4a803e9d757ca08938559cdfaeb2f64ed856c54e1931acd5ca531d67bc738aa5ebbf4156acb8df9e1e8c287a7ab722000000", @ANYRESHEX, @ANYBLOB="f3472ea429f21d4735878dfd8381b5a8ec24ccd5d0758c3871f37156ddbea468a07888f3424e3a9125b70b306b0da5e45fbe5cead0d6f5292c93dd2c66ecb95180f50e5fd42932f6c73dfee44f5d72e549bf70edd3209199cfc1dd719d60b67e1f242b3ace7c25c051e6f9580985b617b85998910b7c718716b34f7c7dfd7a19e5b1a93e11a4ae1895c9b37a187f41ca8286081bab7480234152e9c0dc27609a5e3aafe595f923920313f4b771549f372cea481132b136a3bfc242dbc79d1ae428a27980b6431211de4d94cfabd577a224376c4da8043b5bd90ce1de8a151b9d34c1091573c9deb5cd"], 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @aes128, 0x3, "2e7dd46336e0c02d"}) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x6) [ 141.350379][T10005] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 141.350383][T10005] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d4a6d4 [ 141.350388][T10005] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000003 00:33:52 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 141.510874][T10029] Unknown ioctl -2146671085 00:33:52 executing program 3 (fault-call:1 fault-nth:7): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:52 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x7d8562665206810f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r3}}, 0x48) getegid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000001bc0)) getresgid(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002080)) getegid() stat(0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec"}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r3}}, 0x48) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r4, 0x8, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8040}, 0xca90db382ad63c35) 00:33:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x7d8562665206810f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r3}}, 0x48) getegid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000001bc0)) getresgid(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002080)) getegid() stat(0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec"}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r3}}, 0x48) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r4, 0x8, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8040}, 0xca90db382ad63c35) 00:33:52 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 141.565154][T10033] Unknown ioctl 43786 00:33:52 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) stat(0x0, &(0x7f0000000400)) mkdir(&(0x7f0000000080)='./file1\x00', 0x2) r0 = getgid() getgroups(0x0, 0x0) r1 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="02000000010003000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="040007000000000008000000", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000090b4e2342187048b1ba6b223b24296d42f5b2fe727245dc3ff915ef574fa902e93ea08862e5d9bc62224f7be14ca63ca6c9d8a49bfe98cca68c56b89d264ca6eb71acd615d84813d15b66348823c1d988425283d7845e82b94e7527d0a40fd3c", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="10000600000000002000070000000000"], 0x6c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000040)='./file1/../file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 141.605321][T10039] FAULT_INJECTION: forcing a failure. [ 141.605321][T10039] name failslab, interval 1, probability 0, space 0, times 0 [ 141.720455][T10039] CPU: 1 PID: 10039 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 141.728460][T10039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.738684][T10039] Call Trace: [ 141.741973][T10039] dump_stack+0x1d8/0x2f8 [ 141.746304][T10039] should_fail+0x555/0x770 [ 141.750720][T10039] __should_failslab+0x11a/0x160 [ 141.755655][T10039] ? kzalloc+0x26/0x40 [ 141.759723][T10039] should_failslab+0x9/0x20 [ 141.764223][T10039] __kmalloc+0x7a/0x340 [ 141.768369][T10039] kzalloc+0x26/0x40 [ 141.772260][T10039] security_prepare_creds+0x40/0x260 [ 141.777537][T10039] prepare_creds+0x2c3/0x3c0 [ 141.782116][T10039] prepare_exec_creds+0x17/0xc0 [ 141.786954][T10039] __do_execve_file+0x2fe/0x1c50 [ 141.791888][T10039] ? getname_flags+0x214/0x640 [ 141.796641][T10039] __x64_sys_execve+0x94/0xb0 [ 141.801311][T10039] do_syscall_64+0xfe/0x140 [ 141.805810][T10039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 141.811687][T10039] RIP: 0033:0x459879 [ 141.815570][T10039] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 141.835162][T10039] RSP: 002b:00007f7d92d6ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 141.843568][T10039] RAX: ffffffffffffffda RBX: 00007f7d92d6ac90 RCX: 0000000000459879 [ 141.846928][T10053] overlayfs: filesystem on './file0' not supported as upperdir [ 141.851525][T10039] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 141.851530][T10039] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 141.851535][T10039] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d6b6d4 [ 141.851540][T10039] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:52 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x208080, 0x4) write$P9_RREAD(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc000000750200d1000000ca3fbb61d665115f766eadd6554a473ecd1c210a4f467c056335b8ae59e221e78dd3199a94fe8b0a15278262ed3afac6e3b5b191682bb9fee8e32ae91aad31783b9c9c21b812f48dfbeaca7b525c3d506b4ce4f31ab66b64619e621f7559c2e79782fb58844754a6c2fa965868c266e441c163137e5af27d98f7f587448374874f0a0c8c720f138f3dd4431d9b85991472f045019e90afe733b14df64ab4c04f4da5eab63c1e14531b76e29429c370172902ea26daaad637098ecae0f8064ea4e9"], 0xdc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000000000), 0x1000001c) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0xfffffffffffffff8) 00:33:52 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:52 executing program 3 (fault-call:1 fault-nth:8): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:52 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) stat(0x0, &(0x7f0000000400)) mkdir(&(0x7f0000000080)='./file1\x00', 0x2) r0 = getgid() getgroups(0x0, 0x0) r1 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="02000000010003000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="040007000000000008000000", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000090b4e2342187048b1ba6b223b24296d42f5b2fe727245dc3ff915ef574fa902e93ea08862e5d9bc62224f7be14ca63ca6c9d8a49bfe98cca68c56b89d264ca6eb71acd615d84813d15b66348823c1d988425283d7845e82b94e7527d0a40fd3c", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="10000600000000002000070000000000"], 0x6c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000040)='./file1/../file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 00:33:52 executing program 2: unshare(0x24020400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) finit_module(r0, 0x0, 0x2) 00:33:52 executing program 4: r0 = socket$inet(0x2, 0x200080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 00:33:52 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x6, 0x8, 0x8, 0x1, 0x1000, 0x2, 0xff, 0x301, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={r2, 0x7f, 0x8000}, 0x8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1a) 00:33:53 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) 00:33:53 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x581800, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x9) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xdd, &(0x7f0000000380)="09dca500000b4fe4620101000025b89bb23a4df92112e1e21e2130213991489518b59d7975eee56c107eced5e8610f10e10182a7477add6ba50000004eb46a98081d30fd99dd40cc7384dead0171a3f2187d96856c9dceb5cd1cf4a7d0ad663d1450026bd4a484cba77e149a48d9e3e2c75eafe66eb919a97ed753d1c0def3f038095609b262eb24") splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000440)=0x38, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xaaaaaaaaaaaacb3, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x10b, 0x9}], 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x101900, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x0, &(0x7f00000001c0)="2d1e906e05cac56060148bb9c66ebd865b52f9aaae972e358d9bfae2164667fe6db6448e4e6d943b239250e9d2cacefd22cd93eb9becfab5239e2e743504f57c07a1a7fab484e456bf8d63a0da7f5786f5c87d6e6660684c", 0x58) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000140)={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4}}, 0xa) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000240)=""/90) [ 142.388123][T10072] FAULT_INJECTION: forcing a failure. [ 142.388123][T10072] name failslab, interval 1, probability 0, space 0, times 0 [ 142.455791][T10069] overlayfs: lowerdir is in-use as upperdir/workdir [ 142.462686][T10072] CPU: 0 PID: 10072 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 142.470649][T10072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.470653][T10072] Call Trace: [ 142.470669][T10072] dump_stack+0x1d8/0x2f8 [ 142.470684][T10072] should_fail+0x555/0x770 [ 142.492703][T10072] __should_failslab+0x11a/0x160 [ 142.497639][T10072] ? __alloc_file+0x2c/0x390 [ 142.502216][T10072] should_failslab+0x9/0x20 [ 142.502228][T10072] kmem_cache_alloc+0x56/0x2e0 [ 142.502241][T10072] ? arch_stack_walk+0x98/0xe0 [ 142.516212][T10072] __alloc_file+0x2c/0x390 [ 142.520621][T10072] alloc_empty_file+0xac/0x1b0 [ 142.520630][T10072] path_openat+0x9e/0x4460 [ 142.520643][T10072] ? __kasan_kmalloc+0x178/0x1b0 [ 142.534729][T10072] ? __kasan_kmalloc+0x11c/0x1b0 [ 142.539653][T10072] ? __kmalloc+0x254/0x340 [ 142.544073][T10072] ? kzalloc+0x26/0x40 [ 142.548225][T10072] ? prepare_creds+0x2c3/0x3c0 [ 142.554989][T10072] ? prepare_exec_creds+0x17/0xc0 [ 142.565393][T10072] ? __do_execve_file+0x2fe/0x1c50 [ 142.570504][T10072] ? __x64_sys_execve+0x94/0xb0 [ 142.575336][T10072] ? do_syscall_64+0xfe/0x140 [ 142.575348][T10072] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 142.575358][T10072] ? __kasan_kmalloc+0x11c/0x1b0 [ 142.575364][T10072] ? kasan_slab_alloc+0xf/0x20 [ 142.575373][T10072] ? kmem_cache_alloc+0x1f5/0x2e0 [ 142.575384][T10072] ? prepare_creds+0x3e/0x3c0 [ 142.586073][T10072] ? prepare_exec_creds+0x17/0xc0 00:33:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)={r2}) r3 = fcntl$dupfd(r2, 0x0, r0) write$FUSE_ATTR(r3, &(0x7f0000000240)={0x78}, 0x78) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) readv(r2, &(0x7f0000002480)=[{&(0x7f0000000100)=""/181, 0xb5}], 0x1) 00:33:53 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) stat(0x0, &(0x7f0000000400)) mkdir(&(0x7f0000000080)='./file1\x00', 0x2) r0 = getgid() getgroups(0x0, 0x0) r1 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="02000000010003000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="040007000000000008000000", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000090b4e2342187048b1ba6b223b24296d42f5b2fe727245dc3ff915ef574fa902e93ea08862e5d9bc62224f7be14ca63ca6c9d8a49bfe98cca68c56b89d264ca6eb71acd615d84813d15b66348823c1d988425283d7845e82b94e7527d0a40fd3c", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="10000600000000002000070000000000"], 0x6c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000040)='./file1/../file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 00:33:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) write$capi20_data(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1000090086aeff010200000000001a4b1bfbbe991ae06a847a438bc9c36b1ff40b2b3e9abb4d47061db2122ad69a5dd8a72c62a2d2d82264dcc7fef0c86594fb3c500918be3f7eec4bc46ac9d8a9a0508d562952a7c57f2a39763133ead873c9136568e0ac6882fe667976616ad030a79f8ce151f9b75399a1ff3f9068bd85174c9fc711151d50298e707837e2097add46832300d48ed5b13c4b1c5491eb1780767e7a6d0134db3591bffc77556de749976b41e1a18817811417e252599c01c103641b5084"], 0x87) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x11000000, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000003100050ad25a80648c6394fb0300fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) [ 142.586084][T10072] ? do_syscall_64+0xfe/0x140 [ 142.586095][T10072] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 142.586103][T10072] ? __kasan_kmalloc+0x11c/0x1b0 [ 142.586113][T10072] ? kasan_kmalloc+0x9/0x10 [ 142.630523][T10072] ? __do_execve_file+0x278/0x1c50 [ 142.635632][T10072] ? do_syscall_64+0xfe/0x140 [ 142.640303][T10072] ? __fs_reclaim_release+0x4/0x20 [ 142.645400][T10072] ? memset+0x31/0x40 [ 142.649367][T10072] do_filp_open+0x192/0x3d0 [ 142.653856][T10072] ? debug_mutex_init+0x2d/0x60 [ 142.658675][T10072] ? __mutex_init+0xcc/0xf0 [ 142.663156][T10072] ? smack_cred_prepare+0x5a7/0x5e0 [ 142.668322][T10072] ? __kmalloc+0x26c/0x340 [ 142.672725][T10072] ? __do_execve_file+0x6ce/0x1c50 [ 142.677807][T10072] do_open_execat+0xff/0x610 [ 142.682372][T10072] ? __kasan_check_read+0x11/0x20 [ 142.687370][T10072] __do_execve_file+0x72d/0x1c50 [ 142.692421][T10072] ? getname_flags+0x214/0x640 [ 142.697160][T10072] __x64_sys_execve+0x94/0xb0 [ 142.701812][T10072] do_syscall_64+0xfe/0x140 [ 142.706310][T10072] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 142.712184][T10072] RIP: 0033:0x459879 [ 142.716060][T10072] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 142.735670][T10072] RSP: 002b:00007f7d92d6ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 142.744052][T10072] RAX: ffffffffffffffda RBX: 00007f7d92d6ac90 RCX: 0000000000459879 [ 142.751999][T10072] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 00:33:53 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) [ 142.759940][T10072] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 142.767889][T10072] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d6b6d4 [ 142.775838][T10072] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:53 executing program 3 (fault-call:1 fault-nth:9): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 142.847856][T10096] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 142.884203][T10113] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 00:33:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x73348a03079b397f, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000000c0)={0x2e, @multicast1, 0x4e23, 0x3, 'dh\x00', 0x8, 0x5, 0x3f}, 0x2c) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000000)=0x42000001000b5, 0x4) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000001000"], 0x8) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 142.902627][T10096] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 142.924030][T10111] overlayfs: lowerdir is in-use as upperdir/workdir 00:33:53 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) [ 142.952652][T10096] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 142.968556][T10113] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 00:33:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xb, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x20014067, 0x0, 0x0, 0x48}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x41f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 00:33:53 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) stat(0x0, &(0x7f0000000400)) mkdir(&(0x7f0000000080)='./file1\x00', 0x2) r0 = getgid() getgroups(0x0, 0x0) r1 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="02000000010003000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="040007000000000008000000", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0000000090b4e2342187048b1ba6b223b24296d42f5b2fe727245dc3ff915ef574fa902e93ea08862e5d9bc62224f7be14ca63ca6c9d8a49bfe98cca68c56b89d264ca6eb71acd615d84813d15b66348823c1d988425283d7845e82b94e7527d0a40fd3c", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="10000600000000002000070000000000"], 0x6c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000040)='./file1/../file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 143.008906][T10096] [EXT4 FS bs=2048, gc=1, bpg=2816, ipg=128, mo=a002e01c, mo2=0000] [ 143.033444][T10132] FAULT_INJECTION: forcing a failure. [ 143.033444][T10132] name failslab, interval 1, probability 0, space 0, times 0 [ 143.041062][T10096] System zones: 0-7, 56-56 [ 143.051421][T10133] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 143.073037][T10096] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 143.102776][T10132] CPU: 1 PID: 10132 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 143.110774][T10132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.120824][T10132] Call Trace: [ 143.124112][T10132] dump_stack+0x1d8/0x2f8 [ 143.128442][T10132] should_fail+0x555/0x770 [ 143.132854][T10132] __should_failslab+0x11a/0x160 [ 143.137784][T10132] ? security_file_alloc+0x36/0x200 [ 143.142998][T10132] should_failslab+0x9/0x20 [ 143.147497][T10132] kmem_cache_alloc+0x56/0x2e0 [ 143.149450][T10140] overlayfs: lowerdir is in-use as upperdir/workdir [ 143.152249][T10132] security_file_alloc+0x36/0x200 [ 143.152264][T10132] __alloc_file+0xde/0x390 [ 143.152274][T10132] alloc_empty_file+0xac/0x1b0 [ 143.152286][T10132] path_openat+0x9e/0x4460 [ 143.177410][T10132] ? __kasan_kmalloc+0x178/0x1b0 [ 143.182345][T10132] ? __kasan_kmalloc+0x11c/0x1b0 [ 143.187273][T10132] ? __kmalloc+0x254/0x340 [ 143.191675][T10132] ? kzalloc+0x26/0x40 [ 143.195737][T10132] ? prepare_creds+0x2c3/0x3c0 00:33:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8fc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x7) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) ioctl$sock_proto_private(r1, 0x89e9, &(0x7f0000000280)="eabec9bfdf04475fc4d2c10fc88e05d66577302cfdf6355f448c0424de12623ec8407bbdc54ed954831bbf416162e1281471935d7fb4b1a334810f6d450732218f71b9f55a0ed6362e559b3f8626b947cd9b618cb05b7850d27c22e0f14d888b13ad4c5a2e6fc5d37ce591b601e38edad6ce3cf89e859f63a9ab52ab1b7055417e0bd72cffd9314fac2305fb86c01726681a409dc2ef733e1ef15dfab547399050182f5026af513e46fc4e8f") r2 = dup(0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000400)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20) r3 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r2) ioctl$FICLONE(r3, 0x40049409, r2) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x21000, &(0x7f0000000440)='ip6gre0\x00') r5 = getpgrp(0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) ptrace$setregset(0x4205, r5, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) ioctl$KVM_TRANSLATE(r4, 0xc018ae85, &(0x7f0000000100)={0x2000, 0xf000, 0x1, 0x1, 0x8}) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000340)) 00:33:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="28dca5055e0bcfe47bf0701453094e42d19e6e91a20d0db2894c3c82a0ec5e82927c26210873ce3222ab27197fab17bbcd849a906b2cb60e24bd2398ff3d2fb0377ca09ff16c3bb8a8b63a09a56bf7ad12861564fd44b5399925b37ce27580f0cf59b7a18b025237791bc4a3479da6b804e3") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/pro\b\x00\x00\x00s/drop_\x03\x00ck\x01\x00'/34, 0x2, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000040)={0x2d}, 0x20000044) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x2) [ 143.200493][T10132] ? prepare_exec_creds+0x17/0xc0 [ 143.205508][T10132] ? __do_execve_file+0x2fe/0x1c50 [ 143.210608][T10132] ? __x64_sys_execve+0x94/0xb0 [ 143.215446][T10132] ? do_syscall_64+0xfe/0x140 [ 143.215457][T10132] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 143.215466][T10132] ? __kasan_kmalloc+0x11c/0x1b0 [ 143.215476][T10132] ? kasan_slab_alloc+0xf/0x20 [ 143.235843][T10132] ? kmem_cache_alloc+0x1f5/0x2e0 [ 143.235852][T10132] ? prepare_creds+0x3e/0x3c0 [ 143.235859][T10132] ? prepare_exec_creds+0x17/0xc0 00:33:53 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x581800, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x9) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xdd, &(0x7f0000000380)="09dca500000b4fe4620101000025b89bb23a4df92112e1e21e2130213991489518b59d7975eee56c107eced5e8610f10e10182a7477add6ba50000004eb46a98081d30fd99dd40cc7384dead0171a3f2187d96856c9dceb5cd1cf4a7d0ad663d1450026bd4a484cba77e149a48d9e3e2c75eafe66eb919a97ed753d1c0def3f038095609b262eb24") splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000440)=0x38, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xaaaaaaaaaaaacb3, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x10b, 0x9}], 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x101900, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x0, &(0x7f00000001c0)="2d1e906e05cac56060148bb9c66ebd865b52f9aaae972e358d9bfae2164667fe6db6448e4e6d943b239250e9d2cacefd22cd93eb9becfab5239e2e743504f57c07a1a7fab484e456bf8d63a0da7f5786f5c87d6e6660684c", 0x58) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000140)={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4}}, 0xa) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000240)=""/90) 00:33:53 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f00000004c0)={0xe, 0x0, 0x3, 0x6, 0x11, "803c2598acf595a7ddb2af23abc690a152"}, 0x1d) getsockopt$ax25_int(r0, 0x101, 0x0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8000, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000040)=0x2, 0x4) timerfd_gettime(r1, &(0x7f0000000480)) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000080)) [ 143.235870][T10132] ? do_syscall_64+0xfe/0x140 [ 143.235880][T10132] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 143.235889][T10132] ? __kasan_kmalloc+0x11c/0x1b0 [ 143.235895][T10132] ? kasan_kmalloc+0x9/0x10 [ 143.235907][T10132] ? __do_execve_file+0x278/0x1c50 [ 143.261263][T10132] ? do_syscall_64+0xfe/0x140 [ 143.261274][T10132] ? __fs_reclaim_release+0x4/0x20 [ 143.261288][T10132] ? memset+0x31/0x40 [ 143.285515][T10132] do_filp_open+0x192/0x3d0 [ 143.293965][T10132] ? debug_mutex_init+0x2d/0x60 [ 143.298811][T10132] ? __mutex_init+0xcc/0xf0 00:33:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'\xce\xd3\xff\xd3\x82\x00\x155\x1f\x84\xf2c\x87\xf6\x00', 0xd207}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000280)='\x92\x1f\xdf2)C^\xb4\x11\x0e\xdd\xc67rh\xadFI\xb1\xc8\xe0\xc7\xd1\x9c~V\xe5\x1e\xd1\xdb\xbe,-\x9f\xd8\xf8\xba\xfa\xc3:\xd0\xecL\x95h\x03\x00\x80\xd1}$\xa1V\'W\x16FU\x11ee\x0fU\x95g\xdd=w!\x1b\xaf\xe6\x9c\xc8+\xfc@\x85z\x89\x99\x9a\xb0$M\xf8') read$rfkill(r1, &(0x7f0000000040), 0x3e) pipe(&(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="ab000000111a2d761aa1b586c1a82ae533e45e3d52422f6421b27dd31140e4c30b369f06b80fe54047abe4f328198388429920226c76983ef4c67fdb31ae2f2f2627ab5193a80f3cbd6718b8fcf3ff6451f4f25edb0c87b237b339511a19a78a422d4be572a0af2a683f728fed00c62fe77163e4db4fbb044272700e3539f35c6da847bf2063d614a164fc670fd4878765ddb9904168fef7b7e62596a59e1e8638a96bbf9f9fa518650dec9c1e351bc0c4f5e55148f769319b92f500213b8ec74a579dfefe3abbaafb9400"/218], &(0x7f0000000180)=0xb3) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f00000001c0)={r4, 0x2}, &(0x7f0000000200)=0x8) [ 143.303314][T10132] ? smack_cred_prepare+0x5a7/0x5e0 [ 143.308504][T10132] ? __kmalloc+0x26c/0x340 [ 143.312930][T10132] ? __do_execve_file+0x6ce/0x1c50 [ 143.318130][T10132] do_open_execat+0xff/0x610 [ 143.322718][T10132] ? __kasan_check_read+0x11/0x20 [ 143.327737][T10132] __do_execve_file+0x72d/0x1c50 [ 143.332664][T10132] ? getname_flags+0x214/0x640 [ 143.337416][T10132] __x64_sys_execve+0x94/0xb0 [ 143.342094][T10132] do_syscall_64+0xfe/0x140 [ 143.346596][T10132] entry_SYSCALL_64_after_hwframe+0x49/0xbe 00:33:53 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000000c0)='syzkaller\x00'}, 0x30) fstatfs(r0, &(0x7f0000000380)=""/232) prctl$PR_SET_UNALIGN(0x6, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$getenv(0x4201, r1, 0x1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) [ 143.352478][T10132] RIP: 0033:0x459879 [ 143.356362][T10132] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 143.375957][T10132] RSP: 002b:00007f7d92d6ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 143.384383][T10132] RAX: ffffffffffffffda RBX: 00007f7d92d6ac90 RCX: 0000000000459879 [ 143.392346][T10132] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 00:33:54 executing program 3 (fault-call:1 fault-nth:10): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 143.400399][T10132] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 143.408352][T10132] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d6b6d4 [ 143.408357][T10132] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:54 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100), 0x0) [ 143.449568][T10160] FAULT_INJECTION: forcing a failure. [ 143.449568][T10160] name failslab, interval 1, probability 0, space 0, times 0 [ 143.469830][T10160] CPU: 1 PID: 10160 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 143.477817][T10160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.477821][T10160] Call Trace: [ 143.477836][T10160] dump_stack+0x1d8/0x2f8 [ 143.477852][T10160] should_fail+0x555/0x770 [ 143.495477][T10160] __should_failslab+0x11a/0x160 [ 143.495486][T10160] ? mm_alloc+0x23/0xd0 [ 143.495496][T10160] should_failslab+0x9/0x20 [ 143.495506][T10160] kmem_cache_alloc+0x56/0x2e0 [ 143.495514][T10160] mm_alloc+0x23/0xd0 [ 143.495525][T10160] __do_execve_file+0x9cc/0x1c50 [ 143.495539][T10160] ? getname_flags+0x214/0x640 [ 143.495551][T10160] __x64_sys_execve+0x94/0xb0 [ 143.509011][T10160] do_syscall_64+0xfe/0x140 [ 143.509024][T10160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 143.509035][T10160] RIP: 0033:0x459879 [ 143.531861][T10160] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 143.531867][T10160] RSP: 002b:00007f7d92d6ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 143.531876][T10160] RAX: ffffffffffffffda RBX: 00007f7d92d6ac90 RCX: 0000000000459879 [ 143.531885][T10160] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 143.550796][T10160] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 143.550801][T10160] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d6b6d4 [ 143.550806][T10160] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 [ 143.669315][T10164] EXT4-fs (sda1): re-mounted. Opts: 00:33:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = dup3(0xffffffffffffffff, r0, 0x80000) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000140)={0xfffffffffffffffc, 0x900000, 0x7, 0x4}, 0x8) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x2, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000180)=@ccm_128={{0x304}, "0049fd354bbe947a", "403b77d859395c9f9558c1d42e267c25", "5504f703", "afafa4a56ccfdffa"}, 0x28) getpeername$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r2 = socket(0x5, 0x80000, 0xfffffffffffffffa) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000240)={0x3, 0x1, 0x8, 0xe34, 0x0, 0x591}) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000080)=@int=0x1ff, 0x4) 00:33:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xc, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x44, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x0, 0x4) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, 0x0, 0x0) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) getsockname$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002540)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000002580)={@rand_addr="ebe6351b7552524469cceccb3d631c8d", r5}, 0x14) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000440)={'lo\x00'}) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0x3ae) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x0, 0x7, 0x4, 0x7f, 0x7, 0xfffffffffffffc00}, 0xacdd}, 0xa) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r7}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8923, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) sendto$inet6(r2, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0xfffffffffffffdf0) r8 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$KVM_SET_NESTED_STATE(r8, 0x4080aebf, &(0x7f00000004c0)={0x2, 0x0, 0x2080, {0x0, 0x1000, 0x3}, [], "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", "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"}) tee(r1, r3, 0x8, 0x2) creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r3) 00:33:54 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100), 0x0) 00:33:54 executing program 3 (fault-call:1 fault-nth:11): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 143.795724][T10196] FAULT_INJECTION: forcing a failure. [ 143.795724][T10196] name failslab, interval 1, probability 0, space 0, times 0 00:33:54 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x8, 0x10800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r1, 0x5}, 0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r3 = socket$kcm(0x11, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x5ee}], 0x1}, 0x0) 00:33:54 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x581800, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x9) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xdd, &(0x7f0000000380)="09dca500000b4fe4620101000025b89bb23a4df92112e1e21e2130213991489518b59d7975eee56c107eced5e8610f10e10182a7477add6ba50000004eb46a98081d30fd99dd40cc7384dead0171a3f2187d96856c9dceb5cd1cf4a7d0ad663d1450026bd4a484cba77e149a48d9e3e2c75eafe66eb919a97ed753d1c0def3f038095609b262eb24") splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000440)=0x38, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xaaaaaaaaaaaacb3, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x10b, 0x9}], 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x101900, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x0, &(0x7f00000001c0)="2d1e906e05cac56060148bb9c66ebd865b52f9aaae972e358d9bfae2164667fe6db6448e4e6d943b239250e9d2cacefd22cd93eb9becfab5239e2e743504f57c07a1a7fab484e456bf8d63a0da7f5786f5c87d6e6660684c", 0x58) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000140)={0x1f, {0x0, 0x0, 0x0, 0x0, 0x4}}, 0xa) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000240)=""/90) [ 143.864490][T10196] CPU: 0 PID: 10196 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 143.872501][T10196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.882555][T10196] Call Trace: [ 143.885852][T10196] dump_stack+0x1d8/0x2f8 [ 143.890188][T10196] should_fail+0x555/0x770 [ 143.894601][T10196] __should_failslab+0x11a/0x160 [ 143.894610][T10196] ? mm_alloc+0x23/0xd0 [ 143.894620][T10196] should_failslab+0x9/0x20 [ 143.894633][T10196] kmem_cache_alloc+0x56/0x2e0 [ 143.903681][T10196] mm_alloc+0x23/0xd0 [ 143.903693][T10196] __do_execve_file+0x9cc/0x1c50 [ 143.903708][T10196] ? getname_flags+0x214/0x640 [ 143.903719][T10196] __x64_sys_execve+0x94/0xb0 [ 143.931175][T10196] do_syscall_64+0xfe/0x140 [ 143.935680][T10196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 143.941563][T10196] RIP: 0033:0x459879 [ 143.945447][T10196] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 143.965038][T10196] RSP: 002b:00007f7d92d6ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 143.973438][T10196] RAX: ffffffffffffffda RBX: 00007f7d92d6ac90 RCX: 0000000000459879 [ 143.981405][T10196] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 143.989377][T10196] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 143.997336][T10196] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d6b6d4 [ 144.005304][T10196] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:54 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100), 0x0) 00:33:54 executing program 3 (fault-call:1 fault-nth:12): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 144.025949][T10200] : renamed from lo 00:33:54 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)={0x2, 0x0, [{0x4, 0x3b, &(0x7f0000000040)=""/59}, {0x6000, 0xd7, &(0x7f0000000200)=""/215}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f00000004c0)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'/203, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x2010, r1, 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf1800d, 0xeefffdef) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000340)) [ 144.097036][T10210] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 00:33:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net\x00') mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) [ 144.141543][T10230] FAULT_INJECTION: forcing a failure. [ 144.141543][T10230] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 144.157281][ T26] audit: type=1804 audit(1566693234.743:41): pid=10200 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir323619289/syzkaller.eFvskV/36/bus" dev="sda1" ino=16603 res=1 [ 144.158276][T10210] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 144.204723][ T26] audit: type=1804 audit(1566693234.743:42): pid=10192 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir323619289/syzkaller.eFvskV/36/bus" dev="sda1" ino=16603 res=1 [ 144.228701][T10230] CPU: 0 PID: 10230 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 144.236684][T10230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.246734][T10230] Call Trace: [ 144.250016][T10230] dump_stack+0x1d8/0x2f8 [ 144.254352][T10230] should_fail+0x555/0x770 [ 144.258770][T10230] should_fail_alloc_page+0x55/0x60 [ 144.263959][T10230] prepare_alloc_pages+0x283/0x470 [ 144.269067][T10230] __alloc_pages_nodemask+0xb2/0x5d0 [ 144.274353][T10230] ? trace_lock_release+0x135/0x1a0 [ 144.274571][T10210] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 144.279538][T10230] alloc_pages_current+0x2db/0x500 [ 144.279550][T10230] __get_free_pages+0xc/0x30 [ 144.279562][T10230] pgd_alloc+0x21/0x250 00:33:54 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[0x0], 0x0) [ 144.299993][T10210] [EXT4 FS bs=2048, gc=1, bpg=2816, ipg=128, mo=a002e01c, mo2=0000] [ 144.302952][T10230] mm_init+0x44f/0x6e0 [ 144.302961][T10230] mm_alloc+0xae/0xd0 [ 144.302973][T10230] __do_execve_file+0x9cc/0x1c50 [ 144.302988][T10230] ? getname_flags+0x214/0x640 [ 144.319354][T10210] System zones: 0-7, 56-56 [ 144.323976][T10230] __x64_sys_execve+0x94/0xb0 [ 144.323989][T10230] do_syscall_64+0xfe/0x140 [ 144.324003][T10230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 144.337787][T10230] RIP: 0033:0x459879 00:33:54 executing program 3 (fault-call:1 fault-nth:13): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 144.337796][T10230] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 144.337801][T10230] RSP: 002b:00007f7d92d6ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 144.337810][T10230] RAX: ffffffffffffffda RBX: 00007f7d92d6ac90 RCX: 0000000000459879 [ 144.337815][T10230] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 144.337819][T10230] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 144.337824][T10230] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d6b6d4 [ 144.337829][T10230] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 [ 144.421022][T10210] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 00:33:55 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100), 0x0) 00:33:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc0bcfe47bf07000000026543e333d2e5c76a40ea47594cc37eb17") r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$UI_DEV_DESTROY(r1, 0x5502) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='mountstats\x00') fanotify_mark(r2, 0x10, 0x8000002, r2, &(0x7f0000000040)='./file0\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x7fffef6c) preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/47, 0x2f}], 0x1, 0x0) 00:33:55 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f0000000080)='erofs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000100)=[{&(0x7f0000000240)="1133d4a8a29de2dc3f1949018d399c757c04e3e2ec45aeda14408197ee7b3cc2686ec8f241bd35ca89f31c9d3555b0217b810c5b53da5841540298c8068bf015b0662c4fe230cd73e4099318c2081de776ff408c723ac72721d94b946ba0dcbf1833457179f798f1bcc91e6bd5845b6eefaba855beee87b17896c8382df246357cf9cc174f2279bc24d840bd24ffcee48d62d26384faa99a1055598297911b07ee3d9a143e64f00c180b1181a60e21cef8a8f47b4579d1a8ab6ea207ab786063630eed9c065174e39bf844dcf81d502953e9c1bb8ff9968b87127248e5e006d65a088ae6faf9f32114cad1c93345cc796e74919857f2c4827a9b75fa08d34cccb8d31e110805877903606a80f635ebd4a9eba67336f9898d0c4cf86ed8c15a79e2c222743b6d5aa65bcf06b35004fa70d9578adc9ac9946ea7d9efcbba24e06955122b06b38c99700788178c4312cbe6389952e38ec870b272ddb441173a3652ca3fe9ab9ab681f241c5abc77cb7b7b4ca027ca7ebd28ee48a3329d6e981a9ed04ed0418949f66611b4d7983acbd3c6ced18ac066549448c9e06f6615b9e75bcc9fa7351325ae30aaa20375a053fd995e45abe87264db2a476b1142eb2a3a8ff0ec51c785af27a434b9d86209d31e5fe3119db0991ad212149d90c94fe63f1f4ae1f903fd029416f6f6adad1f8cb4fc2ef04876139ccb9d2140502db203cdd15595fff44fa4217d6d2889b3fc43d02cc1e5af7594084a212079ac939638c4db1021591cd3ff3837832c1463e88b4673e649a48e56467051cd67c0897fce51caf750d0ea220c5bd3a1a25745cb71f90faeeed52b025415a22a1e9d0d51e0861dc190c41f48170a4afcbbcde427ab4afb357ae22d6f049919532c35c9942b879202293f5be65219d18d7a6d15f2c9aa2246e104858f2ece1bb63b3167f0f9cd3ecd31a678e3632bc2995321fb86a7886ecbc0a86e58cf98204e4f5b4a2fbe1fef1c92acb377ebf3f6f6e951ce9b30d1198aab71bda67e1a4f2d914d5b412e46662f7fd312a2c0a6a46fa8a973194cc477f578183153a79c351c5c8ed716313d33dff8a19c5c52ad8d2de2687a8e9410bd5be4eda44becbebc245758f47b725a166da0cf7feabb4683d0b4b77c157b3b6a19bc4d120c6d57f0a8aa5092b1f8f8ac246ee8043de58891ae6a8453cddc85f8b2307a56594e44737d58f207c3003eb48ce0dff5bb5acba5d820b6ac70a09dc0bc8bf7f78ed0afeb1fbc42ab703d52d927579235e434aefec653977ac9e3c295377ac6f8f88f98f45f1c6718b830c04f8379917fce48c5de8437b405a92da820b8625fdf556a6e42f064a7336f3a0cb512ba5b5219c0debc4c98fbc315ab295c9f346d2b6090da3c9a3986c066a5cfb1685afd0af7ace42bf40539781714f51547aa40497737096094cf0ecf2cf0a891179cad3b5701d846e71fc22f2b03da9b897be123f1378ce4f83f254394c9241199adac73437380f365fcb952c789d23d37fb61588accdd6b21718e0752548a865c02b03a1490844ef75647702f76e517ac6cd50ba0f982a9d1fe9836578badeb9ea234ca0a8abbb1abf71cee5ba32d00aa3c6673fe058bfc1f84b45cd5357bbdf20598cbf6c708231734202b36b6b13922cbd5f87c64967c6696ed17392bbec9e60854f90544534aa6a652329ab1407f3e68a4a3c3d3faefed214505e62f4b69c18c7197e66fb56b0ebe58ceeeba35322ff4d7ca66a2ea31e872629ffead4d2b85ce90437d7a6267b6f74f799a10d806926cd08c29c5b8aa67257d2a61d443c246ee2323ac930992c3b6ba9566b56f6461b00b05faff3226863269f1ed4af2e72e262f591ff52e83de5a0db08475e2aebd1b6b52e16db2be84a3480a811deff1bd1b0e042931713d03cae4975426cc7ffe643413d1b0d5a0ab763d6da15caab5105e09316e4e86a08c4a7916da784909c07c5680a6c936e00904eb8860a5c98ab169ac513f44896cb0d6f0d9c8109f856a3f1795394eb7b0dd67c6d2142f62d5a81ad013edf4f634e6eafaaae3cf1460fa606ebe3749c7d09398be2532d975cd601e6e6ffe9f89c310a3cdb5a683fff7f5b983f068864ac5274169c90c31935c99c22abbff15a1a0957fed2c73b13274a65cc788d3067ec1841e1007ba6a606b8033dcaec4ff943cd22b2b16581a050c2496bd789e1ae5fa077afa29cf636a721ecd1214d6c9bb7ecf81f57f9d0697822b8b418fe9ea31c8cd552a646644274b09ba1652ffd599b6c3be2b6f1f7623279c0d54754b22a2060c128a1197fcb7e40cabaf9b25b9f7bcc06da568717bf82430f1720a68eb338eefb19e0deffe89e2b76cff99f437bcacdcc267b31232e2f18612c2371e0cafaade3ede432e4296eb982a793c35cd9dbf0724d7e648f9371f428d16710d60aed8237f21423691aab3133f2a6938f2fb63d7b08709d86fea1ff9c6825c658a8b9957c4f092fb2231e20d8e857ac770b951f9476c907fbd6ab6287fbaa7108582083772971648227b288d0b45ccdd36511567e650bab8fad99ec424d7a072cfef815e272111359383c698962e93d84385f4b85039d8d404a58a76f68778b7b10b93e12211e42cda322d40bbdecf0a5c51e8c00cceb4854e5ac9b7ea364018a87ff0dc30e89d4363386a15bf21011844c565bcc6a7f0c6f76119a407a19a8a57e08def2a6f82a36463164a504a81ff977f01d8ed621283c2ad46fe12bfd107b6f6315024cce8d10234a00c8426eb688f49b375c2c63279fac2955fcc4e5aed0b6e392544828942f3be576d4bbe74cf94112b129c95fbca7f9b6b3f69bfc1227fd30468c348e7bf91ea9b89a617b1a0fee74c7048aeb8a39ab7ac212523cec97f2186b9c02980cfe28312c0f883a89c16ba78f3222d7ae56c937588ebb98d06a506f4be160b83842eb839ad2294d63ffc82f0252becd795358b79801c96972a2318ad362219460a77513f4c91b2768e69619113de4e95a55f4ee88a1844a1d5891dd606e014791ee5a9dafd94890b4fbce5421c074730a7487f6d00c337cf1c0e4eccd0a6f0775421797fd6b62c786445c6a00fe4a9fc994af69ea19be0347c21603c570351d856bb1da6f10465bfa6916db9ff7b93ec6f0429c0ad5109621e0a8555c60fd46e3f21decf30ff676404e4c82ea6caacf3f54b17ef48ef46276ff31300eca0aa75fa545252d82f03b408ef1cbfc6c0765b2a929360be4bed25ce50a9b57b4e9bccfb4a764fc69a51598c573e38ab91b6728a06f1c59fe77981093aeeede81474541c802fa6b4a354e2800208dea5352fe3e36e4eb2003f8f0a50cb95eac515bed809d72798f815975e17d37501e4a2c288f3752d89af0738c30c1061a913aaf496b82087cbe3dfd521d8269e85bc579add63f8747e0fc534fbcb2f3e43794d188cd42b1f07f33f671002a1f3071d1a8fc48c09bbe0765e3ee4396fd9b7c221d8c6c6db68475a705afa90ce0a204925b7d716a174c59137448e68168249eae818d74fa77e3f8fde5221b6e370421c7df0ab55903b82d6e299f1bbf572b759065d40686851624f836135cedf04fbee4eb33e48979b406587f00b6aff207ce493b9575d5f429ff4d53755b508042f88318105c7cdefd61c14e54e64ea80537d3e1b0966485e6f114e6c39252a65f18a7e104ed3b7eb5f006474876253067191fe2cdf85de09c86817e12ff93808062363ce6272b17348be2bd450dd395a3ed20e23827b7687fe7222afd4e9c68964db3125da034ba600b79d5cdbc6ef1b4cabc7db2f0c2c3221a0a49b64f85e2f536f6614bdb26f94af1499d681331b4f292926508a4bed39087228d4bd4d9b00fd8610b78e2615b3f25f9f222073aea411006d9ed6bcc08c725a1a32843b5d68ae413228b02fbf047f02c79d7e2ff5a050f90cf554dccf101239036afe378295729bf2f2e68b5ef702fe3fc7ed672f1b5bff302709e9564e9c54db47a69cd8a91ff87880285b872ffff10e3745604a6dda2f5c9fb027a69d20d57378fa332d19272e2a3210447e37a74e5775cc3c382b429224f40a93360ab37e04287d668f12dd4218594772194eb814454dbf70a2fd7354cf30c9bce90149e30f8560a80b7205d08880bd996d4c17e5fbb3b91fc8a461794f95425a22e25ab41c8feceddfcdc081cbbbce9d5aee32512faefc308e38f4792e4e2e84e9f89cb4abe7ee64b82d33dbebbf440f6966d80fbafbd0ddbf3424a87aa76faeade1a7c224c10a5712346068ab3b02df313e8c479f160db379a0e1fb69befcdb4eb707ae69d7a020130ccd6b78d1715e88bf867067e7946e113a57a474b9c9b1f3964183592a58bb714f5481b7174dbb6e1bdfc3a969afcd2f1293f8015fcfdfc9c6afde532fee28e08c7a582007f540632964037f7534efa5d4622d7b6a9a78a5d0772abf9d34ab3134199155533ca22e76604b7e1f936c86fbf7710b7fb696b4b9339d4b9b02c784c275b4d5c508879ccf1d5ec85dea5b385eff33eb91e6f5e7cc5d664234d8d385ba2eef899e68fa4581f2cf2893e23ff4416fbeaeab319c9713465a425fa82438945c584780b0dff822a6c8990cc517cef6ff420f7e3aca8767d8fabf9fd5a757140f55ce54babb54aea9452f0087e9626ee02843ca473f0152df30e2f40e5be2dd00481017716c7feddb9174fb1acb6f4c25f3cc031d5e878131af4525253f7f0eb0685bf2efef75e5e5e0a5899e075f825fc2209dc41e37d075f9f63d950d35dd53d610b18f8ed448d9777bd14fe3d93185775d84d4c4508562677e6dacb7752870552051f5f97fa8dea6e29cf453b69d3359c86f4c82e0badb4b9324ac6c15a6e47ff123db3db6b4aa31c4910b4d255ef1d24495fcaf24cda490d7c28117646f7d19760bd6552d8f1ab4dc1e71010ed85c53d394219ef508f006e7960a6152d1937807e61d5adb5f378b97f1c04b21abe91b99113da9d14215b64e09b4c099c4c787c2bd079816af5dd4ae68bf9e4bc88d5eeb00beedadaf52b5c50bee67a732e0bbe40257921d33b40edfdf249c84d7463e863e9c5b551ca28789535fc2e8932811b3100286c56f90fcab25f2d47393a73b1fbba18dc11db81ab1afd0b03bbfeafb0d336cf54cc428050003e11eae17c8cd951d9cce45ebe7334f1bf162e096ad0e58ced36d73d6f5da5f12dbcde1dccce51eea13f99fc13c37d14b4865a31b1eea61061aaaaec08e74a542e1db7eb9aef5cfc0f3950466830d61b2b9ebd99fa711da49d66fc888d114060ca226fbd69cf88410747c3594b9ca4210b9a2451869b1b71036401565546e167b02816d4a429ef7be8cd2041eec7326aab9550d9760cee091a8da68fe90ee042854ed2f8908a319a9a2ff6464159009873c35587aa816ed540af46fa06e8b49b73bd2b906e18f5725aefeb5638df65e78036d30e12f9dcf370e948e0bd54b844e7b1ec9d7e5278fedda99feae5a408c80cd59e882f9759fda76f62c6a52d71b4999431f2be82ec544626e582bf50b091e5fc3ebbe6fd8d5067a1cbc218d5c3e69d760bf169a6901762d6aeea5863aff74524acca24518e7fec999ef85b1e1b17f42a7e7f2ed3f882524528b24ca84b24a4017a8d28fbfa74f5fd7ddddddfedeb1a6931d5f16f496bf1e36e53af04f81b2b4275f6c3bcd4a8a09f425144bac573664704f78623210f3a3170ae0a0e782c2e7283841ca43c2c2fc4386be50b11431e7dea3ff79b554ed30cd981d8f68a0854fc95caca27eaee00ed08e8f28f1ae8a983b0db4ce8bab1ee2f00d5fa75", 0x1000, 0x7f}], 0x2040c0, &(0x7f0000001240)={[{@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}], [{@dont_appraise='dont_appraise'}, {@uid_lt={'uid<', r1}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x31, 0x65, 0x62, 0x38, 0x64, 0x33, 0x3d7e8a7cfe920b02], 0x2d, [0x38, 0x64, 0x62, 0x7d], 0x2d, [0x36, 0x62, 0x62, 0x32], 0x2d, [0x77, 0x33, 0xf978d18c904a9cac, 0x35], 0x2d, [0x7b, 0x32, 0x76, 0x32, 0x32, 0x38, 0x65, 0x14d15f018e637d59]}}}]}) r2 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.cpu_exclusive\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000001300)=0x45e, 0x17e) [ 144.488892][T10254] FAULT_INJECTION: forcing a failure. [ 144.488892][T10254] name failslab, interval 1, probability 0, space 0, times 0 00:33:55 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) write$UHID_INPUT(r0, &(0x7f00000000c0)={0x8, "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", 0x1000}, 0x1006) [ 144.552519][T10254] CPU: 1 PID: 10254 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 144.564339][T10254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.574911][T10254] Call Trace: [ 144.578198][T10254] dump_stack+0x1d8/0x2f8 [ 144.582531][T10254] should_fail+0x555/0x770 [ 144.586937][T10254] __should_failslab+0x11a/0x160 [ 144.591859][T10254] ? vm_area_alloc+0x24/0xf0 [ 144.596434][T10254] should_failslab+0x9/0x20 00:33:55 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) accept$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x60, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'lblc\x00'}, 0x2c) 00:33:55 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[0x0], 0x0) [ 144.600928][T10254] kmem_cache_alloc+0x56/0x2e0 [ 144.605681][T10254] vm_area_alloc+0x24/0xf0 [ 144.610086][T10254] __do_execve_file+0xabd/0x1c50 [ 144.615024][T10254] __x64_sys_execve+0x94/0xb0 [ 144.619686][T10254] do_syscall_64+0xfe/0x140 [ 144.624166][T10254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 144.630034][T10254] RIP: 0033:0x459879 [ 144.633899][T10254] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 144.653483][T10254] RSP: 002b:00007f7d92d6ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 144.661875][T10254] RAX: ffffffffffffffda RBX: 00007f7d92d6ac90 RCX: 0000000000459879 [ 144.669817][T10254] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 144.677761][T10254] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 144.685707][T10254] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d6b6d4 [ 144.693649][T10254] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:55 executing program 3 (fault-call:1 fault-nth:14): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:55 executing program 4: r0 = socket(0x1e, 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10002, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, 0x0, 0x0) [ 144.788492][T10278] erofs: read_super, device -> /dev/loop2 [ 144.819890][T10278] erofs: options -> acl,nouser_xattr,user_xattr,user_xattr,nouser_xattr,dont_appraise,uid<00000000000000000000,mask=^MAY_APPEND,fsuuid=31eb8d3-8db}-6bb2-w3¬5-{2v228eY, [ 144.843578][T10278] erofs: cannot find valid erofs superblock [ 144.867681][T10289] FAULT_INJECTION: forcing a failure. [ 144.867681][T10289] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 144.891350][T10289] CPU: 0 PID: 10289 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 144.899348][T10289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.909386][T10289] Call Trace: [ 144.912655][T10289] dump_stack+0x1d8/0x2f8 [ 144.916961][T10289] should_fail+0x555/0x770 [ 144.921353][T10289] should_fail_alloc_page+0x55/0x60 [ 144.926527][T10289] prepare_alloc_pages+0x283/0x470 [ 144.931612][T10289] __alloc_pages_nodemask+0xb2/0x5d0 [ 144.936868][T10289] ? rcu_lock_release+0x26/0x30 [ 144.941698][T10289] alloc_pages_current+0x2db/0x500 [ 144.946783][T10289] __page_cache_alloc+0x7d/0x1f0 [ 144.951692][T10289] generic_file_read_iter+0x1247/0x21b0 [ 144.957214][T10289] ? memset+0x31/0x40 [ 144.961169][T10289] ext4_file_read_iter+0x25b/0x3a0 [ 144.966249][T10289] __vfs_read+0x59e/0x730 [ 144.970565][T10289] vfs_read+0x1dd/0x420 [ 144.974697][T10289] kernel_read+0xa3/0xf0 [ 144.978979][T10289] prepare_binprm+0x559/0x700 [ 144.983646][T10289] __do_execve_file+0x1085/0x1c50 [ 144.988650][T10289] __x64_sys_execve+0x94/0xb0 [ 144.993321][T10289] do_syscall_64+0xfe/0x140 [ 144.997797][T10289] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 145.003660][T10289] RIP: 0033:0x459879 [ 145.007523][T10289] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 145.027098][T10289] RSP: 002b:00007f7d92d6ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 145.035483][T10289] RAX: ffffffffffffffda RBX: 00007f7d92d6ac90 RCX: 0000000000459879 [ 145.043429][T10289] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 145.051373][T10289] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 145.059373][T10289] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d6b6d4 [ 145.067318][T10289] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 [ 145.120425][T10285] erofs: read_super, device -> /dev/loop2 [ 145.135575][T10285] erofs: options -> acl,nouser_xattr,user_xattr,user_xattr,nouser_xattr,dont_appraise,uid<00000000000000000000,mask=^MAY_APPEND,fsuuid=31eb8d3-8db}-6bb2-w3¬5-{2v228eY, [ 145.163306][T10285] erofs: cannot find valid erofs superblock 00:33:55 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)={0x2, 0x0, [{0x4, 0x3b, &(0x7f0000000040)=""/59}, {0x6000, 0xd7, &(0x7f0000000200)=""/215}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f00000004c0)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'/203, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x2010, r1, 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf1800d, 0xeefffdef) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000340)) 00:33:55 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) accept$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x60, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'lblc\x00'}, 0x2c) 00:33:55 executing program 4: r0 = socket$inet6(0xa, 0x10000000003, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x40000000000000}}, {{@in6=@ipv4={[], [], @remote}, 0x0, 0x3c}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x7}}, 0xe8) syz_emit_ethernet(0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYPTR64], 0x0) 00:33:55 executing program 3 (fault-call:1 fault-nth:15): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:55 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[0x0], 0x0) 00:33:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x20, 0x20300) accept4$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14, 0x800) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x1, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) accept$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) close(r0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa5) 00:33:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0xa61b0c3696460fdd) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000180), 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") unlinkat(0xffffffffffffffff, 0x0, 0x893fc4fd6dcabe11) fstatfs(r0, &(0x7f0000000080)=""/234) [ 145.260719][T10312] FAULT_INJECTION: forcing a failure. [ 145.260719][T10312] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 145.282335][T10312] CPU: 0 PID: 10312 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 145.290420][T10312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.300650][T10312] Call Trace: [ 145.303931][T10312] dump_stack+0x1d8/0x2f8 00:33:55 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) accept$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x60, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'lblc\x00'}, 0x2c) [ 145.308266][T10312] should_fail+0x555/0x770 [ 145.313179][T10312] should_fail_alloc_page+0x55/0x60 [ 145.318369][T10312] prepare_alloc_pages+0x283/0x470 [ 145.323471][T10312] __alloc_pages_nodemask+0xb2/0x5d0 [ 145.328741][T10312] ? trace_lock_release+0x135/0x1a0 [ 145.334020][T10312] ? __pud_alloc+0x1d9/0x210 [ 145.338606][T10312] alloc_pages_current+0x2db/0x500 [ 145.343711][T10312] __pmd_alloc+0x39/0x3d0 [ 145.348027][T10312] handle_mm_fault+0x3007/0x6010 [ 145.352940][T10312] __get_user_pages+0x1002/0x1610 [ 145.357938][T10312] get_user_pages_remote+0xdb/0x4b0 [ 145.363108][T10312] copy_strings+0x3ef/0x750 [ 145.367588][T10312] __do_execve_file+0x1115/0x1c50 [ 145.372586][T10312] __x64_sys_execve+0x94/0xb0 [ 145.377240][T10312] do_syscall_64+0xfe/0x140 [ 145.381717][T10312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 145.387590][T10312] RIP: 0033:0x459879 [ 145.391453][T10312] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:33:56 executing program 0 (fault-call:1 fault-nth:0): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 145.411025][T10312] RSP: 002b:00007f7d92d6ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 145.419406][T10312] RAX: ffffffffffffffda RBX: 00007f7d92d6ac90 RCX: 0000000000459879 [ 145.427350][T10312] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 145.435305][T10312] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 145.443255][T10312] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d6b6d4 [ 145.451220][T10312] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:56 executing program 3 (fault-call:1 fault-nth:16): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:56 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='numa_maps\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readahead(r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x800, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) 00:33:56 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) accept$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x60, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'lblc\x00'}, 0x2c) [ 145.571002][T10332] FAULT_INJECTION: forcing a failure. [ 145.571002][T10332] name failslab, interval 1, probability 0, space 0, times 0 [ 145.605540][T10332] CPU: 1 PID: 10332 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 145.608015][T10336] FAULT_INJECTION: forcing a failure. [ 145.608015][T10336] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 145.613529][T10332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.613533][T10332] Call Trace: [ 145.613550][T10332] dump_stack+0x1d8/0x2f8 [ 145.613564][T10332] should_fail+0x555/0x770 [ 145.613576][T10332] __should_failslab+0x11a/0x160 [ 145.613587][T10332] ? getname_flags+0xba/0x640 [ 145.613597][T10332] should_failslab+0x9/0x20 [ 145.613606][T10332] kmem_cache_alloc+0x56/0x2e0 [ 145.613616][T10332] getname_flags+0xba/0x640 [ 145.613627][T10332] getname+0x19/0x20 [ 145.613635][T10332] __x64_sys_execve+0x78/0xb0 [ 145.613646][T10332] do_syscall_64+0xfe/0x140 [ 145.613657][T10332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 145.613665][T10332] RIP: 0033:0x459879 [ 145.613675][T10332] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 145.613680][T10332] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 145.613690][T10332] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 145.613694][T10332] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 145.613704][T10332] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 145.749042][T10332] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 145.757001][T10332] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 [ 145.765525][T10336] CPU: 1 PID: 10336 Comm: syz-executor.3 Not tainted 5.3.0-rc5+ #91 [ 145.773506][T10336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.783548][T10336] Call Trace: [ 145.786831][T10336] dump_stack+0x1d8/0x2f8 [ 145.791139][T10336] should_fail+0x555/0x770 [ 145.795530][T10336] should_fail_alloc_page+0x55/0x60 [ 145.800703][T10336] prepare_alloc_pages+0x283/0x470 [ 145.805792][T10336] __alloc_pages_nodemask+0xb2/0x5d0 [ 145.811050][T10336] ? trace_lock_release+0x135/0x1a0 [ 145.816232][T10336] ? __pud_alloc+0x1d9/0x210 [ 145.820804][T10336] alloc_pages_current+0x2db/0x500 [ 145.825887][T10336] __pmd_alloc+0x39/0x3d0 [ 145.830191][T10336] handle_mm_fault+0x3007/0x6010 [ 145.835111][T10336] __get_user_pages+0x1002/0x1610 [ 145.840114][T10336] get_user_pages_remote+0xdb/0x4b0 [ 145.845289][T10336] copy_strings+0x3ef/0x750 [ 145.849777][T10336] __do_execve_file+0x1115/0x1c50 [ 145.854783][T10336] __x64_sys_execve+0x94/0xb0 [ 145.859436][T10336] do_syscall_64+0xfe/0x140 [ 145.863910][T10336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 145.869772][T10336] RIP: 0033:0x459879 [ 145.873645][T10336] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 145.893219][T10336] RSP: 002b:00007f7d92d6ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 145.901617][T10336] RAX: ffffffffffffffda RBX: 00007f7d92d6ac90 RCX: 0000000000459879 [ 145.909561][T10336] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 145.917503][T10336] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 145.925446][T10336] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d92d6b6d4 [ 145.933390][T10336] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='/dev/video37\x00', 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x69, 0x2c}, &(0x7f0000000140)={'enc=', 'pkcs1', ' hash=', {'crc32c-generic\x00'}}, &(0x7f00000001c0)="df5ecf83b14094fd79b655b3029c70d8a1be96454d4d6ad048e949af49cc2d89085c20e902d51f6ee6eb90da7572327504db32727dd6feb2fe367b9c59739b2ae0c57f3c1c2013ce5b19ec45cc2c42569f121a96db91be90f3661778e7e7604731a0fef01734a137f7", &(0x7f0000000240)=""/44) 00:33:56 executing program 3 (fault-call:1 fault-nth:17): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:56 executing program 0 (fault-call:1 fault-nth:1): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:56 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) accept$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) 00:33:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000580)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) futex(&(0x7f00000000c0), 0x32cb3a528d873a4, 0x1, &(0x7f0000000100)={0x77359400}, &(0x7f0000000140), 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x296, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000180)={0x0, 0x1000, 0x10001, 0x80000000, 0x2}) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f00000007c0)=ANY=[@ANYBLOB="5e0caa800a7fcd794a14b1d30c91f5208e215710bb5f685ad7e970408a3807fd556c9c2b72fda916900fcb2257cb01ed07cabf2d291deb4357405437717dc204c24afd1931ff78c57dbfb4a6cc7c9b65167f53d0243d29c149011554d0152340afec0ef2b1c24283a4bda6ca07738c04d252f4a469b30127dc69ccf6b3d69d977d53aacf69178fba6af6fda5525c690d4adc6cf972308b6fb0f6f218ec52e5475ccf832f600dbdb54605939767f043df40888157a7a16bc8298e31d2d56f67676025fd2da1a79e98613b39ee716dc5283b4a53798b2591b1a20c305f438724e45584b66fd88af1a09da837a6118b18e8561a62505c22"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:33:56 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x80, &(0x7f0000e68000)={0x2, 0x4e23, @remote}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='highspeed\x00', 0xa) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x4d, 0x10, 0x0, 0x0) 00:33:56 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r2 = accept(0xffffffffffffffff, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0x80) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x93f8d41103915277, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x100, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x345000) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000828bd7000fcdbdf25030000000c00020009000000000000002400070008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2fd5ffb934ba2f032b95ebb0a9800608560100", @ANYRES32=r5, @ANYBLOB="0c00040001000000000000000c00050022000000000000000c000400020000000000000008000100000000000c0004000180000000000000"], 0x7c}, 0x1, 0x0, 0x0, 0x4010}, 0x800) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r6, 0x3, &(0x7f0000000100)="1155a5465e0bcfe47bf070") getsockopt$SO_TIMESTAMPING(r6, 0x1, 0x38, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000400)={0x3, &(0x7f00000003c0)=[{0x9, 0x3, 0x80000000, 0x4}, {0x7, 0x20, 0x3052, 0x6}, {0x8, 0x7f, 0x7fff, 0xe74}]}, 0x10) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) [ 146.343210][T10357] FAULT_INJECTION: forcing a failure. [ 146.343210][T10357] name failslab, interval 1, probability 0, space 0, times 0 [ 146.364950][T10357] CPU: 0 PID: 10357 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 146.373034][T10357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.383166][T10357] Call Trace: [ 146.386439][T10357] dump_stack+0x1d8/0x2f8 [ 146.390837][T10357] should_fail+0x555/0x770 [ 146.395237][T10357] __should_failslab+0x11a/0x160 [ 146.400151][T10357] ? dup_fd+0x71/0xc90 [ 146.404193][T10357] should_failslab+0x9/0x20 [ 146.408670][T10357] kmem_cache_alloc+0x56/0x2e0 [ 146.413411][T10357] ? __kasan_check_write+0x14/0x20 [ 146.418492][T10357] dup_fd+0x71/0xc90 [ 146.422362][T10357] ? vfs_write+0x4a2/0x590 [ 146.426750][T10357] ? __fs_reclaim_release+0x4/0x20 [ 146.431833][T10357] unshare_files+0xc4/0x270 [ 146.436307][T10357] __do_execve_file+0x1f4/0x1c50 [ 146.441217][T10357] ? getname_flags+0x214/0x640 [ 146.445953][T10357] __x64_sys_execve+0x94/0xb0 [ 146.450604][T10357] do_syscall_64+0xfe/0x140 [ 146.455256][T10357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 146.461126][T10357] RIP: 0033:0x459879 [ 146.464998][T10357] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 146.484572][T10357] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 00:33:57 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) accept$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) [ 146.492953][T10357] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 146.500910][T10357] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 146.508854][T10357] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 146.516802][T10357] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 146.524746][T10357] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:57 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:57 executing program 0 (fault-call:1 fault-nth:2): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='/dev/video37\x00', 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r0, 0x69, 0x2c}, &(0x7f0000000140)={'enc=', 'pkcs1', ' hash=', {'crc32c-generic\x00'}}, &(0x7f00000001c0)="df5ecf83b14094fd79b655b3029c70d8a1be96454d4d6ad048e949af49cc2d89085c20e902d51f6ee6eb90da7572327504db32727dd6feb2fe367b9c59739b2ae0c57f3c1c2013ce5b19ec45cc2c42569f121a96db91be90f3661778e7e7604731a0fef01734a137f7", &(0x7f0000000240)=""/44) 00:33:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80002, 0x10000000003) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) clock_getres(0x1, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={0x0, 0xfffffffffffffff7, 0x8, 0x2, 0x1000, 0x1}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000180)={r2, 0x67, "5d6f55abd60a07b61676f3fa3defe0077b7cbc1054ba5dee72f584c7beee19eec8839bd55b75d955cc3fc7b29a96e82968b052d6532f66247aed3b49a59857085106a3b8dcb1a06fc22a6a7630cc4035435bf29681cd4c464fd1f2851c8c6caa5c0e0462c04526"}, &(0x7f00000000c0)=0x6f) r3 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x101080) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x11, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x7ff}, 0x20) 00:33:57 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) accept$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c) 00:33:57 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x18400, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4040000) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x3, 0x0, 0xffffffffffffffca) 00:33:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d6f0bcf6c7bf070") r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0x11, 0x0, &(0x7f0000000140)) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2040, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000080)={0x6000, &(0x7f0000000040), 0x0, r0, 0x7c95f5d30de7b07}) [ 146.727514][T10387] FAULT_INJECTION: forcing a failure. [ 146.727514][T10387] name failslab, interval 1, probability 0, space 0, times 0 00:33:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) keyctl$set_reqkey_keyring(0xe, 0x7) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f00000001c0)) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000780)={0x0, r2, 0x4e, 0x3f0000000000}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x3}, 0x1, 0x0, 0x0, 0x10000}, 0x2) writev(r1, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@local, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@local}}, 0x0) getgroups(0x2, &(0x7f0000000640)=[0x0, 0xffffffffffffffff]) setxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) sendmsg$nl_route(r2, &(0x7f0000000480)={&(0x7f0000000180), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=@ipv6_getrule={0x20, 0x22, 0xa030aaf751ec2f9a, 0x70bd2a, 0x0, {0xa, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x10) sendmsg$nl_route_sched(r2, 0x0, 0x0) 00:33:57 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) [ 146.793151][T10387] CPU: 0 PID: 10387 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 146.801148][T10387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.811195][T10387] Call Trace: [ 146.814481][T10387] dump_stack+0x1d8/0x2f8 [ 146.818810][T10387] should_fail+0x555/0x770 [ 146.823228][T10387] __should_failslab+0x11a/0x160 [ 146.828154][T10387] ? dup_fd+0x71/0xc90 [ 146.832203][T10387] should_failslab+0x9/0x20 [ 146.836685][T10387] kmem_cache_alloc+0x56/0x2e0 [ 146.841429][T10387] dup_fd+0x71/0xc90 [ 146.845306][T10387] unshare_files+0xc4/0x270 [ 146.849783][T10387] __do_execve_file+0x1f4/0x1c50 [ 146.854695][T10387] ? getname_flags+0x214/0x640 [ 146.859432][T10387] __x64_sys_execve+0x94/0xb0 [ 146.864081][T10387] do_syscall_64+0xfe/0x140 [ 146.868561][T10387] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 146.874423][T10387] RIP: 0033:0x459879 [ 146.878296][T10387] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 146.897958][T10387] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 146.906340][T10387] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 146.914285][T10387] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 146.922228][T10387] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 146.930168][T10387] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 146.938110][T10387] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:57 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='%dev/null\x00'], 0x0) 00:33:57 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) keyctl$set_reqkey_keyring(0xe, 0x7) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f00000001c0)) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000780)={0x0, r2, 0x4e, 0x3f0000000000}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x3}, 0x1, 0x0, 0x0, 0x10000}, 0x2) writev(r1, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@local, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@local}}, 0x0) getgroups(0x2, &(0x7f0000000640)=[0x0, 0xffffffffffffffff]) setxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) sendmsg$nl_route(r2, &(0x7f0000000480)={&(0x7f0000000180), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=@ipv6_getrule={0x20, 0x22, 0xa030aaf751ec2f9a, 0x70bd2a, 0x0, {0xa, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x10) sendmsg$nl_route_sched(r2, 0x0, 0x0) 00:33:57 executing program 0 (fault-call:1 fault-nth:3): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) keyctl$set_reqkey_keyring(0xe, 0x7) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f00000001c0)) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000780)={0x0, r2, 0x4e, 0x3f0000000000}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x3}, 0x1, 0x0, 0x0, 0x10000}, 0x2) writev(r1, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@local, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@local}}, 0x0) getgroups(0x2, &(0x7f0000000640)=[0x0, 0xffffffffffffffff]) setxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) sendmsg$nl_route(r2, &(0x7f0000000480)={&(0x7f0000000180), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=@ipv6_getrule={0x20, 0x22, 0xa030aaf751ec2f9a, 0x70bd2a, 0x0, {0xa, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x10) sendmsg$nl_route_sched(r2, 0x0, 0x0) 00:33:57 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:57 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x18400, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4040000) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x3, 0x0, 0xffffffffffffffca) [ 147.151654][T10428] FAULT_INJECTION: forcing a failure. [ 147.151654][T10428] name failslab, interval 1, probability 0, space 0, times 0 00:33:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) keyctl$set_reqkey_keyring(0xe, 0x7) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f00000001c0)) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000780)={0x0, r2, 0x4e, 0x3f0000000000}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x3}, 0x1, 0x0, 0x0, 0x10000}, 0x2) writev(r1, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@local, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@local}}, 0x0) getgroups(0x2, &(0x7f0000000640)=[0x0, 0xffffffffffffffff]) setxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) sendmsg$nl_route(r2, &(0x7f0000000480)={&(0x7f0000000180), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=@ipv6_getrule={0x20, 0x22, 0xa030aaf751ec2f9a, 0x70bd2a, 0x0, {0xa, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x10) sendmsg$nl_route_sched(r2, 0x0, 0x0) 00:33:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) keyctl$set_reqkey_keyring(0xe, 0x7) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f00000001c0)) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000780)={0x0, r2, 0x4e, 0x3f0000000000}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x3}, 0x1, 0x0, 0x0, 0x10000}, 0x2) writev(r1, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@local, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@local}}, 0x0) getgroups(0x2, &(0x7f0000000640)=[0x0, 0xffffffffffffffff]) setxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) sendmsg$nl_route(r2, &(0x7f0000000480)={&(0x7f0000000180), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=@ipv6_getrule={0x20, 0x22, 0xa030aaf751ec2f9a, 0x70bd2a, 0x0, {0xa, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x10) sendmsg$nl_route_sched(r2, 0x0, 0x0) [ 147.209861][T10428] CPU: 1 PID: 10428 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 147.217860][T10428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.227910][T10428] Call Trace: [ 147.231197][T10428] dump_stack+0x1d8/0x2f8 [ 147.235519][T10428] should_fail+0x555/0x770 [ 147.239919][T10428] __should_failslab+0x11a/0x160 [ 147.244843][T10428] should_failslab+0x9/0x20 [ 147.249335][T10428] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 147.255030][T10428] ? __kmalloc_node+0x3c/0x60 [ 147.259682][T10428] __kmalloc_node+0x3c/0x60 [ 147.264162][T10428] kvmalloc_node+0xcc/0x130 [ 147.268654][T10428] alloc_fdtable+0xe3/0x290 [ 147.273132][T10428] dup_fd+0x94f/0xc90 [ 147.277119][T10428] ? __fs_reclaim_release+0x4/0x20 [ 147.282213][T10428] unshare_files+0xc4/0x270 [ 147.287313][T10428] __do_execve_file+0x1f4/0x1c50 [ 147.292241][T10428] ? getname_flags+0x214/0x640 [ 147.296980][T10428] __x64_sys_execve+0x94/0xb0 [ 147.301631][T10428] do_syscall_64+0xfe/0x140 [ 147.306121][T10428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 147.311987][T10428] RIP: 0033:0x459879 [ 147.315857][T10428] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 147.335434][T10428] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 147.343820][T10428] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 147.351761][T10428] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 00:33:57 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:58 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='\\dev/null\x00'], 0x0) [ 147.359706][T10428] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 147.370862][T10428] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 147.378821][T10428] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:58 executing program 0 (fault-call:1 fault-nth:4): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:58 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:58 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='%dev/null\x00'], 0x0) 00:33:58 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x18400, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4040000) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x3, 0x0, 0xffffffffffffffca) 00:33:58 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/#ev/null\x00'], 0x0) [ 147.565235][T10454] FAULT_INJECTION: forcing a failure. [ 147.565235][T10454] name failslab, interval 1, probability 0, space 0, times 0 00:33:58 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:58 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) [ 147.636162][T10454] CPU: 1 PID: 10454 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 147.644169][T10454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.654209][T10454] Call Trace: [ 147.657478][T10454] dump_stack+0x1d8/0x2f8 [ 147.661788][T10454] should_fail+0x555/0x770 [ 147.666180][T10454] __should_failslab+0x11a/0x160 [ 147.671091][T10454] should_failslab+0x9/0x20 [ 147.675571][T10454] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 147.681282][T10454] ? __kmalloc_node+0x3c/0x60 [ 147.685941][T10454] __kmalloc_node+0x3c/0x60 [ 147.690416][T10454] kvmalloc_node+0xcc/0x130 [ 147.694892][T10454] alloc_fdtable+0xe3/0x290 [ 147.699368][T10454] dup_fd+0x94f/0xc90 [ 147.703324][T10454] unshare_files+0xc4/0x270 [ 147.707801][T10454] __do_execve_file+0x1f4/0x1c50 [ 147.712712][T10454] ? getname_flags+0x214/0x640 [ 147.717451][T10454] __x64_sys_execve+0x94/0xb0 [ 147.722104][T10454] do_syscall_64+0xfe/0x140 [ 147.726580][T10454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 147.732440][T10454] RIP: 0033:0x459879 [ 147.736304][T10454] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 147.755880][T10454] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 147.764262][T10454] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 147.772204][T10454] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 147.780149][T10454] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 147.788108][T10454] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 147.796087][T10454] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) keyctl$set_reqkey_keyring(0xe, 0x7) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f00000001c0)) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000780)={0x0, r2, 0x4e, 0x3f0000000000}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x3}, 0x1, 0x0, 0x0, 0x10000}, 0x2) writev(r1, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@local, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@local}}, 0x0) getgroups(0x2, &(0x7f0000000640)=[0x0, 0xffffffffffffffff]) setxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) sendmsg$nl_route(r2, &(0x7f0000000480)={&(0x7f0000000180), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=@ipv6_getrule={0x20, 0x22, 0xa030aaf751ec2f9a, 0x70bd2a, 0x0, {0xa, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x10) sendmsg$nl_route_sched(r2, 0x0, 0x0) 00:33:58 executing program 0 (fault-call:1 fault-nth:5): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:58 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x18400, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4040000) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0x3, 0x0, 0xffffffffffffffca) 00:33:58 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:58 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) [ 147.923514][T10484] FAULT_INJECTION: forcing a failure. [ 147.923514][T10484] name failslab, interval 1, probability 0, space 0, times 0 [ 147.939396][T10484] CPU: 1 PID: 10484 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 147.947380][T10484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.957428][T10484] Call Trace: [ 147.960717][T10484] dump_stack+0x1d8/0x2f8 [ 147.965050][T10484] should_fail+0x555/0x770 [ 147.969460][T10484] __should_failslab+0x11a/0x160 [ 147.974393][T10484] should_failslab+0x9/0x20 [ 147.978891][T10484] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 147.984591][T10484] ? __kmalloc_node+0x3c/0x60 [ 147.989245][T10484] __kmalloc_node+0x3c/0x60 [ 147.993716][T10484] kvmalloc_node+0xcc/0x130 [ 147.998190][T10484] alloc_fdtable+0x16c/0x290 [ 148.002747][T10484] dup_fd+0x94f/0xc90 [ 148.006700][T10484] unshare_files+0xc4/0x270 [ 148.011174][T10484] __do_execve_file+0x1f4/0x1c50 [ 148.016085][T10484] ? getname_flags+0x214/0x640 [ 148.020828][T10484] __x64_sys_execve+0x94/0xb0 [ 148.025475][T10484] do_syscall_64+0xfe/0x140 [ 148.029952][T10484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 148.035825][T10484] RIP: 0033:0x459879 [ 148.039686][T10484] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 148.059258][T10484] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 00:33:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) keyctl$set_reqkey_keyring(0xe, 0x7) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f00000001c0)) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000780)={0x0, r2, 0x4e, 0x3f0000000000}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x3}, 0x1, 0x0, 0x0, 0x10000}, 0x2) writev(r1, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@local, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@local}}, 0x0) getgroups(0x2, &(0x7f0000000640)=[0x0, 0xffffffffffffffff]) setxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) sendmsg$nl_route(r2, &(0x7f0000000480)={&(0x7f0000000180), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=@ipv6_getrule={0x20, 0x22, 0xa030aaf751ec2f9a, 0x70bd2a, 0x0, {0xa, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x10) sendmsg$nl_route_sched(r2, 0x0, 0x0) 00:33:58 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/%ev/null\x00'], 0x0) [ 148.067639][T10484] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 148.075586][T10484] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 148.083526][T10484] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 148.091464][T10484] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 148.099404][T10484] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:58 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:58 executing program 0 (fault-call:1 fault-nth:6): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:58 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:58 executing program 1: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/#ev/null\x00'], 0x0) 00:33:58 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/*ev/null\x00'], 0x0) [ 148.278813][T10506] FAULT_INJECTION: forcing a failure. [ 148.278813][T10506] name failslab, interval 1, probability 0, space 0, times 0 [ 148.309995][T10506] CPU: 0 PID: 10506 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 148.317989][T10506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 00:33:58 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) io_setup(0x6, &(0x7f0000002940)=0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000240)={0x16, 0xffffffffffffff72, 0xfa00, {&(0x7f00000000c0), 0x0, r3, 0x10, 0x1, @in={0x2, 0x4e22, @remote}}}, 0xa0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0xfffffffffffffffe}]) [ 148.328041][T10506] Call Trace: [ 148.331337][T10506] dump_stack+0x1d8/0x2f8 [ 148.335673][T10506] should_fail+0x555/0x770 [ 148.340087][T10506] __should_failslab+0x11a/0x160 [ 148.345021][T10506] should_failslab+0x9/0x20 [ 148.349517][T10506] kmem_cache_alloc_trace+0x5d/0x2f0 [ 148.354792][T10506] ? __do_execve_file+0x278/0x1c50 [ 148.359898][T10506] __do_execve_file+0x278/0x1c50 [ 148.364870][T10506] ? getname_flags+0x214/0x640 [ 148.369627][T10506] __x64_sys_execve+0x94/0xb0 [ 148.374295][T10506] do_syscall_64+0xfe/0x140 00:33:59 executing program 5: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:59 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x18400, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4040000) 00:33:59 executing program 4: setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:59 executing program 0 (fault-call:1 fault-nth:7): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 148.378793][T10506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 148.384668][T10506] RIP: 0033:0x459879 [ 148.384676][T10506] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 148.384684][T10506] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 148.408132][T10506] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 148.408137][T10506] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 148.408141][T10506] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 148.408146][T10506] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 148.408150][T10506] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:59 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/+ev/null\x00'], 0x0) 00:33:59 executing program 5: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:59 executing program 4: setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) [ 148.535776][T10535] FAULT_INJECTION: forcing a failure. [ 148.535776][T10535] name failslab, interval 1, probability 0, space 0, times 0 [ 148.578066][T10535] CPU: 1 PID: 10535 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 148.586054][T10535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.586059][T10535] Call Trace: [ 148.586075][T10535] dump_stack+0x1d8/0x2f8 [ 148.586090][T10535] should_fail+0x555/0x770 [ 148.586103][T10535] __should_failslab+0x11a/0x160 [ 148.586113][T10535] ? prepare_creds+0x3e/0x3c0 [ 148.586124][T10535] should_failslab+0x9/0x20 [ 148.586135][T10535] kmem_cache_alloc+0x56/0x2e0 [ 148.586145][T10535] prepare_creds+0x3e/0x3c0 [ 148.586155][T10535] prepare_exec_creds+0x17/0xc0 [ 148.586167][T10535] __do_execve_file+0x2fe/0x1c50 [ 148.586185][T10535] ? getname_flags+0x214/0x640 [ 148.599515][T10535] __x64_sys_execve+0x94/0xb0 [ 148.599530][T10535] do_syscall_64+0xfe/0x140 [ 148.655056][T10535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 148.660933][T10535] RIP: 0033:0x459879 [ 148.664801][T10535] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 148.684472][T10535] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 148.692868][T10535] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 148.700815][T10535] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 148.708760][T10535] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 148.716702][T10535] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 148.724643][T10535] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:59 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x18400, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') 00:33:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x18400, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4040000) 00:33:59 executing program 0 (fault-call:1 fault-nth:8): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:59 executing program 5: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:59 executing program 4: setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:59 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x18400, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 148.839013][T10554] FAULT_INJECTION: forcing a failure. [ 148.839013][T10554] name failslab, interval 1, probability 0, space 0, times 0 [ 148.895811][T10554] CPU: 1 PID: 10554 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 148.903802][T10554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.913927][T10554] Call Trace: [ 148.917198][T10554] dump_stack+0x1d8/0x2f8 [ 148.921501][T10554] should_fail+0x555/0x770 [ 148.925902][T10554] __should_failslab+0x11a/0x160 [ 148.930826][T10554] ? kzalloc+0x26/0x40 [ 148.934869][T10554] should_failslab+0x9/0x20 [ 148.939363][T10554] __kmalloc+0x7a/0x340 [ 148.943491][T10554] kzalloc+0x26/0x40 [ 148.947367][T10554] security_prepare_creds+0x40/0x260 [ 148.952632][T10554] prepare_creds+0x2c3/0x3c0 [ 148.957208][T10554] prepare_exec_creds+0x17/0xc0 [ 148.962031][T10554] __do_execve_file+0x2fe/0x1c50 [ 148.966966][T10554] ? getname_flags+0x214/0x640 [ 148.971708][T10554] __x64_sys_execve+0x94/0xb0 [ 148.976377][T10554] do_syscall_64+0xfe/0x140 [ 148.980882][T10554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 148.986758][T10554] RIP: 0033:0x459879 [ 148.990643][T10554] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 149.010221][T10554] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 149.018621][T10554] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 149.026565][T10554] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 149.034509][T10554] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:33:59 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/-ev/null\x00'], 0x0) [ 149.042473][T10554] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 149.050502][T10554] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:33:59 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:59 executing program 4: r0 = socket$inet(0x2b, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:59 executing program 0 (fault-call:1 fault-nth:9): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:33:59 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:33:59 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x18400, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4040000) 00:33:59 executing program 4: r0 = socket$inet(0x2b, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:59 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:33:59 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/.ev/null\x00'], 0x0) 00:33:59 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 149.277284][T10586] FAULT_INJECTION: forcing a failure. [ 149.277284][T10586] name failslab, interval 1, probability 0, space 0, times 0 [ 149.322439][T10586] CPU: 1 PID: 10586 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 149.330433][T10586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.340467][T10586] Call Trace: [ 149.343756][T10586] dump_stack+0x1d8/0x2f8 [ 149.348064][T10586] should_fail+0x555/0x770 [ 149.352455][T10586] __should_failslab+0x11a/0x160 [ 149.357385][T10586] ? __alloc_file+0x2c/0x390 [ 149.362048][T10586] should_failslab+0x9/0x20 [ 149.366524][T10586] kmem_cache_alloc+0x56/0x2e0 [ 149.371262][T10586] ? arch_stack_walk+0x98/0xe0 [ 149.375999][T10586] __alloc_file+0x2c/0x390 [ 149.380389][T10586] alloc_empty_file+0xac/0x1b0 [ 149.385125][T10586] path_openat+0x9e/0x4460 [ 149.389518][T10586] ? __kasan_kmalloc+0x178/0x1b0 [ 149.394437][T10586] ? __kasan_kmalloc+0x11c/0x1b0 [ 149.399349][T10586] ? __kmalloc+0x254/0x340 [ 149.403735][T10586] ? kzalloc+0x26/0x40 [ 149.407776][T10586] ? prepare_creds+0x2c3/0x3c0 [ 149.412508][T10586] ? prepare_exec_creds+0x17/0xc0 [ 149.417513][T10586] ? __do_execve_file+0x2fe/0x1c50 [ 149.422594][T10586] ? __x64_sys_execve+0x94/0xb0 [ 149.427420][T10586] ? do_syscall_64+0xfe/0x140 [ 149.432068][T10586] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 149.438108][T10586] ? __kasan_kmalloc+0x11c/0x1b0 [ 149.443037][T10586] ? kasan_slab_alloc+0xf/0x20 [ 149.447771][T10586] ? kmem_cache_alloc+0x1f5/0x2e0 [ 149.452767][T10586] ? prepare_creds+0x3e/0x3c0 [ 149.457414][T10586] ? prepare_exec_creds+0x17/0xc0 [ 149.462411][T10586] ? do_syscall_64+0xfe/0x140 [ 149.467081][T10586] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 149.473116][T10586] ? __kasan_kmalloc+0x11c/0x1b0 [ 149.478022][T10586] ? kasan_kmalloc+0x9/0x10 [ 149.482496][T10586] ? __do_execve_file+0x278/0x1c50 [ 149.488013][T10586] ? do_syscall_64+0xfe/0x140 [ 149.492659][T10586] ? __fs_reclaim_release+0x4/0x20 [ 149.497743][T10586] ? memset+0x31/0x40 [ 149.501696][T10586] do_filp_open+0x192/0x3d0 [ 149.506173][T10586] ? debug_mutex_init+0x2d/0x60 [ 149.510993][T10586] ? __mutex_init+0xcc/0xf0 [ 149.515471][T10586] ? smack_cred_prepare+0x5a7/0x5e0 [ 149.520639][T10586] ? __kmalloc+0x26c/0x340 [ 149.525038][T10586] ? __do_execve_file+0x6ce/0x1c50 [ 149.530125][T10586] do_open_execat+0xff/0x610 [ 149.534687][T10586] ? __kasan_check_read+0x11/0x20 [ 149.539684][T10586] __do_execve_file+0x72d/0x1c50 [ 149.544682][T10586] ? getname_flags+0x214/0x640 [ 149.549418][T10586] __x64_sys_execve+0x94/0xb0 [ 149.554257][T10586] do_syscall_64+0xfe/0x140 [ 149.560993][T10586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 149.567551][T10586] RIP: 0033:0x459879 [ 149.571418][T10586] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 149.590993][T10586] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 149.599376][T10586] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 149.607403][T10586] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 00:34:00 executing program 4: r0 = socket$inet(0x2b, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) [ 149.616685][T10586] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 149.624642][T10586] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 149.632588][T10586] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:34:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x18400, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4040000) 00:34:00 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:34:00 executing program 0 (fault-call:1 fault-nth:10): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:00 executing program 4: socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:34:00 executing program 2: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:00 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) [ 149.804032][T10615] FAULT_INJECTION: forcing a failure. [ 149.804032][T10615] name failslab, interval 1, probability 0, space 0, times 0 [ 149.832434][T10615] CPU: 1 PID: 10615 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 149.840428][T10615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.850481][T10615] Call Trace: [ 149.853776][T10615] dump_stack+0x1d8/0x2f8 [ 149.858105][T10615] should_fail+0x555/0x770 [ 149.862520][T10615] __should_failslab+0x11a/0x160 [ 149.867445][T10615] ? security_file_alloc+0x36/0x200 [ 149.872621][T10615] should_failslab+0x9/0x20 [ 149.877096][T10615] kmem_cache_alloc+0x56/0x2e0 [ 149.881838][T10615] security_file_alloc+0x36/0x200 [ 149.886847][T10615] __alloc_file+0xde/0x390 [ 149.891253][T10615] alloc_empty_file+0xac/0x1b0 [ 149.895990][T10615] path_openat+0x9e/0x4460 [ 149.900375][T10615] ? __kasan_kmalloc+0x178/0x1b0 [ 149.905297][T10615] ? __kasan_kmalloc+0x11c/0x1b0 [ 149.910227][T10615] ? __kmalloc+0x254/0x340 [ 149.914613][T10615] ? kzalloc+0x26/0x40 [ 149.918651][T10615] ? prepare_creds+0x2c3/0x3c0 [ 149.923385][T10615] ? prepare_exec_creds+0x17/0xc0 [ 149.928392][T10615] ? __do_execve_file+0x2fe/0x1c50 [ 149.933474][T10615] ? __x64_sys_execve+0x94/0xb0 [ 149.938296][T10615] ? do_syscall_64+0xfe/0x140 [ 149.942948][T10615] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 149.948987][T10615] ? __kasan_kmalloc+0x11c/0x1b0 [ 149.953895][T10615] ? kasan_slab_alloc+0xf/0x20 [ 149.958630][T10615] ? kmem_cache_alloc+0x1f5/0x2e0 [ 149.963623][T10615] ? prepare_creds+0x3e/0x3c0 [ 149.968270][T10615] ? prepare_exec_creds+0x17/0xc0 [ 149.973269][T10615] ? do_syscall_64+0xfe/0x140 [ 149.977914][T10615] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 149.983950][T10615] ? __kasan_kmalloc+0x11c/0x1b0 [ 149.988853][T10615] ? kasan_kmalloc+0x9/0x10 [ 149.993335][T10615] ? __do_execve_file+0x278/0x1c50 [ 149.998417][T10615] ? do_syscall_64+0xfe/0x140 [ 150.003080][T10615] ? __fs_reclaim_release+0x4/0x20 [ 150.008163][T10615] ? memset+0x31/0x40 [ 150.012118][T10615] do_filp_open+0x192/0x3d0 [ 150.016697][T10615] ? debug_mutex_init+0x2d/0x60 [ 150.021522][T10615] ? __mutex_init+0xcc/0xf0 [ 150.025997][T10615] ? smack_cred_prepare+0x5a7/0x5e0 [ 150.031162][T10615] ? __kmalloc+0x26c/0x340 [ 150.035553][T10615] ? __do_execve_file+0x6ce/0x1c50 [ 150.040649][T10615] do_open_execat+0xff/0x610 [ 150.045213][T10615] ? __kasan_check_read+0x11/0x20 [ 150.050215][T10615] __do_execve_file+0x72d/0x1c50 [ 150.055129][T10615] ? getname_flags+0x214/0x640 [ 150.059867][T10615] __x64_sys_execve+0x94/0xb0 [ 150.064515][T10615] do_syscall_64+0xfe/0x140 [ 150.068993][T10615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 150.074869][T10615] RIP: 0033:0x459879 [ 150.078735][T10615] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 150.098311][T10615] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 150.106696][T10615] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 150.114637][T10615] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 150.122587][T10615] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 150.130533][T10615] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 150.138473][T10615] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:34:00 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='//ev/null\x00'], 0x0) 00:34:00 executing program 2: symlink(0x0, &(0x7f0000000240)='./file0\x00') 00:34:00 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:34:00 executing program 4: socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:34:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x18400, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') 00:34:00 executing program 0 (fault-call:1 fault-nth:11): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:00 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:34:00 executing program 2: symlink(0x0, &(0x7f0000000240)='./file0\x00') 00:34:00 executing program 4: socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:34:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x18400, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:01 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) [ 150.382798][T10647] FAULT_INJECTION: forcing a failure. [ 150.382798][T10647] name failslab, interval 1, probability 0, space 0, times 0 00:34:01 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/0ev/null\x00'], 0x0) 00:34:01 executing program 2: symlink(0x0, &(0x7f0000000240)='./file0\x00') [ 150.489423][T10647] CPU: 1 PID: 10647 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 150.497503][T10647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.507547][T10647] Call Trace: [ 150.510840][T10647] dump_stack+0x1d8/0x2f8 [ 150.515172][T10647] should_fail+0x555/0x770 [ 150.519594][T10647] __should_failslab+0x11a/0x160 [ 150.524526][T10647] ? mm_alloc+0x23/0xd0 [ 150.528683][T10647] should_failslab+0x9/0x20 [ 150.533186][T10647] kmem_cache_alloc+0x56/0x2e0 [ 150.537945][T10647] mm_alloc+0x23/0xd0 [ 150.541915][T10647] __do_execve_file+0x9cc/0x1c50 [ 150.546849][T10647] ? getname_flags+0x214/0x640 [ 150.551611][T10647] __x64_sys_execve+0x94/0xb0 [ 150.556277][T10647] do_syscall_64+0xfe/0x140 [ 150.560758][T10647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 150.566623][T10647] RIP: 0033:0x459879 00:34:01 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, 0x0, 0x0) [ 150.570629][T10647] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 150.590214][T10647] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 150.598627][T10647] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 150.606627][T10647] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 150.614585][T10647] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 150.622531][T10647] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 150.630481][T10647] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:34:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:01 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, 0x0, 0x0) 00:34:01 executing program 0 (fault-call:1 fault-nth:12): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:01 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:34:01 executing program 2: symlink(&(0x7f0000000200)='./file0\x00', 0x0) 00:34:01 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/Lev/null\x00'], 0x0) 00:34:01 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, 0x0, 0x0) [ 150.779435][T10684] FAULT_INJECTION: forcing a failure. [ 150.779435][T10684] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 150.830254][T10684] CPU: 0 PID: 10684 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 150.838251][T10684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.848297][T10684] Call Trace: [ 150.851585][T10684] dump_stack+0x1d8/0x2f8 [ 150.855929][T10684] should_fail+0x555/0x770 [ 150.860347][T10684] should_fail_alloc_page+0x55/0x60 [ 150.865574][T10684] prepare_alloc_pages+0x283/0x470 [ 150.870686][T10684] __alloc_pages_nodemask+0xb2/0x5d0 [ 150.875964][T10684] ? trace_lock_release+0x135/0x1a0 [ 150.881163][T10684] alloc_pages_current+0x2db/0x500 [ 150.886269][T10684] __get_free_pages+0xc/0x30 [ 150.890852][T10684] pgd_alloc+0x21/0x250 [ 150.895002][T10684] mm_init+0x44f/0x6e0 [ 150.899063][T10684] mm_alloc+0xae/0xd0 [ 150.903030][T10684] __do_execve_file+0x9cc/0x1c50 [ 150.907947][T10684] ? getname_flags+0x214/0x640 [ 150.912689][T10684] __x64_sys_execve+0x94/0xb0 [ 150.917339][T10684] do_syscall_64+0xfe/0x140 [ 150.921814][T10684] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 150.927676][T10684] RIP: 0033:0x459879 [ 150.931542][T10684] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 150.951117][T10684] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 150.959496][T10684] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 150.967439][T10684] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 00:34:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:01 executing program 2: symlink(&(0x7f0000000200)='./file0\x00', 0x0) 00:34:01 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, 0x0, 0x0) [ 150.975383][T10684] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 150.983333][T10684] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 150.991281][T10684] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:34:01 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, 0x0, 0x0) 00:34:01 executing program 2: symlink(&(0x7f0000000200)='./file0\x00', 0x0) 00:34:01 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x0, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:34:01 executing program 0 (fault-call:1 fault-nth:13): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:01 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, 0x0, 0x0) 00:34:01 executing program 1: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:01 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/Xev/null\x00'], 0x0) 00:34:01 executing program 2 (fault-call:0 fault-nth:0): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:01 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x0, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) [ 151.179448][T10716] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:20002 00:34:01 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x0, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) [ 151.281395][T10730] FAULT_INJECTION: forcing a failure. [ 151.281395][T10730] name failslab, interval 1, probability 0, space 0, times 0 [ 151.299842][T10733] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:20002 [ 151.341421][T10737] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:20002 [ 151.350686][T10739] FAULT_INJECTION: forcing a failure. [ 151.350686][T10739] name failslab, interval 1, probability 0, space 0, times 0 [ 151.355060][T10730] CPU: 0 PID: 10730 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 [ 151.371253][T10730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.381300][T10730] Call Trace: [ 151.384585][T10730] dump_stack+0x1d8/0x2f8 [ 151.388914][T10730] should_fail+0x555/0x770 [ 151.393328][T10730] __should_failslab+0x11a/0x160 [ 151.398250][T10730] ? getname_flags+0xba/0x640 [ 151.402912][T10730] should_failslab+0x9/0x20 [ 151.407400][T10730] kmem_cache_alloc+0x56/0x2e0 [ 151.412153][T10730] getname_flags+0xba/0x640 [ 151.416642][T10730] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 151.422697][T10730] do_symlinkat+0x38/0x3f0 [ 151.427096][T10730] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 151.432539][T10730] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 151.438242][T10730] ? trace_hardirqs_off_caller+0x58/0x80 [ 151.443861][T10730] ? do_syscall_64+0x1d/0x140 [ 151.448521][T10730] __x64_sys_symlink+0x60/0x70 [ 151.453267][T10730] do_syscall_64+0xfe/0x140 [ 151.457751][T10730] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.463627][T10730] RIP: 0033:0x459879 [ 151.467504][T10730] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:34:02 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x0, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:34:02 executing program 1: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 151.487092][T10730] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 151.495494][T10730] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 [ 151.503462][T10730] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 151.511418][T10730] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 151.519402][T10730] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 151.519407][T10730] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 00:34:02 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x0, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:34:02 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/\\ev/null\x00'], 0x0) [ 151.547964][T10739] CPU: 1 PID: 10739 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 151.555957][T10739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.565997][T10739] Call Trace: [ 151.566013][T10739] dump_stack+0x1d8/0x2f8 [ 151.566026][T10739] should_fail+0x555/0x770 [ 151.566039][T10739] __should_failslab+0x11a/0x160 [ 151.573606][T10739] ? vm_area_alloc+0x24/0xf0 [ 151.573616][T10739] should_failslab+0x9/0x20 [ 151.573625][T10739] kmem_cache_alloc+0x56/0x2e0 [ 151.573633][T10739] vm_area_alloc+0x24/0xf0 [ 151.573642][T10739] __do_execve_file+0xabd/0x1c50 [ 151.573661][T10739] __x64_sys_execve+0x94/0xb0 [ 151.610815][T10739] do_syscall_64+0xfe/0x140 [ 151.616998][T10739] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.622884][T10739] RIP: 0033:0x459879 [ 151.626750][T10739] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:34:02 executing program 2 (fault-call:0 fault-nth:1): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 151.646329][T10739] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 151.654725][T10739] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 151.662673][T10739] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 151.670618][T10739] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 151.678562][T10739] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 151.686506][T10739] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 [ 151.710491][T10745] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:20002 00:34:02 executing program 0 (fault-call:1 fault-nth:14): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:02 executing program 1: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:02 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:34:02 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x0, @multicast2, 0x4e22, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) [ 151.776995][T10754] FAULT_INJECTION: forcing a failure. [ 151.776995][T10754] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 151.790208][T10754] CPU: 1 PID: 10754 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 [ 151.798175][T10754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.807212][T10755] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:20002 [ 151.808215][T10754] Call Trace: [ 151.808231][T10754] dump_stack+0x1d8/0x2f8 [ 151.808246][T10754] should_fail+0x555/0x770 00:34:02 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/cev/null\x00'], 0x0) [ 151.826877][T10754] should_fail_alloc_page+0x55/0x60 [ 151.832069][T10754] prepare_alloc_pages+0x283/0x470 [ 151.837184][T10754] __alloc_pages_nodemask+0xb2/0x5d0 [ 151.842470][T10754] kmem_getpages+0x56/0xa20 [ 151.846965][T10754] ? trace_lock_release+0x135/0x1a0 [ 151.852161][T10754] cache_grow_begin+0x7e/0x2c0 [ 151.856897][T10754] cache_alloc_refill+0x311/0x3f0 [ 151.861894][T10754] ? check_preemption_disabled+0xb7/0x2a0 [ 151.867608][T10754] kmem_cache_alloc+0x2b9/0x2e0 [ 151.872441][T10754] ? getname_flags+0xba/0x640 [ 151.877095][T10754] getname_flags+0xba/0x640 [ 151.881678][T10754] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 151.887724][T10754] do_symlinkat+0x38/0x3f0 [ 151.892116][T10754] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 151.897547][T10754] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 151.903233][T10754] ? trace_hardirqs_off_caller+0x58/0x80 [ 151.908836][T10754] ? do_syscall_64+0x1d/0x140 [ 151.913481][T10754] __x64_sys_symlink+0x60/0x70 [ 151.918215][T10754] do_syscall_64+0xfe/0x140 [ 151.922695][T10754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.928557][T10754] RIP: 0033:0x459879 [ 151.932430][T10754] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 151.952011][T10754] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 151.960390][T10754] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 [ 151.968334][T10754] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 151.976295][T10754] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 151.984242][T10754] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 151.992198][T10754] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 00:34:02 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:34:02 executing program 2 (fault-call:0 fault-nth:2): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:02 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 152.049361][T10766] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:20002 00:34:02 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x3, 0xa}, 0x2c) 00:34:02 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x3, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:34:02 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/hev/null\x00'], 0x0) [ 152.131766][T10777] FAULT_INJECTION: forcing a failure. [ 152.131766][T10777] name failslab, interval 1, probability 0, space 0, times 0 [ 152.149803][T10777] CPU: 1 PID: 10777 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 [ 152.157800][T10777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.167854][T10777] Call Trace: [ 152.171140][T10777] dump_stack+0x1d8/0x2f8 [ 152.175472][T10777] should_fail+0x555/0x770 [ 152.179975][T10777] __should_failslab+0x11a/0x160 [ 152.185026][T10777] ? getname_flags+0xba/0x640 [ 152.189890][T10777] should_failslab+0x9/0x20 [ 152.194394][T10777] kmem_cache_alloc+0x56/0x2e0 [ 152.199244][T10777] getname_flags+0xba/0x640 [ 152.203723][T10777] do_symlinkat+0x6d/0x3f0 [ 152.208128][T10777] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 152.213558][T10777] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 152.219248][T10777] ? do_syscall_64+0x1d/0x140 [ 152.223898][T10777] __x64_sys_symlink+0x60/0x70 [ 152.228650][T10777] do_syscall_64+0xfe/0x140 [ 152.233139][T10777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 152.239002][T10777] RIP: 0033:0x459879 [ 152.242878][T10777] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 152.262452][T10777] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 152.270832][T10777] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 [ 152.278775][T10777] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 152.286724][T10777] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 152.294665][T10777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 152.302610][T10777] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 00:34:02 executing program 2 (fault-call:0 fault-nth:3): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 152.345901][T10790] FAULT_INJECTION: forcing a failure. [ 152.345901][T10790] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 152.419344][T10790] CPU: 1 PID: 10790 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 152.427349][T10790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.437394][T10790] Call Trace: [ 152.440679][T10790] dump_stack+0x1d8/0x2f8 [ 152.445011][T10790] should_fail+0x555/0x770 [ 152.449425][T10790] should_fail_alloc_page+0x55/0x60 [ 152.454618][T10790] prepare_alloc_pages+0x283/0x470 [ 152.459708][T10790] __alloc_pages_nodemask+0xb2/0x5d0 [ 152.464961][T10790] ? rcu_lock_release+0x26/0x30 [ 152.469807][T10790] alloc_pages_current+0x2db/0x500 [ 152.474902][T10790] __page_cache_alloc+0x7d/0x1f0 [ 152.479836][T10790] generic_file_read_iter+0x1247/0x21b0 [ 152.485355][T10790] ? memset+0x31/0x40 [ 152.489306][T10790] ext4_file_read_iter+0x25b/0x3a0 [ 152.494385][T10790] __vfs_read+0x59e/0x730 [ 152.498703][T10790] vfs_read+0x1dd/0x420 [ 152.502827][T10790] kernel_read+0xa3/0xf0 [ 152.507040][T10790] prepare_binprm+0x559/0x700 [ 152.511688][T10790] __do_execve_file+0x1085/0x1c50 [ 152.516699][T10790] __x64_sys_execve+0x94/0xb0 [ 152.521343][T10790] do_syscall_64+0xfe/0x140 [ 152.525817][T10790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 152.531674][T10790] RIP: 0033:0x459879 [ 152.535538][T10790] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 152.555194][T10790] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 152.563573][T10790] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 152.571513][T10790] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 152.579453][T10790] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 152.587393][T10790] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 152.595331][T10790] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:34:03 executing program 0 (fault-call:1 fault-nth:15): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:03 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0xa}, 0x2c) 00:34:03 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00', 0x1, 0x3, 0xa}, 0x2c) 00:34:03 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:03 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/iev/null\x00'], 0x0) [ 152.637929][T10804] FAULT_INJECTION: forcing a failure. [ 152.637929][T10804] name failslab, interval 1, probability 0, space 0, times 0 [ 152.657946][T10804] CPU: 1 PID: 10804 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 [ 152.665931][T10804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.675984][T10804] Call Trace: [ 152.679273][T10804] dump_stack+0x1d8/0x2f8 [ 152.683600][T10804] should_fail+0x555/0x770 [ 152.688006][T10804] __should_failslab+0x11a/0x160 [ 152.692919][T10804] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 152.698622][T10804] should_failslab+0x9/0x20 [ 152.703115][T10804] __kmalloc+0x7a/0x340 [ 152.707247][T10804] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 152.712945][T10804] tomoyo_realpath_from_path+0xdc/0x7c0 [ 152.718464][T10804] tomoyo_path_perm+0x192/0x850 [ 152.723321][T10804] tomoyo_path_symlink+0x95/0xc0 [ 152.728243][T10804] security_path_symlink+0xed/0x170 [ 152.733414][T10804] do_symlinkat+0xf3/0x3f0 [ 152.737800][T10804] __x64_sys_symlink+0x60/0x70 [ 152.742553][T10804] do_syscall_64+0xfe/0x140 [ 152.747037][T10804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 152.753003][T10804] RIP: 0033:0x459879 [ 152.756871][T10804] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 152.776447][T10804] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 152.784826][T10804] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 [ 152.792770][T10804] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 152.800713][T10804] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 152.808674][T10804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 152.816615][T10804] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 [ 152.825333][T10804] ERROR: Out of memory at tomoyo_realpath_from_path. 00:34:03 executing program 2 (fault-call:0 fault-nth:4): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:03 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:03 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x3, 0xa}, 0x2c) [ 152.883157][T10814] FAULT_INJECTION: forcing a failure. [ 152.883157][T10814] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 152.902647][T10814] CPU: 0 PID: 10814 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 152.910631][T10814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.920675][T10814] Call Trace: [ 152.923957][T10814] dump_stack+0x1d8/0x2f8 [ 152.923975][T10814] should_fail+0x555/0x770 [ 152.932684][T10814] should_fail_alloc_page+0x55/0x60 [ 152.937869][T10814] prepare_alloc_pages+0x283/0x470 [ 152.937882][T10814] __alloc_pages_nodemask+0xb2/0x5d0 [ 152.937892][T10814] ? trace_lock_release+0x135/0x1a0 [ 152.937901][T10814] ? __pud_alloc+0x1d9/0x210 [ 152.937915][T10814] alloc_pages_current+0x2db/0x500 [ 152.937926][T10814] __pmd_alloc+0x39/0x3d0 [ 152.937934][T10814] handle_mm_fault+0x3007/0x6010 [ 152.937952][T10814] __get_user_pages+0x1002/0x1610 [ 152.943786][T10822] FAULT_INJECTION: forcing a failure. [ 152.943786][T10822] name failslab, interval 1, probability 0, space 0, times 0 [ 152.948301][T10814] get_user_pages_remote+0xdb/0x4b0 [ 152.948316][T10814] copy_strings+0x3ef/0x750 [ 152.972400][T10814] __do_execve_file+0x1115/0x1c50 [ 152.972420][T10814] __x64_sys_execve+0x94/0xb0 [ 152.972432][T10814] do_syscall_64+0xfe/0x140 [ 152.972445][T10814] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 152.972453][T10814] RIP: 0033:0x459879 [ 152.972462][T10814] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 152.972467][T10814] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 152.972476][T10814] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 152.972482][T10814] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 152.972487][T10814] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 152.972492][T10814] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 00:34:03 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0xa}, 0x2c) 00:34:03 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/lev/null\x00'], 0x0) 00:34:03 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:03 executing program 0 (fault-call:1 fault-nth:16): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 152.972497][T10814] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 [ 152.973035][T10822] CPU: 0 PID: 10822 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 [ 152.990074][T10822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.990079][T10822] Call Trace: [ 152.990095][T10822] dump_stack+0x1d8/0x2f8 [ 152.990109][T10822] should_fail+0x555/0x770 [ 152.990123][T10822] __should_failslab+0x11a/0x160 [ 152.990132][T10822] ? __d_alloc+0x2d/0x6e0 [ 152.990143][T10822] should_failslab+0x9/0x20 [ 152.990155][T10822] kmem_cache_alloc+0x56/0x2e0 [ 152.990165][T10822] __d_alloc+0x2d/0x6e0 [ 152.990176][T10822] d_alloc+0x4e/0x1d0 [ 152.990187][T10822] __lookup_hash+0xe5/0x290 [ 152.990201][T10822] filename_create+0x14f/0x670 [ 153.083540][T10822] ? getname_flags+0x214/0x640 [ 153.083551][T10822] do_symlinkat+0x82/0x3f0 [ 153.083560][T10822] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 153.083573][T10822] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 153.152574][T10822] __x64_sys_symlink+0x60/0x70 [ 153.152587][T10822] do_syscall_64+0xfe/0x140 [ 153.152601][T10822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.152609][T10822] RIP: 0033:0x459879 [ 153.152617][T10822] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 153.152622][T10822] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 153.152630][T10822] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 00:34:03 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:03 executing program 2 (fault-call:0 fault-nth:5): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:03 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/oev/null\x00'], 0x0) [ 153.152639][T10822] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 153.172030][T10822] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 153.172036][T10822] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 153.172041][T10822] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 00:34:03 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 153.287077][T10838] FAULT_INJECTION: forcing a failure. [ 153.287077][T10838] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 153.360723][T10854] FAULT_INJECTION: forcing a failure. [ 153.360723][T10854] name failslab, interval 1, probability 0, space 0, times 0 [ 153.363067][T10838] CPU: 0 PID: 10838 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 153.381294][T10838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.391350][T10838] Call Trace: [ 153.394625][T10838] dump_stack+0x1d8/0x2f8 [ 153.398945][T10838] should_fail+0x555/0x770 [ 153.403341][T10838] should_fail_alloc_page+0x55/0x60 [ 153.408577][T10838] prepare_alloc_pages+0x283/0x470 [ 153.413667][T10838] __alloc_pages_nodemask+0xb2/0x5d0 [ 153.418930][T10838] ? trace_lock_release+0x135/0x1a0 [ 153.424104][T10838] ? __pud_alloc+0x1d9/0x210 [ 153.428679][T10838] alloc_pages_current+0x2db/0x500 [ 153.433773][T10838] __pmd_alloc+0x39/0x3d0 [ 153.438082][T10838] handle_mm_fault+0x3007/0x6010 [ 153.443009][T10838] __get_user_pages+0x1002/0x1610 [ 153.448028][T10838] get_user_pages_remote+0xdb/0x4b0 [ 153.453298][T10838] copy_strings+0x3ef/0x750 [ 153.457790][T10838] __do_execve_file+0x1115/0x1c50 [ 153.462804][T10838] __x64_sys_execve+0x94/0xb0 [ 153.467459][T10838] do_syscall_64+0xfe/0x140 [ 153.471943][T10838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.477824][T10838] RIP: 0033:0x459879 [ 153.481700][T10838] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 153.501282][T10838] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 153.509681][T10838] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 153.517734][T10838] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 153.525700][T10838] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 153.533652][T10838] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 153.541976][T10838] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 [ 153.549941][T10854] CPU: 1 PID: 10854 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 00:34:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:04 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:04 executing program 5 (fault-call:2 fault-nth:0): r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:04 executing program 0 (fault-call:1 fault-nth:17): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 153.557913][T10854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.567961][T10854] Call Trace: [ 153.571251][T10854] dump_stack+0x1d8/0x2f8 [ 153.575580][T10854] should_fail+0x555/0x770 [ 153.580004][T10854] __should_failslab+0x11a/0x160 [ 153.584935][T10854] ? tomoyo_encode2+0x273/0x5a0 [ 153.589775][T10854] should_failslab+0x9/0x20 [ 153.594274][T10854] __kmalloc+0x7a/0x340 [ 153.598425][T10854] tomoyo_encode2+0x273/0x5a0 [ 153.603101][T10854] tomoyo_realpath_from_path+0x769/0x7c0 [ 153.608720][T10854] tomoyo_path_perm+0x192/0x850 [ 153.613636][T10854] tomoyo_path_symlink+0x95/0xc0 [ 153.618550][T10854] security_path_symlink+0xed/0x170 [ 153.623717][T10854] do_symlinkat+0xf3/0x3f0 [ 153.628102][T10854] __x64_sys_symlink+0x60/0x70 [ 153.632922][T10854] do_syscall_64+0xfe/0x140 [ 153.637398][T10854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.643257][T10854] RIP: 0033:0x459879 [ 153.647121][T10854] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 153.666700][T10854] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 153.675091][T10854] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 [ 153.683035][T10854] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 153.690979][T10854] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 153.698922][T10854] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 00:34:04 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/pev/null\x00'], 0x0) [ 153.706866][T10854] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 [ 153.716237][T10854] ERROR: Out of memory at tomoyo_realpath_from_path. 00:34:04 executing program 2 (fault-call:0 fault-nth:6): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:04 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x6, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 153.786446][T10866] FAULT_INJECTION: forcing a failure. [ 153.786446][T10866] name failslab, interval 1, probability 0, space 0, times 0 00:34:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:04 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 153.848982][T10878] FAULT_INJECTION: forcing a failure. [ 153.848982][T10878] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 153.856102][T10866] CPU: 0 PID: 10866 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 153.870409][T10866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.880450][T10866] Call Trace: [ 153.883737][T10866] dump_stack+0x1d8/0x2f8 [ 153.888050][T10866] should_fail+0x555/0x770 [ 153.892448][T10866] __should_failslab+0x11a/0x160 [ 153.897365][T10866] ? __pmd_alloc+0xbc/0x3d0 [ 153.901853][T10866] should_failslab+0x9/0x20 [ 153.906342][T10866] kmem_cache_alloc+0x56/0x2e0 [ 153.911089][T10866] __pmd_alloc+0xbc/0x3d0 [ 153.915397][T10866] handle_mm_fault+0x3007/0x6010 [ 153.920323][T10866] __get_user_pages+0x1002/0x1610 [ 153.925335][T10866] get_user_pages_remote+0xdb/0x4b0 [ 153.930600][T10866] copy_strings+0x3ef/0x750 [ 153.935085][T10866] __do_execve_file+0x1115/0x1c50 [ 153.940093][T10866] __x64_sys_execve+0x94/0xb0 [ 153.944750][T10866] do_syscall_64+0xfe/0x140 [ 153.949239][T10866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 153.955193][T10866] RIP: 0033:0x459879 [ 153.959069][T10866] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 153.978648][T10866] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 153.987036][T10866] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 153.994985][T10866] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 154.002939][T10866] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 154.010886][T10866] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 154.018833][T10866] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 [ 154.026798][T10878] CPU: 1 PID: 10878 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 [ 154.034856][T10878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.044902][T10878] Call Trace: [ 154.048177][T10878] dump_stack+0x1d8/0x2f8 [ 154.052481][T10878] should_fail+0x555/0x770 [ 154.056870][T10878] should_fail_alloc_page+0x55/0x60 [ 154.062036][T10878] prepare_alloc_pages+0x283/0x470 [ 154.067122][T10878] __alloc_pages_nodemask+0xb2/0x5d0 [ 154.072384][T10878] kmem_getpages+0x56/0xa20 [ 154.076860][T10878] cache_grow_begin+0x7e/0x2c0 [ 154.081596][T10878] cache_alloc_refill+0x311/0x3f0 [ 154.086591][T10878] ? check_preemption_disabled+0xb7/0x2a0 [ 154.092458][T10878] __kmalloc+0x318/0x340 [ 154.096686][T10878] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 154.102382][T10878] tomoyo_realpath_from_path+0xdc/0x7c0 [ 154.107898][T10878] tomoyo_path_perm+0x192/0x850 [ 154.112725][T10878] tomoyo_path_symlink+0x95/0xc0 [ 154.117649][T10878] security_path_symlink+0xed/0x170 [ 154.122838][T10878] do_symlinkat+0xf3/0x3f0 [ 154.127233][T10878] __x64_sys_symlink+0x60/0x70 [ 154.131967][T10878] do_syscall_64+0xfe/0x140 [ 154.136442][T10878] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 154.142318][T10878] RIP: 0033:0x459879 [ 154.146185][T10878] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 154.165761][T10878] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 154.174139][T10878] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 [ 154.182081][T10878] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 154.190036][T10878] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:34:04 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/sev/null\x00'], 0x0) [ 154.197994][T10878] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 154.205962][T10878] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 00:34:04 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x600, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:04 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x6, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:04 executing program 2 (fault-call:0 fault-nth:7): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:04 executing program 0 (fault-call:1 fault-nth:18): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:04 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x1000000, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:04 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x600, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 154.407901][T10906] FAULT_INJECTION: forcing a failure. [ 154.407901][T10906] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 154.408546][T10907] FAULT_INJECTION: forcing a failure. [ 154.408546][T10907] name failslab, interval 1, probability 0, space 0, times 0 [ 154.430867][T10906] CPU: 0 PID: 10906 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 154.441737][T10906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.451787][T10906] Call Trace: [ 154.455073][T10906] dump_stack+0x1d8/0x2f8 [ 154.459396][T10906] should_fail+0x555/0x770 [ 154.463815][T10906] should_fail_alloc_page+0x55/0x60 [ 154.469005][T10906] prepare_alloc_pages+0x283/0x470 [ 154.474110][T10906] __alloc_pages_nodemask+0xb2/0x5d0 [ 154.479383][T10906] ? __pmd_alloc+0x36a/0x3d0 [ 154.483968][T10906] alloc_pages_current+0x2db/0x500 [ 154.489069][T10906] pte_alloc_one+0x1f/0x180 [ 154.493563][T10906] __pte_alloc+0x20/0x2f0 [ 154.497882][T10906] handle_mm_fault+0x5455/0x6010 [ 154.502819][T10906] __get_user_pages+0x1002/0x1610 [ 154.507844][T10906] get_user_pages_remote+0xdb/0x4b0 [ 154.513036][T10906] copy_strings+0x3ef/0x750 [ 154.517534][T10906] __do_execve_file+0x1115/0x1c50 [ 154.522551][T10906] __x64_sys_execve+0x94/0xb0 [ 154.527301][T10906] do_syscall_64+0xfe/0x140 [ 154.531786][T10906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 154.537661][T10906] RIP: 0033:0x459879 [ 154.541536][T10906] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 154.572757][T10906] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 154.581144][T10906] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 154.589098][T10906] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 154.589102][T10906] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 154.589107][T10906] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 154.589110][T10906] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 [ 154.591475][T10907] CPU: 0 PID: 10907 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 [ 154.628876][T10907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.638903][T10907] Call Trace: [ 154.642170][T10907] dump_stack+0x1d8/0x2f8 [ 154.646475][T10907] should_fail+0x555/0x770 [ 154.650867][T10907] __should_failslab+0x11a/0x160 [ 154.655777][T10907] ? tomoyo_encode2+0x273/0x5a0 [ 154.660599][T10907] should_failslab+0x9/0x20 [ 154.665071][T10907] __kmalloc+0x7a/0x340 [ 154.669197][T10907] tomoyo_encode2+0x273/0x5a0 [ 154.673846][T10907] tomoyo_realpath_from_path+0x769/0x7c0 [ 154.679453][T10907] tomoyo_path_perm+0x192/0x850 [ 154.684287][T10907] tomoyo_path_symlink+0x95/0xc0 [ 154.689195][T10907] security_path_symlink+0xed/0x170 [ 154.694367][T10907] do_symlinkat+0xf3/0x3f0 [ 154.698760][T10907] __x64_sys_symlink+0x60/0x70 [ 154.703498][T10907] do_syscall_64+0xfe/0x140 [ 154.707975][T10907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 154.713838][T10907] RIP: 0033:0x459879 [ 154.717706][T10907] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 154.737279][T10907] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 154.745660][T10907] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 00:34:05 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/tev/null\x00'], 0x0) 00:34:05 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x6000000, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 154.753605][T10907] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 154.761546][T10907] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 154.769488][T10907] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 154.777521][T10907] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 [ 154.792474][T10907] ERROR: Out of memory at tomoyo_realpath_from_path. 00:34:05 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x1000000, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:05 executing program 0 (fault-call:1 fault-nth:19): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:05 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x6000000, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:05 executing program 2 (fault-call:0 fault-nth:8): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:05 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x100000000000000, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 154.908842][T10930] FAULT_INJECTION: forcing a failure. [ 154.908842][T10930] name failslab, interval 1, probability 0, space 0, times 0 00:34:05 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x600000000000000, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 154.977645][T10930] CPU: 1 PID: 10930 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 154.985645][T10930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.995699][T10930] Call Trace: [ 154.998993][T10930] dump_stack+0x1d8/0x2f8 [ 155.003345][T10930] should_fail+0x555/0x770 [ 155.007751][T10930] __should_failslab+0x11a/0x160 [ 155.012673][T10930] ? ptlock_alloc+0x20/0x70 [ 155.017162][T10930] should_failslab+0x9/0x20 [ 155.021727][T10930] kmem_cache_alloc+0x56/0x2e0 [ 155.026460][T10930] ? alloc_pages_current+0x2db/0x500 [ 155.031716][T10930] ptlock_alloc+0x20/0x70 [ 155.036021][T10930] pte_alloc_one+0x6e/0x180 [ 155.040503][T10930] __pte_alloc+0x20/0x2f0 [ 155.044806][T10930] handle_mm_fault+0x5455/0x6010 [ 155.049806][T10930] __get_user_pages+0x1002/0x1610 [ 155.054896][T10930] get_user_pages_remote+0xdb/0x4b0 [ 155.060066][T10930] copy_strings+0x3ef/0x750 [ 155.064560][T10930] __do_execve_file+0x1115/0x1c50 [ 155.069562][T10930] __x64_sys_execve+0x94/0xb0 [ 155.074221][T10930] do_syscall_64+0xfe/0x140 [ 155.078712][T10930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 155.084582][T10930] RIP: 0033:0x459879 [ 155.088461][T10930] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 155.108141][T10930] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 155.116544][T10930] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 00:34:05 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/uev/null\x00'], 0x0) [ 155.124512][T10930] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 155.132456][T10930] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 155.140399][T10930] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 155.148344][T10930] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:34:05 executing program 0 (fault-call:1 fault-nth:20): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 155.193111][T10942] FAULT_INJECTION: forcing a failure. [ 155.193111][T10942] name failslab, interval 1, probability 0, space 0, times 0 [ 155.224278][T10942] CPU: 0 PID: 10942 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 [ 155.232280][T10942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.242335][T10942] Call Trace: [ 155.245622][T10942] dump_stack+0x1d8/0x2f8 [ 155.249958][T10942] should_fail+0x555/0x770 [ 155.254637][T10942] __should_failslab+0x11a/0x160 [ 155.259748][T10942] ? tomoyo_encode2+0x273/0x5a0 [ 155.264596][T10942] should_failslab+0x9/0x20 [ 155.269091][T10942] __kmalloc+0x7a/0x340 [ 155.273230][T10942] tomoyo_encode2+0x273/0x5a0 [ 155.277884][T10942] tomoyo_encode+0x29/0x40 [ 155.282274][T10942] tomoyo_path_perm+0x2b4/0x850 [ 155.287113][T10942] tomoyo_path_symlink+0x95/0xc0 [ 155.292024][T10942] security_path_symlink+0xed/0x170 [ 155.297197][T10942] do_symlinkat+0xf3/0x3f0 [ 155.301594][T10942] __x64_sys_symlink+0x60/0x70 [ 155.306332][T10942] do_syscall_64+0xfe/0x140 [ 155.310911][T10942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 155.316774][T10942] RIP: 0033:0x459879 [ 155.320645][T10942] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:34:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:05 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0xffffffff00000000, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:05 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x100000000000000, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 155.340307][T10942] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 155.348779][T10942] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 [ 155.356726][T10942] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 155.364678][T10942] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 155.372799][T10942] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 155.380745][T10942] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 00:34:06 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x2, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 155.424875][T10958] FAULT_INJECTION: forcing a failure. [ 155.424875][T10958] name failslab, interval 1, probability 0, space 0, times 0 [ 155.452486][T10958] CPU: 0 PID: 10958 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 155.460486][T10958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.470628][T10958] Call Trace: 00:34:06 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x3, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:06 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/xev/null\x00'], 0x0) [ 155.473914][T10958] dump_stack+0x1d8/0x2f8 [ 155.478257][T10958] should_fail+0x555/0x770 [ 155.482680][T10958] __should_failslab+0x11a/0x160 [ 155.487703][T10958] ? __anon_vma_prepare+0x68/0x4c0 [ 155.492900][T10958] should_failslab+0x9/0x20 [ 155.497452][T10958] kmem_cache_alloc+0x56/0x2e0 [ 155.502212][T10958] ? __might_sleep+0x8f/0x100 [ 155.506890][T10958] __anon_vma_prepare+0x68/0x4c0 [ 155.511820][T10958] ? _raw_spin_unlock+0x2c/0x50 [ 155.516664][T10958] ? __pte_alloc+0x1ba/0x2f0 00:34:06 executing program 2 (fault-call:0 fault-nth:9): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 155.521249][T10958] handle_mm_fault+0x5814/0x6010 [ 155.526275][T10958] __get_user_pages+0x1002/0x1610 [ 155.531311][T10958] get_user_pages_remote+0xdb/0x4b0 [ 155.536510][T10958] copy_strings+0x3ef/0x750 [ 155.541014][T10958] __do_execve_file+0x1115/0x1c50 [ 155.546045][T10958] __x64_sys_execve+0x94/0xb0 [ 155.550717][T10958] do_syscall_64+0xfe/0x140 [ 155.550731][T10958] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 155.550742][T10958] RIP: 0033:0x459879 [ 155.561089][T10958] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 155.561095][T10958] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 155.561108][T10958] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 155.600997][T10958] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 155.601002][T10958] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:34:06 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x600000000000000, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:06 executing program 0 (fault-call:1 fault-nth:21): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:06 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x4, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 155.601008][T10958] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 155.601013][T10958] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 [ 155.656686][T10977] FAULT_INJECTION: forcing a failure. [ 155.656686][T10977] name failslab, interval 1, probability 0, space 0, times 0 00:34:06 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/zev/null\x00'], 0x0) [ 155.733758][T10988] FAULT_INJECTION: forcing a failure. [ 155.733758][T10988] name failslab, interval 1, probability 0, space 0, times 0 [ 155.744642][T10977] CPU: 1 PID: 10977 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 [ 155.754324][T10977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.764376][T10977] Call Trace: [ 155.767660][T10977] dump_stack+0x1d8/0x2f8 [ 155.772411][T10977] should_fail+0x555/0x770 [ 155.776814][T10977] __should_failslab+0x11a/0x160 [ 155.781732][T10977] ? ext4_alloc_inode+0x1f/0x560 [ 155.786650][T10977] should_failslab+0x9/0x20 [ 155.791134][T10977] kmem_cache_alloc+0x56/0x2e0 [ 155.795906][T10977] ? set_qf_name+0x3c0/0x3c0 [ 155.800474][T10977] ext4_alloc_inode+0x1f/0x560 [ 155.805215][T10977] ? set_qf_name+0x3c0/0x3c0 [ 155.809794][T10977] new_inode_pseudo+0x68/0x240 [ 155.814536][T10977] new_inode+0x28/0x1c0 [ 155.818673][T10977] ? trace_ext4_request_inode+0x28b/0x2d0 [ 155.824372][T10977] __ext4_new_inode+0x43d/0x5650 [ 155.829291][T10977] ? memset+0x31/0x40 [ 155.833262][T10977] ext4_symlink+0x536/0xed0 [ 155.837754][T10977] vfs_symlink+0x36f/0x4f0 [ 155.842155][T10977] do_symlinkat+0x187/0x3f0 [ 155.846639][T10977] __x64_sys_symlink+0x60/0x70 [ 155.851385][T10977] do_syscall_64+0xfe/0x140 [ 155.855879][T10977] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 155.861837][T10977] RIP: 0033:0x459879 [ 155.865713][T10977] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 155.885298][T10977] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 155.893688][T10977] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 [ 155.901670][T10977] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 155.909640][T10977] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 155.917594][T10977] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 155.925650][T10977] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 00:34:06 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0xffffffff00000000, 0x484, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:06 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x5, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 155.933616][T10988] CPU: 0 PID: 10988 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 155.941677][T10988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.952249][T10988] Call Trace: [ 155.955544][T10988] dump_stack+0x1d8/0x2f8 [ 155.959875][T10988] should_fail+0x555/0x770 [ 155.964301][T10988] __should_failslab+0x11a/0x160 [ 155.969236][T10988] ? __anon_vma_prepare+0xbd/0x4c0 [ 155.974345][T10988] should_failslab+0x9/0x20 [ 155.978934][T10988] kmem_cache_alloc+0x56/0x2e0 00:34:06 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x2, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:06 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x6, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 155.983696][T10988] ? __anon_vma_prepare+0x68/0x4c0 [ 155.988805][T10988] ? find_mergeable_anon_vma+0x46c/0x710 [ 155.994444][T10988] __anon_vma_prepare+0xbd/0x4c0 [ 155.999398][T10988] ? _raw_spin_unlock+0x2c/0x50 [ 156.004251][T10988] handle_mm_fault+0x5814/0x6010 [ 156.009296][T10988] __get_user_pages+0x1002/0x1610 [ 156.014332][T10988] get_user_pages_remote+0xdb/0x4b0 [ 156.019536][T10988] copy_strings+0x3ef/0x750 [ 156.024046][T10988] __do_execve_file+0x1115/0x1c50 [ 156.029171][T10988] __x64_sys_execve+0x94/0xb0 00:34:06 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/d%v/null\x00'], 0x0) [ 156.033847][T10988] do_syscall_64+0xfe/0x140 [ 156.038369][T10988] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 156.044261][T10988] RIP: 0033:0x459879 [ 156.048176][T10988] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 156.067788][T10988] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 156.076178][T10988] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 00:34:06 executing program 2 (fault-call:0 fault-nth:10): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:06 executing program 0 (fault-call:1 fault-nth:22): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) [ 156.076183][T10988] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 156.076187][T10988] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 156.076191][T10988] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 156.076195][T10988] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:34:06 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x7, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 156.161849][T11012] FAULT_INJECTION: forcing a failure. [ 156.161849][T11012] name failslab, interval 1, probability 0, space 0, times 0 [ 156.200279][T11016] FAULT_INJECTION: forcing a failure. [ 156.200279][T11016] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 156.205314][T11012] CPU: 0 PID: 11012 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 [ 156.221472][T11012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.221476][T11012] Call Trace: [ 156.221492][T11012] dump_stack+0x1d8/0x2f8 [ 156.221507][T11012] should_fail+0x555/0x770 [ 156.221522][T11012] __should_failslab+0x11a/0x160 [ 156.221533][T11012] ? security_inode_alloc+0x36/0x1e0 [ 156.221550][T11012] should_failslab+0x9/0x20 00:34:06 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x3, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 156.248652][T11012] kmem_cache_alloc+0x56/0x2e0 [ 156.258384][T11012] security_inode_alloc+0x36/0x1e0 [ 156.258394][T11012] inode_init_always+0x3b5/0x8d0 [ 156.258404][T11012] ? set_qf_name+0x3c0/0x3c0 [ 156.258413][T11012] new_inode_pseudo+0x7f/0x240 [ 156.258421][T11012] new_inode+0x28/0x1c0 [ 156.258432][T11012] ? trace_ext4_request_inode+0x28b/0x2d0 [ 156.258443][T11012] __ext4_new_inode+0x43d/0x5650 [ 156.273215][T11012] ? memset+0x31/0x40 [ 156.273233][T11012] ext4_symlink+0x536/0xed0 [ 156.273252][T11012] vfs_symlink+0x36f/0x4f0 [ 156.273262][T11012] do_symlinkat+0x187/0x3f0 [ 156.273274][T11012] __x64_sys_symlink+0x60/0x70 [ 156.273285][T11012] do_syscall_64+0xfe/0x140 [ 156.273297][T11012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 156.273303][T11012] RIP: 0033:0x459879 [ 156.273311][T11012] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 156.273316][T11012] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 156.273324][T11012] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 [ 156.273329][T11012] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 156.273333][T11012] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 156.273338][T11012] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 156.273343][T11012] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 [ 156.294459][T11016] CPU: 0 PID: 11016 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 156.319696][T11016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.319700][T11016] Call Trace: [ 156.319715][T11016] dump_stack+0x1d8/0x2f8 [ 156.319731][T11016] should_fail+0x555/0x770 [ 156.330089][T11016] should_fail_alloc_page+0x55/0x60 [ 156.330099][T11016] prepare_alloc_pages+0x283/0x470 [ 156.330110][T11016] __alloc_pages_nodemask+0xb2/0x5d0 [ 156.330122][T11016] ? __kasan_check_write+0x14/0x20 [ 156.330136][T11016] alloc_pages_vma+0x4e7/0x8b0 [ 156.353596][T11016] handle_mm_fault+0x30ca/0x6010 [ 156.353614][T11016] __get_user_pages+0x1002/0x1610 [ 156.353633][T11016] get_user_pages_remote+0xdb/0x4b0 [ 156.353645][T11016] copy_strings+0x3ef/0x750 [ 156.353660][T11016] __do_execve_file+0x1115/0x1c50 [ 156.353679][T11016] __x64_sys_execve+0x94/0xb0 [ 156.353691][T11016] do_syscall_64+0xfe/0x140 [ 156.353703][T11016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 156.353716][T11016] RIP: 0033:0x459879 [ 156.500441][T11016] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 156.520019][T11016] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 156.528413][T11016] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 156.536358][T11016] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 156.544301][T11016] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:34:07 executing program 2 (fault-call:0 fault-nth:11): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:07 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/d/v/null\x00'], 0x0) [ 156.552355][T11016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 156.566472][T11016] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:34:07 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x8, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 156.639799][T11033] FAULT_INJECTION: forcing a failure. [ 156.639799][T11033] name failslab, interval 1, probability 0, space 0, times 0 00:34:07 executing program 0 (fault-call:1 fault-nth:23): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:07 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x4, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:07 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0xa, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 156.735109][T11033] CPU: 1 PID: 11033 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 [ 156.743105][T11033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.743109][T11033] Call Trace: [ 156.743124][T11033] dump_stack+0x1d8/0x2f8 [ 156.743144][T11033] should_fail+0x555/0x770 [ 156.765170][T11033] __should_failslab+0x11a/0x160 [ 156.770123][T11033] ? security_inode_alloc+0x36/0x1e0 [ 156.775407][T11033] should_failslab+0x9/0x20 [ 156.779913][T11033] kmem_cache_alloc+0x56/0x2e0 [ 156.786225][T11033] security_inode_alloc+0x36/0x1e0 [ 156.791326][T11033] inode_init_always+0x3b5/0x8d0 [ 156.796238][T11033] ? set_qf_name+0x3c0/0x3c0 [ 156.800800][T11033] new_inode_pseudo+0x7f/0x240 [ 156.805534][T11033] new_inode+0x28/0x1c0 [ 156.809662][T11033] ? trace_ext4_request_inode+0x28b/0x2d0 [ 156.815362][T11033] __ext4_new_inode+0x43d/0x5650 [ 156.820293][T11033] ? memset+0x31/0x40 [ 156.824254][T11033] ext4_symlink+0x536/0xed0 [ 156.828746][T11033] vfs_symlink+0x36f/0x4f0 [ 156.833150][T11033] do_symlinkat+0x187/0x3f0 [ 156.837627][T11033] __x64_sys_symlink+0x60/0x70 [ 156.842366][T11033] do_syscall_64+0xfe/0x140 [ 156.846864][T11033] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 156.852735][T11033] RIP: 0033:0x459879 [ 156.856604][T11033] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 156.876190][T11033] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 156.884575][T11033] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 [ 156.892522][T11033] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 156.900489][T11033] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 156.908445][T11033] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 156.916390][T11033] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 00:34:07 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/d 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 157.145010][T11051] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 157.153398][T11051] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 157.161336][T11051] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 157.169297][T11051] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 157.181602][T11051] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 157.189552][T11051] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:34:07 executing program 0 (fault-call:1 fault-nth:24): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:07 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0xc, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:07 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x6, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 157.272837][T11073] FAULT_INJECTION: forcing a failure. [ 157.272837][T11073] name failslab, interval 1, probability 0, space 0, times 0 00:34:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(0x0, &(0x7f0000000240)='./file0\x00') 00:34:07 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0xd, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:07 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/d\\v/null\x00'], 0x0) [ 157.319866][T11079] FAULT_INJECTION: forcing a failure. [ 157.319866][T11079] name failslab, interval 1, probability 0, space 0, times 0 [ 157.353190][T11073] CPU: 1 PID: 11073 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 [ 157.361181][T11073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.371225][T11073] Call Trace: [ 157.374502][T11073] dump_stack+0x1d8/0x2f8 [ 157.378815][T11073] should_fail+0x555/0x770 [ 157.383302][T11073] __should_failslab+0x11a/0x160 [ 157.388221][T11073] ? kzalloc+0x1f/0x40 [ 157.392271][T11073] should_failslab+0x9/0x20 [ 157.396755][T11073] __kmalloc+0x7a/0x340 [ 157.400895][T11073] kzalloc+0x1f/0x40 [ 157.404771][T11073] smk_parse_smack+0x197/0x230 [ 157.409517][T11073] smk_import_entry+0x27/0x590 [ 157.414270][T11073] smack_d_instantiate+0x78f/0xd70 [ 157.419371][T11073] security_d_instantiate+0xa5/0x100 [ 157.424643][T11073] d_instantiate_new+0x65/0x130 [ 157.429479][T11073] ext4_symlink+0x90c/0xed0 [ 157.433965][T11073] vfs_symlink+0x36f/0x4f0 [ 157.438366][T11073] do_symlinkat+0x187/0x3f0 [ 157.442853][T11073] __x64_sys_symlink+0x60/0x70 [ 157.447598][T11073] do_syscall_64+0xfe/0x140 [ 157.452089][T11073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 157.457964][T11073] RIP: 0033:0x459879 [ 157.461869][T11073] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 157.481456][T11073] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 157.489847][T11073] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 [ 157.497798][T11073] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 157.505783][T11073] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 157.513733][T11073] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 157.521686][T11073] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 [ 157.529656][T11079] CPU: 0 PID: 11079 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 157.537713][T11079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.547753][T11079] Call Trace: [ 157.551042][T11079] dump_stack+0x1d8/0x2f8 [ 157.555370][T11079] should_fail+0x555/0x770 [ 157.559783][T11079] __should_failslab+0x11a/0x160 [ 157.564716][T11079] should_failslab+0x9/0x20 [ 157.569308][T11079] kmem_cache_alloc_trace+0x5d/0x2f0 [ 157.574582][T11079] ? tomoyo_find_next_domain+0xe9/0x1ca0 [ 157.580211][T11079] tomoyo_find_next_domain+0xe9/0x1ca0 [ 157.585665][T11079] ? lock_acquire+0x158/0x250 [ 157.590338][T11079] ? rcu_lock_acquire+0x9/0x40 [ 157.595097][T11079] tomoyo_bprm_check_security+0xe3/0x130 [ 157.595109][T11079] security_bprm_check+0x55/0xb0 [ 157.595124][T11079] search_binary_handler+0x6a/0x660 [ 157.595137][T11079] __do_execve_file+0x1497/0x1c50 00:34:08 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x7, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 157.605675][T11079] __x64_sys_execve+0x94/0xb0 [ 157.605688][T11079] do_syscall_64+0xfe/0x140 [ 157.605701][T11079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 157.605710][T11079] RIP: 0033:0x459879 [ 157.605719][T11079] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 157.605724][T11079] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 00:34:08 executing program 2 (fault-call:0 fault-nth:13): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 157.605733][T11079] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 157.605738][T11079] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 157.605746][T11079] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 157.633593][T11079] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 157.633599][T11079] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:34:08 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dyv/null\x00'], 0x0) 00:34:08 executing program 0 (fault-call:1 fault-nth:25): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(0x0, &(0x7f0000000240)='./file0\x00') [ 157.748943][T11098] FAULT_INJECTION: forcing a failure. [ 157.748943][T11098] name failslab, interval 1, probability 0, space 0, times 0 [ 157.791213][T11098] CPU: 0 PID: 11098 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 [ 157.799214][T11098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.809261][T11098] Call Trace: [ 157.812545][T11098] dump_stack+0x1d8/0x2f8 [ 157.816869][T11098] should_fail+0x555/0x770 [ 157.816883][T11098] __should_failslab+0x11a/0x160 [ 157.826215][T11098] should_failslab+0x9/0x20 [ 157.826226][T11098] kmem_cache_alloc_node+0x65/0x280 [ 157.826237][T11098] ? create_task_io_context+0x32/0x3e0 [ 157.826246][T11098] create_task_io_context+0x32/0x3e0 [ 157.826252][T11098] ? generic_make_request_checks+0x1401/0x1a00 [ 157.826266][T11098] generic_make_request_checks+0x1411/0x1a00 [ 157.852843][T11098] generic_make_request+0x33/0x980 [ 157.852859][T11098] submit_bio+0x254/0x540 [ 157.852869][T11098] ? guard_bio_eod+0x2a0/0x640 [ 157.852878][T11098] submit_bh_wbc+0x619/0x700 [ 157.852891][T11098] __sync_dirty_buffer+0x1a2/0x2e0 [ 157.852900][T11098] sync_dirty_buffer+0x1a/0x20 [ 157.852910][T11098] __ext4_handle_dirty_metadata+0x154/0x870 [ 157.852927][T11098] ext4_handle_dirty_dirblock+0x32c/0x690 [ 157.863978][T11098] add_dirent_to_buf+0x9d4/0xc50 [ 157.863991][T11098] ext4_add_entry+0x2466/0x3e00 [ 157.864004][T11098] ? ext4_mark_inode_dirty+0x1e1/0x700 [ 157.877662][T11098] ? __brelse+0x5a/0xa0 [ 157.877682][T11098] ? ext4_symlink+0x83a/0xed0 [ 157.877692][T11098] ext4_symlink+0x8b7/0xed0 [ 157.877710][T11098] vfs_symlink+0x36f/0x4f0 [ 157.899111][T11098] do_symlinkat+0x187/0x3f0 [ 157.899124][T11098] __x64_sys_symlink+0x60/0x70 [ 157.899138][T11098] do_syscall_64+0xfe/0x140 [ 157.946250][T11098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 157.952255][T11098] RIP: 0033:0x459879 [ 157.956127][T11098] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 157.975712][T11098] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 157.984100][T11098] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 00:34:08 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x8, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:08 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0xf, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:08 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/de%/null\x00'], 0x0) [ 157.992044][T11098] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 158.000005][T11098] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 158.007962][T11098] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 158.015993][T11098] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 [ 158.033915][T11114] FAULT_INJECTION: forcing a failure. 00:34:08 executing program 2 (fault-call:0 fault-nth:14): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 158.033915][T11114] name failslab, interval 1, probability 0, space 0, times 0 00:34:08 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0xa, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 158.132258][T11130] FAULT_INJECTION: forcing a failure. [ 158.132258][T11130] name failslab, interval 1, probability 0, space 0, times 0 [ 158.146329][T11114] CPU: 0 PID: 11114 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 158.154317][T11114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.164363][T11114] Call Trace: [ 158.167634][T11114] dump_stack+0x1d8/0x2f8 [ 158.171955][T11114] should_fail+0x555/0x770 [ 158.176357][T11114] __should_failslab+0x11a/0x160 [ 158.181288][T11114] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 158.187002][T11114] should_failslab+0x9/0x20 [ 158.191482][T11114] __kmalloc+0x7a/0x340 [ 158.195612][T11114] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 158.201302][T11114] tomoyo_realpath_from_path+0xdc/0x7c0 [ 158.206827][T11114] tomoyo_realpath_nofollow+0x65/0x90 [ 158.212174][T11114] tomoyo_find_next_domain+0x217/0x1ca0 [ 158.217690][T11114] ? lock_acquire+0x158/0x250 [ 158.222341][T11114] ? rcu_lock_acquire+0x9/0x40 [ 158.227087][T11114] tomoyo_bprm_check_security+0xe3/0x130 [ 158.232697][T11114] security_bprm_check+0x55/0xb0 [ 158.237616][T11114] search_binary_handler+0x6a/0x660 [ 158.242793][T11114] __do_execve_file+0x1497/0x1c50 [ 158.247795][T11114] __x64_sys_execve+0x94/0xb0 [ 158.252459][T11114] do_syscall_64+0xfe/0x140 [ 158.256950][T11114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 158.262830][T11114] RIP: 0033:0x459879 [ 158.266704][T11114] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 158.286284][T11114] RSP: 002b:00007fc888071c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 158.294678][T11114] RAX: ffffffffffffffda RBX: 00007fc888071c90 RCX: 0000000000459879 [ 158.302624][T11114] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 158.310569][T11114] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 158.318513][T11114] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880726d4 00:34:08 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/de//null\x00'], 0x0) 00:34:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', 0x0) [ 158.326458][T11114] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 [ 158.335352][T11130] CPU: 0 PID: 11130 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 [ 158.343332][T11130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.353377][T11130] Call Trace: [ 158.356667][T11130] dump_stack+0x1d8/0x2f8 [ 158.360994][T11130] should_fail+0x555/0x770 [ 158.365407][T11130] __should_failslab+0x11a/0x160 [ 158.370349][T11130] should_failslab+0x9/0x20 [ 158.374844][T11130] kmem_cache_alloc_node+0x65/0x280 [ 158.380033][T11130] ? create_task_io_context+0x32/0x3e0 [ 158.385487][T11130] create_task_io_context+0x32/0x3e0 [ 158.390749][T11130] ? generic_make_request_checks+0x1401/0x1a00 [ 158.396884][T11130] generic_make_request_checks+0x1411/0x1a00 [ 158.396898][T11130] generic_make_request+0x33/0x980 [ 158.396911][T11130] submit_bio+0x254/0x540 [ 158.396920][T11130] ? guard_bio_eod+0x2a0/0x640 [ 158.396930][T11130] submit_bh_wbc+0x619/0x700 [ 158.396943][T11130] __sync_dirty_buffer+0x1a2/0x2e0 [ 158.396954][T11130] sync_dirty_buffer+0x1a/0x20 00:34:08 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x10, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:09 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0xb, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:09 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x11, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 158.431472][T11130] __ext4_handle_dirty_metadata+0x154/0x870 [ 158.437369][T11130] ext4_handle_dirty_dirblock+0x32c/0x690 [ 158.443077][T11130] add_dirent_to_buf+0x9d4/0xc50 [ 158.443092][T11130] ext4_add_entry+0x2466/0x3e00 [ 158.443100][T11130] ? ext4_mark_inode_dirty+0x1e1/0x700 [ 158.443113][T11130] ? __brelse+0x5a/0xa0 [ 158.443130][T11130] ? ext4_symlink+0x83a/0xed0 [ 158.443139][T11130] ext4_symlink+0x8b7/0xed0 [ 158.443153][T11130] vfs_symlink+0x36f/0x4f0 [ 158.443163][T11130] do_symlinkat+0x187/0x3f0 [ 158.443174][T11130] __x64_sys_symlink+0x60/0x70 [ 158.462489][T11130] do_syscall_64+0xfe/0x140 [ 158.462503][T11130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 158.462512][T11130] RIP: 0033:0x459879 [ 158.462520][T11130] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 158.462525][T11130] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 00:34:09 executing program 0 (fault-call:1 fault-nth:26): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:09 executing program 2 (fault-call:0 fault-nth:15): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 158.462533][T11130] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 [ 158.462537][T11130] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 158.462542][T11130] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 158.462546][T11130] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 158.462551][T11130] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 [ 158.476902][T11114] ERROR: Out of memory at tomoyo_realpath_from_path. 00:34:09 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x12, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', 0x0) 00:34:09 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0xc, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 158.618936][T11155] FAULT_INJECTION: forcing a failure. [ 158.618936][T11155] name failslab, interval 1, probability 0, space 0, times 0 [ 158.652529][T11155] CPU: 1 PID: 11155 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 00:34:09 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/de\\/null\x00'], 0x0) [ 158.660538][T11155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.670773][T11155] Call Trace: [ 158.674090][T11155] dump_stack+0x1d8/0x2f8 [ 158.678430][T11155] should_fail+0x555/0x770 [ 158.682846][T11155] __should_failslab+0x11a/0x160 [ 158.687787][T11155] should_failslab+0x9/0x20 [ 158.692288][T11155] kmem_cache_alloc_trace+0x5d/0x2f0 [ 158.697555][T11155] ? smack_d_instantiate+0xabf/0xd70 [ 158.702846][T11155] smack_d_instantiate+0xabf/0xd70 [ 158.708052][T11155] security_d_instantiate+0xa5/0x100 [ 158.713321][T11155] d_instantiate_new+0x65/0x130 [ 158.718149][T11155] ext4_symlink+0x90c/0xed0 [ 158.722627][T11155] vfs_symlink+0x36f/0x4f0 [ 158.727037][T11155] do_symlinkat+0x187/0x3f0 [ 158.731566][T11155] __x64_sys_symlink+0x60/0x70 [ 158.736423][T11155] do_syscall_64+0xfe/0x140 [ 158.740909][T11155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 158.746789][T11155] RIP: 0033:0x459879 [ 158.750654][T11155] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 158.770405][T11155] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 158.778816][T11155] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 [ 158.786868][T11155] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 158.794815][T11155] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 158.802774][T11155] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 158.810813][T11155] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 00:34:09 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x13, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:09 executing program 2 (fault-call:0 fault-nth:16): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:09 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0xd, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 158.920677][T11173] FAULT_INJECTION: forcing a failure. [ 158.920677][T11173] name failslab, interval 1, probability 0, space 0, times 0 [ 158.952504][T11173] CPU: 1 PID: 11173 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 158.960500][T11173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 00:34:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file0\x00', 0x0) [ 158.970546][T11173] Call Trace: [ 158.973832][T11173] dump_stack+0x1d8/0x2f8 [ 158.978155][T11173] should_fail+0x555/0x770 [ 158.982567][T11173] __should_failslab+0x11a/0x160 [ 158.987509][T11173] ? getname_kernel+0x59/0x2f0 [ 158.992268][T11173] should_failslab+0x9/0x20 [ 158.996763][T11173] kmem_cache_alloc+0x56/0x2e0 [ 159.001523][T11173] getname_kernel+0x59/0x2f0 [ 159.006096][T11173] kern_path+0x1f/0x40 [ 159.010140][T11173] tomoyo_realpath_nofollow+0x33/0x90 [ 159.015491][T11173] ? memcpy+0x49/0x60 [ 159.019443][T11173] tomoyo_find_next_domain+0x217/0x1ca0 [ 159.024963][T11173] ? lock_acquire+0x158/0x250 [ 159.029631][T11173] ? rcu_lock_acquire+0x9/0x40 [ 159.034364][T11173] tomoyo_bprm_check_security+0xe3/0x130 [ 159.039968][T11173] security_bprm_check+0x55/0xb0 [ 159.044879][T11173] search_binary_handler+0x6a/0x660 [ 159.050048][T11173] __do_execve_file+0x1497/0x1c50 [ 159.055050][T11173] __x64_sys_execve+0x94/0xb0 [ 159.059696][T11173] do_syscall_64+0xfe/0x140 [ 159.064170][T11173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 159.070044][T11173] RIP: 0033:0x459879 [ 159.073925][T11173] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 159.093501][T11173] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 159.101890][T11173] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 159.110542][T11173] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 00:34:09 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev%null\x00'], 0x0) 00:34:09 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x14, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 159.118505][T11173] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 159.126454][T11173] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 159.134422][T11173] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 [ 159.145885][T11178] FAULT_INJECTION: forcing a failure. [ 159.145885][T11178] name failslab, interval 1, probability 0, space 0, times 0 [ 159.215196][T11178] CPU: 0 PID: 11178 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #91 [ 159.223201][T11178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.233335][T11178] Call Trace: [ 159.236632][T11178] dump_stack+0x1d8/0x2f8 [ 159.240959][T11178] should_fail+0x555/0x770 [ 159.245379][T11178] __should_failslab+0x11a/0x160 [ 159.250312][T11178] should_failslab+0x9/0x20 [ 159.254827][T11178] kmem_cache_alloc_trace+0x5d/0x2f0 [ 159.260108][T11178] ? smack_d_instantiate+0x962/0xd70 [ 159.265396][T11178] smack_d_instantiate+0x962/0xd70 [ 159.270510][T11178] security_d_instantiate+0xa5/0x100 [ 159.271597][T11198] FAULT_INJECTION: forcing a failure. [ 159.271597][T11198] name failslab, interval 1, probability 0, space 0, times 0 [ 159.275787][T11178] d_instantiate_new+0x65/0x130 [ 159.275798][T11178] ext4_symlink+0x90c/0xed0 [ 159.275811][T11178] vfs_symlink+0x36f/0x4f0 [ 159.275821][T11178] do_symlinkat+0x187/0x3f0 [ 159.275832][T11178] __x64_sys_symlink+0x60/0x70 [ 159.275842][T11178] do_syscall_64+0xfe/0x140 00:34:09 executing program 0 (fault-call:1 fault-nth:27): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:09 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x15, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:09 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0xf, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:09 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x10, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:09 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x16, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 159.275857][T11178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 159.321787][T11178] RIP: 0033:0x459879 [ 159.325678][T11178] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 159.345271][T11178] RSP: 002b:00007f4fff8e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 159.353670][T11178] RAX: ffffffffffffffda RBX: 00007f4fff8e0c90 RCX: 0000000000459879 [ 159.361621][T11178] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000200 [ 159.369575][T11178] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 159.369580][T11178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fff8e16d4 [ 159.369584][T11178] R13: 00000000004c8793 R14: 00000000004df550 R15: 0000000000000003 [ 159.372994][T11198] CPU: 0 PID: 11198 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 159.401485][T11198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.411534][T11198] Call Trace: 00:34:10 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x11, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:10 executing program 2 (fault-call:0 fault-nth:17): symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') [ 159.414818][T11198] dump_stack+0x1d8/0x2f8 [ 159.419157][T11198] should_fail+0x555/0x770 [ 159.423568][T11198] __should_failslab+0x11a/0x160 [ 159.428496][T11198] ? kzalloc+0x1f/0x40 [ 159.432548][T11198] should_failslab+0x9/0x20 [ 159.437044][T11198] __kmalloc+0x7a/0x340 [ 159.441196][T11198] kzalloc+0x1f/0x40 [ 159.445091][T11198] tomoyo_get_name+0x226/0x540 [ 159.449848][T11198] tomoyo_assign_domain+0x2d5/0x6e0 [ 159.449869][T11198] tomoyo_find_next_domain+0xd2b/0x1ca0 [ 159.460665][T11198] tomoyo_bprm_check_security+0xe3/0x130 [ 159.466287][T11198] security_bprm_check+0x55/0xb0 [ 159.466299][T11198] search_binary_handler+0x6a/0x660 [ 159.466312][T11198] __do_execve_file+0x1497/0x1c50 [ 159.466331][T11198] __x64_sys_execve+0x94/0xb0 [ 159.466347][T11198] do_syscall_64+0xfe/0x140 [ 159.490593][T11198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 159.490603][T11198] RIP: 0033:0x459879 [ 159.490611][T11198] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 159.490620][T11198] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 159.500355][T11198] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 159.500360][T11198] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 159.500366][T11198] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 159.500371][T11198] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 00:34:10 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev\\null\x00'], 0x0) 00:34:10 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x10') syz_genetlink_get_family_id$fou(0x0) epoll_create1(0x80000) capget(&(0x7f0000000200), 0x0) 00:34:10 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x12, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:10 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x17, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 159.500376][T11198] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 [ 159.512583][T11198] ERROR: Out of memory at tomoyo_memory_ok. [ 159.570133][T11198] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.0 /root/syzkaller-testdir179063437/syzkaller.NwhJoe/86/file0' not defined. 00:34:10 executing program 2: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:10 executing program 0 (fault-call:1 fault-nth:28): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:10 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x13, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) [ 159.776098][T11247] FAULT_INJECTION: forcing a failure. [ 159.776098][T11247] name failslab, interval 1, probability 0, space 0, times 0 [ 159.791963][T11247] CPU: 1 PID: 11247 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 159.799958][T11247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.810003][T11247] Call Trace: [ 159.813281][T11247] dump_stack+0x1d8/0x2f8 [ 159.817602][T11247] should_fail+0x555/0x770 [ 159.822023][T11247] __should_failslab+0x11a/0x160 [ 159.826947][T11247] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 159.832641][T11247] should_failslab+0x9/0x20 [ 159.837118][T11247] __kmalloc+0x7a/0x340 [ 159.841254][T11247] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 159.846942][T11247] tomoyo_realpath_from_path+0xdc/0x7c0 [ 159.852474][T11247] tomoyo_realpath_nofollow+0x65/0x90 [ 159.857820][T11247] tomoyo_find_next_domain+0x217/0x1ca0 [ 159.863341][T11247] ? lock_acquire+0x158/0x250 [ 159.868089][T11247] ? rcu_lock_acquire+0x9/0x40 [ 159.872825][T11247] tomoyo_bprm_check_security+0xe3/0x130 [ 159.878466][T11247] security_bprm_check+0x55/0xb0 [ 159.883379][T11247] search_binary_handler+0x6a/0x660 [ 159.888558][T11247] __do_execve_file+0x1497/0x1c50 [ 159.893557][T11247] __x64_sys_execve+0x94/0xb0 [ 159.898207][T11247] do_syscall_64+0xfe/0x140 [ 159.902686][T11247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 159.908553][T11247] RIP: 0033:0x459879 [ 159.912423][T11247] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 159.931992][T11247] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 159.940371][T11247] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 159.948576][T11247] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 159.956529][T11247] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 159.964469][T11247] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 00:34:10 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x18, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:10 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/%ull\x00'], 0x0) [ 159.972417][T11247] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 [ 159.985236][T11247] ERROR: Out of memory at tomoyo_realpath_from_path. 00:34:10 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000040)={0x2, [0x6, 0x80000000]}) 00:34:10 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x6) setsockopt$inet6_mreq(r0, 0x29, 0x8000000001b, &(0x7f0000000000)={@remote}, 0x14) 00:34:10 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x19, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:10 executing program 0 (fault-call:1 fault-nth:29): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:10 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x14, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:10 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev//ull\x00'], 0x0) 00:34:10 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x21, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:10 executing program 1: r0 = socket$unix(0x1, 0x801, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) unshare(0x400) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) accept4(r1, 0x0, 0x0, 0x0) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 00:34:10 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x15, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:10 executing program 2: symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x200000) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000040)) [ 160.196294][T11281] FAULT_INJECTION: forcing a failure. [ 160.196294][T11281] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 160.209513][T11281] CPU: 1 PID: 11281 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #91 [ 160.217478][T11281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.227510][T11281] Call Trace: [ 160.230776][T11281] dump_stack+0x1d8/0x2f8 [ 160.235092][T11281] should_fail+0x555/0x770 [ 160.239737][T11281] should_fail_alloc_page+0x55/0x60 [ 160.244958][T11281] prepare_alloc_pages+0x283/0x470 [ 160.250050][T11281] __alloc_pages_nodemask+0xb2/0x5d0 [ 160.255316][T11281] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 160.261098][T11281] kmem_getpages+0x56/0xa20 [ 160.265571][T11281] cache_grow_begin+0x7e/0x2c0 [ 160.270322][T11281] cache_alloc_refill+0x311/0x3f0 [ 160.275337][T11281] ? check_preemption_disabled+0xb7/0x2a0 [ 160.281030][T11281] __kmalloc+0x318/0x340 [ 160.285250][T11281] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 160.290941][T11281] tomoyo_realpath_from_path+0xdc/0x7c0 [ 160.296456][T11281] tomoyo_realpath_nofollow+0x65/0x90 [ 160.301800][T11281] tomoyo_find_next_domain+0x217/0x1ca0 [ 160.307317][T11281] ? lock_acquire+0x158/0x250 [ 160.311976][T11281] ? rcu_lock_acquire+0x9/0x40 [ 160.316736][T11281] tomoyo_bprm_check_security+0xe3/0x130 [ 160.322345][T11281] security_bprm_check+0x55/0xb0 [ 160.327358][T11281] search_binary_handler+0x6a/0x660 [ 160.332532][T11281] __do_execve_file+0x1497/0x1c50 [ 160.337536][T11281] __x64_sys_execve+0x94/0xb0 [ 160.342187][T11281] do_syscall_64+0xfe/0x140 [ 160.346672][T11281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 160.352536][T11281] RIP: 0033:0x459879 [ 160.356400][T11281] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 160.375973][T11281] RSP: 002b:00007fc888092c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 160.384387][T11281] RAX: ffffffffffffffda RBX: 00007fc888092c90 RCX: 0000000000459879 [ 160.392353][T11281] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000440 [ 160.400327][T11281] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 160.408270][T11281] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8880936d4 [ 160.416227][T11281] R13: 00000000004bff89 R14: 00000000004d1f30 R15: 0000000000000004 00:34:11 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x22, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:11 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x16, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:11 executing program 2: symlink(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)='./file0\x00') chroot(&(0x7f0000000100)='./file0\x00') r0 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x4, 0x1) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000280)={'raw\x00'}, &(0x7f0000000300)=0x54) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x0, "2eb307"}, 0x5, 0x1) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x1) 00:34:11 executing program 1: r0 = socket$unix(0x1, 0x801, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) unshare(0x400) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) accept4(r1, 0x0, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 00:34:11 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x23, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:11 executing program 0 (fault-call:1 fault-nth:30): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/null\x00'], 0x0) 00:34:11 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400000, 0x8) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x4, 0x0, 0x1, 0x9}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000080)={0x3, r1}) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 00:34:11 executing program 3: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='/dev/\\ull\x00'], 0x0) 00:34:11 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x17, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) 00:34:11 executing program 1: r0 = socket$unix(0x1, 0x801, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) unshare(0x400) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) accept4(r1, 0x0, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) [ 160.721105][T11331] FAULT_INJECTION: forcing a failure. [ 160.721105][T11331] name failslab, interval 1, probability 0, space 0, times 0 [ 160.761207][T11334] ------------[ cut here ]------------ [ 160.767128][T11334] WARNING: CPU: 0 PID: 11334 at ./include/net/sock.h:666 smc_unhash_sk+0x21b/0x240 [ 160.776414][T11334] Kernel panic - not syncing: panic_on_warn set ... [ 160.784233][T11334] CPU: 0 PID: 11334 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #91 [ 160.792199][T11334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.802241][T11334] Call Trace: [ 160.805528][T11334] dump_stack+0x1d8/0x2f8 [ 160.809861][T11334] panic+0x25c/0x799 [ 160.813759][T11334] ? __warn+0x126/0x230 [ 160.817904][T11334] __warn+0x22f/0x230 [ 160.821865][T11334] ? smc_unhash_sk+0x21b/0x240 [ 160.826609][T11334] report_bug+0x190/0x290 [ 160.830921][T11334] ? smc_unhash_sk+0x21b/0x240 [ 160.835668][T11334] do_error_trap+0xd7/0x440 [ 160.840158][T11334] do_invalid_op+0x36/0x40 [ 160.844553][T11334] ? smc_unhash_sk+0x21b/0x240 [ 160.849302][T11334] invalid_op+0x23/0x30 [ 160.853448][T11334] RIP: 0010:smc_unhash_sk+0x21b/0x240 [ 160.858806][T11334] Code: 48 89 df e8 17 b1 39 00 48 83 c4 20 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 13 e2 31 fa 48 c7 c7 12 c3 3a 88 31 c0 e8 e8 2c 1b fa <0f> 0b eb 85 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c 5b ff ff ff 4c [ 160.878400][T11334] RSP: 0018:ffff88805414fa10 EFLAGS: 00010246 [ 160.884457][T11334] RAX: 0000000000000024 RBX: 0000000000000001 RCX: 82ba4b37b44d3c00 [ 160.892506][T11334] RDX: ffffc900109aa000 RSI: 0000000000006561 RDI: 0000000000006562 [ 160.900470][T11334] RBP: ffff88805414fa58 R08: ffffffff815cf794 R09: ffffed1015d46088 [ 160.908417][T11334] R10: ffffed1015d46088 R11: 0000000000000000 R12: ffff888060ab2180 [ 160.916359][T11334] R13: dffffc0000000000 R14: ffff888060ab2200 R15: ffff888060ab21a8 [ 160.924313][T11334] ? vprintk_emit+0x2d4/0x3a0 [ 160.929053][T11334] __smc_release+0x1f8/0x3a0 [ 160.933615][T11334] smc_release+0x15b/0x2c0 [ 160.938006][T11334] sock_close+0xe1/0x260 [ 160.942218][T11334] ? sock_mmap+0xa0/0xa0 [ 160.946431][T11334] __fput+0x2e4/0x740 [ 160.950386][T11334] ____fput+0x15/0x20 [ 160.954339][T11334] task_work_run+0x17e/0x1b0 [ 160.958904][T11334] get_signal+0x1ca8/0x1d60 [ 160.963382][T11334] ? __kasan_check_read+0x11/0x20 [ 160.968379][T11334] ? preempt_schedule+0xf9/0x120 [ 160.973305][T11334] ? release_sock+0x179/0x1d0 [ 160.977954][T11334] ? ___preempt_schedule+0x16/0x20 [ 160.983037][T11334] ? check_preemption_disabled+0x47/0x2a0 [ 160.988755][T11334] ? kick_process+0xce/0x130 [ 160.993316][T11334] do_signal+0x37/0x640 [ 160.997961][T11334] ? fput_many+0x15a/0x1a0 [ 161.002354][T11334] ? prepare_exit_to_usermode+0x258/0x580 [ 161.008052][T11334] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 161.013659][T11334] prepare_exit_to_usermode+0x303/0x580 [ 161.019180][T11334] syscall_return_slowpath+0x113/0x4a0 [ 161.024611][T11334] do_syscall_64+0x126/0x140 [ 161.029176][T11334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 161.035037][T11334] RIP: 0033:0x459879 [ 161.038905][T11334] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 161.058480][T11334] RSP: 002b:00007f3569ba9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 161.066860][T11334] RAX: ffffffffffffff8d RBX: 0000000000000003 RCX: 0000000000459879 [ 161.074806][T11334] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 [ 161.082751][T11334] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 161.090693][T11334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3569baa6d4 [ 161.098635][T11334] R13: 00000000004bfdc4 R14: 00000000004d1c00 R15: 00000000ffffffff [ 161.107787][T11334] Kernel Offset: disabled [ 161.112151][T11334] Rebooting in 86400 seconds..