266.304406] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 266.309433] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 266.314634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.320177] ? timespec64_trunc+0xea/0x180 [ 266.324427] ? inode_init_owner+0x340/0x340 [ 266.328758] ? _raw_spin_unlock+0x22/0x30 [ 266.332925] ? current_time+0x10b/0x1b0 [ 266.336906] ? __lockdep_init_map+0x105/0x590 [ 266.341415] d_alloc_pseudo+0x1d/0x30 [ 266.345311] alloc_file_pseudo+0x158/0x3f0 [ 266.349553] ? alloc_file+0x4d0/0x4d0 [ 266.353446] ? check_same_owner+0x340/0x340 [ 266.357776] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 266.362800] ? __check_object_size+0xa3/0x5d7 [ 266.367303] ? kasan_check_write+0x14/0x20 [ 266.371659] __shmem_file_setup.part.45+0x110/0x2a0 [ 266.376687] shmem_file_setup+0x65/0x90 [ 266.380670] __x64_sys_memfd_create+0x2af/0x4f0 [ 266.385347] ? memfd_fcntl+0x1580/0x1580 [ 266.389412] ? ksys_mount+0xa8/0x140 [ 266.393314] do_syscall_64+0x1b9/0x820 [ 266.397668] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 266.403127] ? syscall_return_slowpath+0x5e0/0x5e0 [ 266.408063] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 266.413086] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 266.418107] ? recalc_sigpending_tsk+0x180/0x180 [ 266.422869] ? kasan_check_write+0x14/0x20 [ 266.427124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.431982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.437176] RIP: 0033:0x457099 [ 266.440393] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.459294] RSP: 002b:00007f458362fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 266.467009] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 0000000000457099 [ 266.474279] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c260a [ 266.481552] RBP: 00000000009300a0 R08: 0000000000100020 R09: 00000000fbad8001 [ 266.488842] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000000000003 [ 266.496116] R13: 00000000004d71d0 R14: 00000000004ca278 R15: 0000000000000002 [ 266.503411] CPU: 1 PID: 10060 Comm: syz-executor5 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 266.511914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.521272] Call Trace: [ 266.523878] dump_stack+0x1c9/0x2b4 [ 266.528053] ? dump_stack_print_info.cold.2+0x52/0x52 [ 266.533273] should_fail.cold.4+0xa/0x11 [ 266.537352] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.542464] ? mark_held_locks+0x160/0x160 [ 266.546724] ? __kernel_text_address+0xd/0x40 [ 266.551242] ? unwind_get_return_address+0x61/0xa0 [ 266.556220] ? find_held_lock+0x36/0x1c0 [ 266.560326] ? check_same_owner+0x340/0x340 [ 266.564663] ? rcu_note_context_switch+0x680/0x680 [ 266.569608] __should_failslab+0x124/0x180 [ 266.573858] should_failslab+0x9/0x14 [ 266.577668] kmem_cache_alloc+0x29c/0x710 [ 266.581834] ? mpol_shared_policy_init+0x235/0x670 [ 266.586774] ? current_time+0x72/0x1b0 [ 266.590675] __d_alloc+0xc8/0xd50 [ 266.594147] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 266.599176] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 266.604389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.609937] ? timespec64_trunc+0xea/0x180 [ 266.614183] ? inode_init_owner+0x340/0x340 [ 266.618526] ? _raw_spin_unlock+0x22/0x30 [ 266.622686] ? current_time+0x10b/0x1b0 [ 266.626678] ? __lockdep_init_map+0x105/0x590 [ 266.631213] d_alloc_pseudo+0x1d/0x30 [ 266.635022] alloc_file_pseudo+0x158/0x3f0 [ 266.639263] ? alloc_file+0x4d0/0x4d0 [ 266.643070] ? check_same_owner+0x340/0x340 [ 266.647402] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 266.652428] ? __check_object_size+0xa3/0x5d7 [ 266.656929] ? kasan_check_write+0x14/0x20 [ 266.661170] __shmem_file_setup.part.45+0x110/0x2a0 [ 266.666209] shmem_file_setup+0x65/0x90 [ 266.670202] __x64_sys_memfd_create+0x2af/0x4f0 [ 266.674875] ? memfd_fcntl+0x1580/0x1580 [ 266.678940] ? ksys_ioctl+0x81/0xd0 [ 266.682582] do_syscall_64+0x1b9/0x820 [ 266.686475] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 266.691843] ? syscall_return_slowpath+0x5e0/0x5e0 [ 266.696782] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 266.701806] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 266.706823] ? recalc_sigpending_tsk+0x180/0x180 [ 266.711582] ? kasan_check_write+0x14/0x20 [ 266.715823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.720678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.725877] RIP: 0033:0x457099 [ 266.729106] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.748009] RSP: 002b:00007f556fb51a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 266.755726] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 0000000000457099 [ 266.762994] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c260a [ 266.770262] RBP: 0000000000930140 R08: 0000000000100020 R09: 00000000fbad8001 [ 266.777530] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000000000003 [ 266.784797] R13: 00000000004d71d0 R14: 00000000004ca278 R15: 0000000000000002 19:23:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) read(r1, &(0x7f0000000180)=""/251, 0xfb) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) getrusage(0x0, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='hybla\x00', 0x6) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) flistxattr(r0, &(0x7f00000004c0)=""/88, 0x58) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0xccb64, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 19:23:43 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:23:43 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x2c}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x401, 0x801) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f00000000c0)={0x1, 0x7, 0x57b, 0x5, 0x7, 0x4}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:23:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket$inet6(0xa, 0x2, 0x200000088) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:43 executing program 2 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 266.888427] FAULT_INJECTION: forcing a failure. [ 266.888427] name failslab, interval 1, probability 0, space 0, times 0 [ 266.899782] CPU: 1 PID: 10073 Comm: syz-executor2 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 266.908284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.917644] Call Trace: [ 266.920247] dump_stack+0x1c9/0x2b4 [ 266.923895] ? dump_stack_print_info.cold.2+0x52/0x52 [ 266.929113] should_fail.cold.4+0xa/0x11 [ 266.933208] ? fault_create_debugfs_attr+0x1f0/0x1f0 19:23:43 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 266.938329] ? mark_held_locks+0x160/0x160 [ 266.942580] ? __kernel_text_address+0xd/0x40 [ 266.947092] ? unwind_get_return_address+0x61/0xa0 [ 266.952057] ? find_held_lock+0x36/0x1c0 [ 266.956160] ? check_same_owner+0x340/0x340 [ 266.960520] ? rcu_note_context_switch+0x680/0x680 [ 266.965476] __should_failslab+0x124/0x180 [ 266.969741] should_failslab+0x9/0x14 [ 266.973560] kmem_cache_alloc+0x29c/0x710 [ 266.977742] ? mpol_shared_policy_init+0x235/0x670 [ 266.982693] ? current_time+0x72/0x1b0 [ 266.986615] __d_alloc+0xc8/0xd50 [ 266.990095] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 266.995132] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 267.000348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.005901] ? timespec64_trunc+0xea/0x180 [ 267.010149] ? inode_init_owner+0x340/0x340 [ 267.014492] ? _raw_spin_unlock+0x22/0x30 [ 267.018664] ? current_time+0x10b/0x1b0 [ 267.022676] ? __lockdep_init_map+0x105/0x590 [ 267.027228] d_alloc_pseudo+0x1d/0x30 [ 267.031048] alloc_file_pseudo+0x158/0x3f0 [ 267.035303] ? alloc_file+0x4d0/0x4d0 [ 267.039123] ? check_same_owner+0x340/0x340 [ 267.043466] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 267.048497] ? __check_object_size+0xa3/0x5d7 [ 267.053023] ? kasan_check_write+0x14/0x20 [ 267.057282] __shmem_file_setup.part.45+0x110/0x2a0 [ 267.062321] shmem_file_setup+0x65/0x90 [ 267.066319] __x64_sys_memfd_create+0x2af/0x4f0 [ 267.071013] ? memfd_fcntl+0x1580/0x1580 [ 267.075092] ? ksys_mount+0xa8/0x140 [ 267.078836] do_syscall_64+0x1b9/0x820 [ 267.082749] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.088125] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.093070] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 267.098101] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 267.103128] ? recalc_sigpending_tsk+0x180/0x180 [ 267.107896] ? kasan_check_write+0x14/0x20 [ 267.112152] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.117014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.122224] RIP: 0033:0x457099 19:23:43 executing program 5 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 267.125428] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.144338] RSP: 002b:00007f7d907a7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 267.152060] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 0000000000457099 [ 267.159340] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c260a [ 267.166617] RBP: 00000000009300a0 R08: 0000000000100020 R09: 00000000fbad8001 [ 267.173980] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000000000003 [ 267.181254] R13: 00000000004d71d0 R14: 00000000004ca278 R15: 0000000000000002 19:23:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x309002, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)={0x5, 0x7f, 0x4, 0x20, 0x80000001, 0x1, 0x0, 0x5, 0x800, 0xffff, 0x9, 0xf5}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x4, 0x0, 0x2b1, 0x3, 0x6, 0x101, 0x4, 0x100000001, 0x1f8, 0xf0, 0xbd17}) writev(r0, &(0x7f0000000300)=[{&(0x7f00000005c0)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13a9e058a0f9c773d668fe6afd6ae2470a417760376ff88272052872baf485c50023934860653afae3d24e721316", 0xc0}], 0x1) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3}) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r2, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x16, 0x4, 0x8001, "682c3233fa8ff4d339fe9dd377fbf10b", 'H'}, 0x16, 0x1) r4 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x1, 0x101042) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000280)={0x7, 0x10000, 0x0, 0x1}) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 19:23:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 267.284687] FAULT_INJECTION: forcing a failure. [ 267.284687] name failslab, interval 1, probability 0, space 0, times 0 [ 267.296487] CPU: 0 PID: 10089 Comm: syz-executor5 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 267.305000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.314361] Call Trace: [ 267.316971] dump_stack+0x1c9/0x2b4 [ 267.320620] ? dump_stack_print_info.cold.2+0x52/0x52 [ 267.325838] should_fail.cold.4+0xa/0x11 [ 267.329926] ? fault_create_debugfs_attr+0x1f0/0x1f0 19:23:43 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8916, &(0x7f0000000400)="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") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000080)=0x4) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:23:43 executing program 6 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 267.335046] ? save_stack+0x43/0xd0 [ 267.338694] ? kasan_kmalloc+0xc4/0xe0 [ 267.342598] ? kasan_slab_alloc+0x12/0x20 [ 267.346761] ? kmem_cache_alloc+0x12e/0x710 [ 267.351092] ? __d_alloc+0xc8/0xd50 [ 267.354743] ? lock_downgrade+0x8f0/0x8f0 [ 267.358906] ? graph_lock+0x170/0x170 [ 267.362731] ? find_held_lock+0x36/0x1c0 [ 267.366835] ? check_same_owner+0x340/0x340 [ 267.371179] ? lock_downgrade+0x8f0/0x8f0 [ 267.375378] ? rcu_note_context_switch+0x680/0x680 [ 267.380332] __should_failslab+0x124/0x180 19:23:44 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 267.384593] should_failslab+0x9/0x14 [ 267.388441] kmem_cache_alloc+0x29c/0x710 [ 267.392603] ? kasan_check_write+0x14/0x20 [ 267.396869] __alloc_file+0xac/0x400 [ 267.400604] ? file_free_rcu+0x90/0x90 [ 267.404509] ? lock_downgrade+0x8f0/0x8f0 [ 267.408679] ? kasan_check_read+0x11/0x20 [ 267.412846] ? do_raw_spin_unlock+0xa7/0x2f0 [ 267.417274] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 267.421880] alloc_empty_file+0x72/0x170 [ 267.425987] alloc_file+0x5e/0x4d0 [ 267.429553] alloc_file_pseudo+0x261/0x3f0 [ 267.433808] ? alloc_file+0x4d0/0x4d0 [ 267.437638] ? check_same_owner+0x340/0x340 [ 267.441984] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 267.447018] ? __check_object_size+0xa3/0x5d7 [ 267.451534] ? kasan_check_write+0x14/0x20 [ 267.455797] __shmem_file_setup.part.45+0x110/0x2a0 [ 267.460835] shmem_file_setup+0x65/0x90 [ 267.464828] __x64_sys_memfd_create+0x2af/0x4f0 [ 267.469515] ? memfd_fcntl+0x1580/0x1580 [ 267.473591] ? ksys_mount+0xa8/0x140 [ 267.477339] do_syscall_64+0x1b9/0x820 19:23:44 executing program 2 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:44 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 267.481244] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.486626] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.491571] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 267.496600] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 267.501629] ? recalc_sigpending_tsk+0x180/0x180 [ 267.506396] ? kasan_check_write+0x14/0x20 [ 267.510651] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.515514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.520708] RIP: 0033:0x457099 19:23:44 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ppoll(&(0x7f0000000040)=[{}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) [ 267.523909] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.542818] RSP: 002b:00007f556fb72a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 267.550539] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 0000000000457099 [ 267.557817] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c260a [ 267.565091] RBP: 00000000009300a0 R08: 0000000000100020 R09: 00000000fbad8001 [ 267.572370] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000000000003 [ 267.579670] R13: 00000000004d71d0 R14: 00000000004ca278 R15: 0000000000000003 [ 267.680721] FAULT_INJECTION: forcing a failure. [ 267.680721] name failslab, interval 1, probability 0, space 0, times 0 [ 267.692066] CPU: 0 PID: 10114 Comm: syz-executor2 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 267.700565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.709921] Call Trace: [ 267.712526] dump_stack+0x1c9/0x2b4 [ 267.716176] ? dump_stack_print_info.cold.2+0x52/0x52 [ 267.721410] should_fail.cold.4+0xa/0x11 [ 267.725490] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.730605] ? save_stack+0x43/0xd0 [ 267.734251] ? kasan_kmalloc+0xc4/0xe0 [ 267.738163] ? kasan_slab_alloc+0x12/0x20 [ 267.742339] ? kmem_cache_alloc+0x12e/0x710 [ 267.746668] ? __d_alloc+0xc8/0xd50 [ 267.750319] ? lock_downgrade+0x8f0/0x8f0 [ 267.754482] ? graph_lock+0x170/0x170 [ 267.758299] ? find_held_lock+0x36/0x1c0 [ 267.762394] ? check_same_owner+0x340/0x340 [ 267.766726] ? lock_downgrade+0x8f0/0x8f0 [ 267.770904] ? rcu_note_context_switch+0x680/0x680 [ 267.775858] __should_failslab+0x124/0x180 19:23:44 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) getsockopt$inet_tcp_buf(r0, 0x6, 0x16, &(0x7f00000001c0)=""/167, &(0x7f0000000000)=0xa7) 19:23:44 executing program 5 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 267.780110] should_failslab+0x9/0x14 [ 267.783931] kmem_cache_alloc+0x29c/0x710 [ 267.788103] ? kasan_check_write+0x14/0x20 [ 267.792360] __alloc_file+0xac/0x400 [ 267.796181] ? file_free_rcu+0x90/0x90 [ 267.800107] ? lock_downgrade+0x8f0/0x8f0 [ 267.804279] ? kasan_check_read+0x11/0x20 [ 267.808450] ? do_raw_spin_unlock+0xa7/0x2f0 [ 267.812884] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 267.817575] alloc_empty_file+0x72/0x170 [ 267.821656] alloc_file+0x5e/0x4d0 [ 267.825234] alloc_file_pseudo+0x261/0x3f0 [ 267.829489] ? alloc_file+0x4d0/0x4d0 [ 267.833312] ? check_same_owner+0x340/0x340 [ 267.837654] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 267.842688] ? __check_object_size+0xa3/0x5d7 [ 267.847224] ? kasan_check_write+0x14/0x20 [ 267.851486] __shmem_file_setup.part.45+0x110/0x2a0 [ 267.856532] shmem_file_setup+0x65/0x90 [ 267.860533] __x64_sys_memfd_create+0x2af/0x4f0 [ 267.865308] ? memfd_fcntl+0x1580/0x1580 [ 267.869402] do_syscall_64+0x1b9/0x820 [ 267.873303] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.878687] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.883626] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 267.888654] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 267.893676] ? recalc_sigpending_tsk+0x180/0x180 [ 267.898440] ? kasan_check_write+0x14/0x20 [ 267.902689] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.907552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.912746] RIP: 0033:0x457099 [ 267.915953] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.934946] RSP: 002b:00007f7d907a7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 267.942662] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 0000000000457099 [ 267.949933] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c260a [ 267.957186] RBP: 00000000009300a0 R08: 0000000000100020 R09: 00000000fbad8001 [ 267.964470] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000000000003 [ 267.971740] R13: 00000000004d71d0 R14: 00000000004ca278 R15: 0000000000000003 [ 267.986671] FAULT_INJECTION: forcing a failure. [ 267.986671] name failslab, interval 1, probability 0, space 0, times 0 [ 267.997963] CPU: 1 PID: 10120 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 268.006468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.015836] Call Trace: [ 268.018446] dump_stack+0x1c9/0x2b4 [ 268.022100] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.027324] should_fail.cold.4+0xa/0x11 [ 268.031414] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.036532] ? save_stack+0x43/0xd0 [ 268.040171] ? kasan_kmalloc+0xc4/0xe0 [ 268.044087] ? kasan_slab_alloc+0x12/0x20 [ 268.048254] ? kmem_cache_alloc+0x12e/0x710 [ 268.052594] ? __d_alloc+0xc8/0xd50 [ 268.056252] ? lock_downgrade+0x8f0/0x8f0 [ 268.060417] ? graph_lock+0x170/0x170 [ 268.064232] ? find_held_lock+0x36/0x1c0 [ 268.068300] ? check_same_owner+0x340/0x340 [ 268.072616] ? lock_downgrade+0x8f0/0x8f0 [ 268.076775] ? rcu_note_context_switch+0x680/0x680 [ 268.081725] __should_failslab+0x124/0x180 [ 268.085973] should_failslab+0x9/0x14 [ 268.089765] kmem_cache_alloc+0x29c/0x710 [ 268.093903] ? kasan_check_write+0x14/0x20 [ 268.098227] __alloc_file+0xac/0x400 [ 268.101941] ? file_free_rcu+0x90/0x90 [ 268.105834] ? lock_downgrade+0x8f0/0x8f0 [ 268.109982] ? kasan_check_read+0x11/0x20 [ 268.114119] ? do_raw_spin_unlock+0xa7/0x2f0 [ 268.118518] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 268.123089] alloc_empty_file+0x72/0x170 [ 268.127140] alloc_file+0x5e/0x4d0 [ 268.130672] alloc_file_pseudo+0x261/0x3f0 [ 268.134900] ? alloc_file+0x4d0/0x4d0 [ 268.138694] ? check_same_owner+0x340/0x340 [ 268.143025] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 268.148063] ? __check_object_size+0xa3/0x5d7 [ 268.152579] ? kasan_check_write+0x14/0x20 [ 268.156823] __shmem_file_setup.part.45+0x110/0x2a0 [ 268.161849] shmem_file_setup+0x65/0x90 [ 268.165824] __x64_sys_memfd_create+0x2af/0x4f0 [ 268.170499] ? memfd_fcntl+0x1580/0x1580 [ 268.174563] ? ksys_ioctl+0x81/0xd0 [ 268.178183] do_syscall_64+0x1b9/0x820 [ 268.182067] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 268.187429] ? syscall_return_slowpath+0x5e0/0x5e0 [ 268.192381] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 268.197386] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 268.202402] ? recalc_sigpending_tsk+0x180/0x180 [ 268.207143] ? kasan_check_write+0x14/0x20 [ 268.211367] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.216208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.221386] RIP: 0033:0x457099 19:23:44 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x400, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1, &(0x7f000000b000), 0x4, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000180), 0x1, 0x2) io_setup(0x800, &(0x7f00000000c0)) fcntl$getown(r0, 0x9) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 19:23:44 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:44 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:23:44 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:23:44 executing program 2 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 268.224576] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.243480] RSP: 002b:00007f458362fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 268.251175] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 0000000000457099 [ 268.258456] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c260a [ 268.265714] RBP: 00000000009300a0 R08: 0000000000100020 R09: 00000000fbad8001 [ 268.272968] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000000000003 [ 268.280229] R13: 00000000004d71d0 R14: 00000000004ca278 R15: 0000000000000003 [ 268.363980] FAULT_INJECTION: forcing a failure. [ 268.363980] name failslab, interval 1, probability 0, space 0, times 0 [ 268.375353] CPU: 0 PID: 10142 Comm: syz-executor5 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 268.383858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.393233] Call Trace: [ 268.396348] dump_stack+0x1c9/0x2b4 [ 268.400001] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.405240] ? lock_downgrade+0x8f0/0x8f0 [ 268.405273] should_fail.cold.4+0xa/0x11 [ 268.405301] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.405328] ? is_bpf_text_address+0xd7/0x170 [ 268.405355] ? kernel_text_address+0x79/0xf0 [ 268.427538] ? __kernel_text_address+0xd/0x40 [ 268.432054] ? unwind_get_return_address+0x61/0xa0 [ 268.436997] ? __save_stack_trace+0x8d/0xf0 [ 268.441335] ? find_held_lock+0x36/0x1c0 [ 268.445425] ? check_same_owner+0x340/0x340 [ 268.449766] ? rcu_note_context_switch+0x680/0x680 [ 268.454708] ? lock_downgrade+0x8f0/0x8f0 [ 268.458968] __should_failslab+0x124/0x180 19:23:45 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 268.463233] should_failslab+0x9/0x14 [ 268.467047] kmem_cache_alloc_trace+0x2b5/0x730 [ 268.471748] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 268.476510] apparmor_file_alloc_security+0x162/0xa90 [ 268.481717] ? trace_hardirqs_on+0xbd/0x2c0 [ 268.486043] ? rcu_pm_notify+0xc0/0xc0 [ 268.489934] ? apparmor_socket_getpeersec_stream+0xab0/0xab0 [ 268.495749] ? rcu_read_lock_sched_held+0x108/0x120 [ 268.500803] ? kmem_cache_alloc+0x30b/0x710 [ 268.505134] ? kasan_check_write+0x14/0x20 [ 268.509466] security_file_alloc+0x4c/0xa0 [ 268.513717] __alloc_file+0xfc/0x400 [ 268.517440] ? file_free_rcu+0x90/0x90 [ 268.521602] ? lock_downgrade+0x8f0/0x8f0 [ 268.526000] ? kasan_check_read+0x11/0x20 [ 268.530156] ? do_raw_spin_unlock+0xa7/0x2f0 [ 268.534588] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 268.539187] alloc_empty_file+0x72/0x170 [ 268.543277] alloc_file+0x5e/0x4d0 [ 268.546829] alloc_file_pseudo+0x261/0x3f0 [ 268.551076] ? alloc_file+0x4d0/0x4d0 [ 268.554897] ? check_same_owner+0x340/0x340 [ 268.559250] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 268.564277] ? __check_object_size+0xa3/0x5d7 [ 268.568786] ? kasan_check_write+0x14/0x20 [ 268.573037] __shmem_file_setup.part.45+0x110/0x2a0 [ 268.578064] shmem_file_setup+0x65/0x90 [ 268.582054] __x64_sys_memfd_create+0x2af/0x4f0 [ 268.583152] FAULT_INJECTION: forcing a failure. [ 268.583152] name failslab, interval 1, probability 0, space 0, times 0 [ 268.586732] ? memfd_fcntl+0x1580/0x1580 [ 268.586747] ? ksys_mount+0xa8/0x140 [ 268.586772] do_syscall_64+0x1b9/0x820 [ 268.586802] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 268.614954] ? syscall_return_slowpath+0x5e0/0x5e0 [ 268.619893] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 268.624924] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 268.629940] ? recalc_sigpending_tsk+0x180/0x180 [ 268.634702] ? kasan_check_write+0x14/0x20 [ 268.638955] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.643807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.649000] RIP: 0033:0x457099 [ 268.652211] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.671213] RSP: 002b:00007f556fb72a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 268.678928] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 0000000000457099 [ 268.686211] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c260a [ 268.693483] RBP: 00000000009300a0 R08: 0000000000100020 R09: 00000000fbad8001 [ 268.700750] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000000000003 [ 268.708038] R13: 00000000004d71d0 R14: 00000000004ca278 R15: 0000000000000004 [ 268.715333] CPU: 1 PID: 10154 Comm: syz-executor2 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 268.723833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.733191] Call Trace: [ 268.735808] dump_stack+0x1c9/0x2b4 [ 268.739462] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.744679] should_fail.cold.4+0xa/0x11 [ 268.748766] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.753875] ? save_stack+0x43/0xd0 [ 268.757526] ? kasan_kmalloc+0xc4/0xe0 [ 268.761400] ? kasan_slab_alloc+0x12/0x20 [ 268.765532] ? kmem_cache_alloc+0x12e/0x710 [ 268.769850] ? __d_alloc+0xc8/0xd50 [ 268.773550] ? lock_downgrade+0x8f0/0x8f0 [ 268.777698] ? graph_lock+0x170/0x170 [ 268.781506] ? find_held_lock+0x36/0x1c0 [ 268.785589] ? check_same_owner+0x340/0x340 [ 268.789921] ? lock_downgrade+0x8f0/0x8f0 [ 268.794073] ? rcu_note_context_switch+0x680/0x680 [ 268.799012] __should_failslab+0x124/0x180 [ 268.803249] should_failslab+0x9/0x14 [ 268.807049] kmem_cache_alloc+0x29c/0x710 [ 268.811207] ? kasan_check_write+0x14/0x20 [ 268.815455] __alloc_file+0xac/0x400 [ 268.819174] ? file_free_rcu+0x90/0x90 [ 268.823075] ? lock_downgrade+0x8f0/0x8f0 [ 268.827241] ? kasan_check_read+0x11/0x20 [ 268.831389] ? do_raw_spin_unlock+0xa7/0x2f0 [ 268.835798] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 268.840384] alloc_empty_file+0x72/0x170 [ 268.844447] alloc_file+0x5e/0x4d0 [ 268.847997] alloc_file_pseudo+0x261/0x3f0 [ 268.852238] ? alloc_file+0x4d0/0x4d0 [ 268.856053] ? check_same_owner+0x340/0x340 [ 268.860381] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 268.865402] ? __check_object_size+0xa3/0x5d7 [ 268.869903] ? kasan_check_write+0x14/0x20 [ 268.874147] __shmem_file_setup.part.45+0x110/0x2a0 [ 268.879167] shmem_file_setup+0x65/0x90 [ 268.883153] __x64_sys_memfd_create+0x2af/0x4f0 [ 268.887824] ? memfd_fcntl+0x1580/0x1580 [ 268.891884] ? ksys_mount+0xa8/0x140 [ 268.895608] do_syscall_64+0x1b9/0x820 [ 268.899507] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 268.904875] ? syscall_return_slowpath+0x5e0/0x5e0 [ 268.909812] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.914668] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 268.919689] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 268.924720] ? prepare_exit_to_usermode+0x291/0x3b0 [ 268.929750] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.934603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.939791] RIP: 0033:0x457099 [ 268.943008] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:23:45 executing program 5 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:45 executing program 6 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 268.961905] RSP: 002b:00007f7d90786a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 268.969614] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 0000000000457099 [ 268.976880] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c260a [ 268.984146] RBP: 0000000000930140 R08: 0000000000100020 R09: 00000000fbad8001 [ 268.991412] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000000000003 [ 268.998676] R13: 00000000004d71d0 R14: 00000000004ca278 R15: 0000000000000004 19:23:45 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x20000}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'vcan0\x00', {0x2, 0x4e24, @multicast2}}) [ 269.064029] FAULT_INJECTION: forcing a failure. [ 269.064029] name failslab, interval 1, probability 0, space 0, times 0 [ 269.075381] CPU: 0 PID: 10164 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 269.083884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.093243] Call Trace: [ 269.095843] dump_stack+0x1c9/0x2b4 [ 269.099494] ? dump_stack_print_info.cold.2+0x52/0x52 [ 269.104700] ? lock_downgrade+0x8f0/0x8f0 [ 269.108879] should_fail.cold.4+0xa/0x11 [ 269.112965] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.118096] ? is_bpf_text_address+0xd7/0x170 [ 269.122604] ? kernel_text_address+0x79/0xf0 [ 269.127028] ? __kernel_text_address+0xd/0x40 [ 269.131540] ? unwind_get_return_address+0x61/0xa0 [ 269.136487] ? __save_stack_trace+0x8d/0xf0 [ 269.140824] ? find_held_lock+0x36/0x1c0 [ 269.144925] ? check_same_owner+0x340/0x340 [ 269.149267] ? rcu_note_context_switch+0x680/0x680 [ 269.154248] ? lock_downgrade+0x8f0/0x8f0 [ 269.158438] __should_failslab+0x124/0x180 [ 269.162694] should_failslab+0x9/0x14 [ 269.166513] kmem_cache_alloc_trace+0x2b5/0x730 [ 269.171223] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 269.175924] apparmor_file_alloc_security+0x162/0xa90 [ 269.181127] ? trace_hardirqs_on+0xbd/0x2c0 [ 269.185567] ? rcu_pm_notify+0xc0/0xc0 [ 269.189473] ? apparmor_socket_getpeersec_stream+0xab0/0xab0 [ 269.195294] ? rcu_read_lock_sched_held+0x108/0x120 [ 269.200325] ? kmem_cache_alloc+0x30b/0x710 [ 269.204665] ? kasan_check_write+0x14/0x20 [ 269.208928] security_file_alloc+0x4c/0xa0 19:23:45 executing program 7: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:45 executing program 2 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 269.213181] __alloc_file+0xfc/0x400 [ 269.216932] ? file_free_rcu+0x90/0x90 [ 269.220842] ? lock_downgrade+0x8f0/0x8f0 [ 269.225019] ? kasan_check_read+0x11/0x20 [ 269.229185] ? do_raw_spin_unlock+0xa7/0x2f0 [ 269.233631] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 269.238268] alloc_empty_file+0x72/0x170 [ 269.242345] alloc_file+0x5e/0x4d0 [ 269.245905] alloc_file_pseudo+0x261/0x3f0 [ 269.250160] ? alloc_file+0x4d0/0x4d0 [ 269.253995] ? check_same_owner+0x340/0x340 [ 269.258330] ? __sanitizer_cov_trace_cmp8+0x18/0x20 19:23:45 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 269.263357] ? __check_object_size+0xa3/0x5d7 [ 269.267870] ? kasan_check_write+0x14/0x20 [ 269.272120] __shmem_file_setup.part.45+0x110/0x2a0 [ 269.277158] shmem_file_setup+0x65/0x90 [ 269.281162] __x64_sys_memfd_create+0x2af/0x4f0 [ 269.285863] ? memfd_fcntl+0x1580/0x1580 [ 269.289934] ? ksys_mount+0xa8/0x140 [ 269.293667] do_syscall_64+0x1b9/0x820 [ 269.297578] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 269.302974] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.307917] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 269.312951] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 269.318014] ? recalc_sigpending_tsk+0x180/0x180 [ 269.322787] ? kasan_check_write+0x14/0x20 [ 269.327038] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.331985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.337181] RIP: 0033:0x457099 [ 269.340402] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.359310] RSP: 002b:00007f458362fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 269.367031] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 0000000000457099 [ 269.374306] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c260a [ 269.375219] FAULT_INJECTION: forcing a failure. [ 269.375219] name failslab, interval 1, probability 0, space 0, times 0 [ 269.381583] RBP: 00000000009300a0 R08: 0000000000100020 R09: 00000000fbad8001 [ 269.381593] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000000000003 [ 269.381602] R13: 00000000004d71d0 R14: 00000000004ca278 R15: 0000000000000004 [ 269.405725] FAULT_INJECTION: forcing a failure. [ 269.405725] name failslab, interval 1, probability 0, space 0, times 0 [ 269.407591] CPU: 1 PID: 10180 Comm: syz-executor2 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 269.434501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.443849] Call Trace: [ 269.446442] dump_stack+0x1c9/0x2b4 [ 269.450075] ? dump_stack_print_info.cold.2+0x52/0x52 [ 269.455269] ? lockdep_hardirqs_on+0x421/0x5c0 [ 269.459889] should_fail.cold.4+0xa/0x11 [ 269.463959] ? compat_start_thread+0x80/0x80 [ 269.468379] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.473493] ? _raw_spin_unlock_irq+0x27/0x70 [ 269.477996] ? finish_task_switch+0x18a/0x870 [ 269.482498] ? __switch_to_asm+0x34/0x70 [ 269.486568] ? __switch_to_asm+0x34/0x70 [ 269.490632] ? __switch_to_asm+0x34/0x70 [ 269.494780] ? __switch_to_asm+0x40/0x70 [ 269.498844] ? __switch_to_asm+0x34/0x70 [ 269.502920] ? __switch_to_asm+0x40/0x70 [ 269.506985] ? __switch_to_asm+0x34/0x70 [ 269.511049] ? __switch_to_asm+0x40/0x70 [ 269.515126] ? find_held_lock+0x36/0x1c0 [ 269.519222] ? check_same_owner+0x340/0x340 [ 269.523552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.529586] ? rcu_note_context_switch+0x680/0x680 [ 269.534530] __should_failslab+0x124/0x180 [ 269.538775] should_failslab+0x9/0x14 [ 269.542586] kmem_cache_alloc+0x29c/0x710 [ 269.546741] ? lock_downgrade+0x8f0/0x8f0 [ 269.550902] getname_flags+0xd0/0x5a0 [ 269.554702] ? __lock_is_held+0xb5/0x140 [ 269.558777] getname+0x19/0x20 [ 269.562000] do_sys_open+0x3a2/0x720 [ 269.565731] ? filp_open+0x80/0x80 [ 269.569286] ? trace_hardirqs_on+0x2c0/0x2c0 [ 269.573699] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 269.578810] ? do_sys_ftruncate+0x44e/0x560 [ 269.583140] __x64_sys_open+0x7e/0xc0 [ 269.586946] do_syscall_64+0x1b9/0x820 [ 269.590838] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 269.596221] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.601165] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.606025] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 269.611075] ? prepare_exit_to_usermode+0x291/0x3b0 [ 269.616103] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.620961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.626154] RIP: 0033:0x410dd1 [ 269.629357] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 269.648262] RSP: 002b:00007f7d90765a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 269.655975] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000410dd1 19:23:46 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x20, 0x10801) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000001c0)=r2) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000200)=0x6) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r3}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f0000000000)={0x1, 0xffff, 0x10001, 0x0, 0x88, 0x5}) [ 269.663244] RDX: 00007f7d90765afa RSI: 0000000000000002 RDI: 00007f7d90765af0 [ 269.670512] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 269.677782] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 269.685048] R13: 0000000000000000 R14: 00000000004ca278 R15: 0000000000000005 [ 269.692341] CPU: 0 PID: 10182 Comm: syz-executor5 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 269.700841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.710214] Call Trace: [ 269.712817] dump_stack+0x1c9/0x2b4 [ 269.716464] ? dump_stack_print_info.cold.2+0x52/0x52 [ 269.721665] ? find_held_lock+0x36/0x1c0 [ 269.725751] should_fail.cold.4+0xa/0x11 [ 269.729845] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.734974] ? lock_downgrade+0x8f0/0x8f0 [ 269.739141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.744729] ? timespec64_trunc+0xea/0x180 [ 269.748974] ? inode_init_owner+0x340/0x340 [ 269.753311] ? find_held_lock+0x36/0x1c0 [ 269.757403] ? check_same_owner+0x340/0x340 [ 269.761742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.767295] ? rcu_note_context_switch+0x680/0x680 [ 269.772257] __should_failslab+0x124/0x180 [ 269.776510] should_failslab+0x9/0x14 [ 269.780319] kmem_cache_alloc+0x29c/0x710 [ 269.784479] ? lock_downgrade+0x8f0/0x8f0 [ 269.788641] getname_flags+0xd0/0x5a0 [ 269.792449] ? __lock_is_held+0xb5/0x140 [ 269.796524] getname+0x19/0x20 [ 269.799725] do_sys_open+0x3a2/0x720 [ 269.803456] ? filp_open+0x80/0x80 [ 269.807011] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 269.812129] ? do_sys_ftruncate+0x44e/0x560 19:23:46 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:46 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000080)="153f623470000000000000") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) [ 269.816467] __x64_sys_open+0x7e/0xc0 [ 269.820296] do_syscall_64+0x1b9/0x820 [ 269.824218] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 269.829599] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.834553] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 269.839578] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 269.844600] ? recalc_sigpending_tsk+0x180/0x180 [ 269.849364] ? kasan_check_write+0x14/0x20 [ 269.853618] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.858483] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.863680] RIP: 0033:0x410dd1 [ 269.866889] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 269.885800] RSP: 002b:00007f556fb72a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 269.893524] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000410dd1 [ 269.900798] RDX: 00007f556fb72afa RSI: 0000000000000002 RDI: 00007f556fb72af0 [ 269.908072] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 269.915347] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 269.922620] R13: 0000000000000000 R14: 00000000004ca278 R15: 0000000000000005 19:23:46 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x400, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1, &(0x7f000000b000), 0x4, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000180), 0x1, 0x2) io_setup(0x800, &(0x7f00000000c0)) fcntl$getown(r0, 0x9) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 19:23:46 executing program 6 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r5 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r5, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r5, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:23:46 executing program 2 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:46 executing program 7: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:46 executing program 5 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 270.053474] FAULT_INJECTION: forcing a failure. [ 270.053474] name failslab, interval 1, probability 0, space 0, times 0 [ 270.064955] CPU: 0 PID: 10201 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 270.073455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.082813] Call Trace: [ 270.085417] dump_stack+0x1c9/0x2b4 [ 270.089064] ? dump_stack_print_info.cold.2+0x52/0x52 [ 270.091544] FAULT_INJECTION: forcing a failure. [ 270.091544] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 270.094280] ? find_held_lock+0x36/0x1c0 [ 270.110119] should_fail.cold.4+0xa/0x11 [ 270.114188] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.119328] ? lock_downgrade+0x8f0/0x8f0 [ 270.123488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.129027] ? timespec64_trunc+0xea/0x180 [ 270.133263] ? inode_init_owner+0x340/0x340 [ 270.137588] ? find_held_lock+0x36/0x1c0 [ 270.141675] ? check_same_owner+0x340/0x340 [ 270.146001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.151546] ? rcu_note_context_switch+0x680/0x680 [ 270.156487] __should_failslab+0x124/0x180 [ 270.160727] should_failslab+0x9/0x14 [ 270.164535] kmem_cache_alloc+0x29c/0x710 [ 270.168688] ? lock_downgrade+0x8f0/0x8f0 [ 270.172846] getname_flags+0xd0/0x5a0 [ 270.176645] ? __lock_is_held+0xb5/0x140 [ 270.180712] getname+0x19/0x20 [ 270.183911] do_sys_open+0x3a2/0x720 [ 270.187629] ? filp_open+0x80/0x80 [ 270.191171] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 270.196290] ? do_sys_ftruncate+0x44e/0x560 [ 270.200618] __x64_sys_open+0x7e/0xc0 [ 270.204425] do_syscall_64+0x1b9/0x820 [ 270.208317] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 270.213686] ? syscall_return_slowpath+0x5e0/0x5e0 [ 270.218620] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 270.223640] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 270.228658] ? recalc_sigpending_tsk+0x180/0x180 [ 270.233419] ? kasan_check_write+0x14/0x20 [ 270.237667] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.242520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.247711] RIP: 0033:0x410dd1 [ 270.250909] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 270.269810] RSP: 002b:00007f458362fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 270.277523] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000410dd1 [ 270.284796] RDX: 00007f458362fafa RSI: 0000000000000002 RDI: 00007f458362faf0 [ 270.292068] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 270.299334] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 270.306602] R13: 0000000000000000 R14: 00000000004ca278 R15: 0000000000000005 [ 270.313895] CPU: 1 PID: 10206 Comm: syz-executor2 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 270.322394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.331778] Call Trace: [ 270.331803] dump_stack+0x1c9/0x2b4 [ 270.338017] ? dump_stack_print_info.cold.2+0x52/0x52 [ 270.343231] ? mark_held_locks+0x160/0x160 [ 270.347484] should_fail.cold.4+0xa/0x11 [ 270.351562] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.356676] ? print_usage_bug+0xc0/0xc0 [ 270.360759] ? mark_held_locks+0x160/0x160 [ 270.365032] ? graph_lock+0x170/0x170 [ 270.368841] ? print_usage_bug+0xc0/0xc0 [ 270.372910] ? graph_lock+0x170/0x170 [ 270.376726] ? lock_downgrade+0x8f0/0x8f0 [ 270.380894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.386452] ? should_fail+0x246/0xd86 [ 270.390345] ? find_held_lock+0x36/0x1c0 [ 270.394638] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.399744] __alloc_pages_nodemask+0x365/0xd10 [ 270.404405] ? lock_downgrade+0x8f0/0x8f0 [ 270.408561] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 270.413564] ? timespec64_trunc+0xea/0x180 [ 270.417783] ? inode_init_owner+0x340/0x340 [ 270.422092] ? find_held_lock+0x36/0x1c0 [ 270.426147] ? trace_hardirqs_off+0xb8/0x2b0 [ 270.430542] cache_grow_begin+0x91/0x710 [ 270.434589] kmem_cache_alloc+0x63a/0x710 [ 270.438726] ? lock_downgrade+0x8f0/0x8f0 [ 270.442887] getname_flags+0xd0/0x5a0 [ 270.446675] ? __lock_is_held+0xb5/0x140 [ 270.450727] getname+0x19/0x20 [ 270.453906] do_sys_open+0x3a2/0x720 [ 270.457606] ? filp_open+0x80/0x80 [ 270.461133] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 270.466229] ? do_sys_ftruncate+0x44e/0x560 [ 270.470539] __x64_sys_open+0x7e/0xc0 [ 270.474326] do_syscall_64+0x1b9/0x820 [ 270.478212] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 270.483563] ? syscall_return_slowpath+0x5e0/0x5e0 [ 270.488477] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 270.493479] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 270.498488] ? recalc_sigpending_tsk+0x180/0x180 [ 270.503233] ? kasan_check_write+0x14/0x20 [ 270.507455] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.512288] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.517462] RIP: 0033:0x410dd1 [ 270.520659] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 270.539544] RSP: 002b:00007f7d907a7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 270.547238] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000410dd1 19:23:47 executing program 6 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:47 executing program 4: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x80) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000380)) r1 = socket$l2tp(0x18, 0x1, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r2, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @multicast2}, @ib={0x1b, 0xffffffff00000000, 0x10000, {"a7fdd17463ede368c8e423ff1a6b7f96"}, 0x8, 0x101, 0xb8ef}}}, 0x118) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f00000000c0)=0x8, 0x4) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L+', 0x5b76aea5}, 0x28, 0x1) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) syz_open_dev$amidi(&(0x7f00000003c0)='/dev/amidi#\x00', 0x1, 0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f00000005c0)={0x80000001, 0x800c, 0x1, 0xfffffffffffffffa, 0x0}, &(0x7f00000002c0)=0x10) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000300)={r5, 0x1000}, 0x8) ppoll(&(0x7f0000000040)=[{r4}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:23:47 executing program 7: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 270.554507] RDX: 00007f7d907a7afa RSI: 0000000000000002 RDI: 00007f7d907a7af0 [ 270.561761] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 270.569012] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 270.576264] R13: 0000000000000000 R14: 00000000004ca278 R15: 0000000000000006 [ 270.668234] FAULT_INJECTION: forcing a failure. [ 270.668234] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 270.680084] CPU: 1 PID: 10220 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 270.688580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.697934] Call Trace: [ 270.700533] dump_stack+0x1c9/0x2b4 [ 270.704180] ? dump_stack_print_info.cold.2+0x52/0x52 [ 270.709406] ? mark_held_locks+0x160/0x160 [ 270.713672] should_fail.cold.4+0xa/0x11 [ 270.717764] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.721342] FAULT_INJECTION: forcing a failure. [ 270.721342] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 270.722890] ? print_usage_bug+0xc0/0xc0 [ 270.738739] ? mark_held_locks+0x160/0x160 [ 270.742976] ? graph_lock+0x170/0x170 [ 270.746782] ? print_usage_bug+0xc0/0xc0 [ 270.750848] ? graph_lock+0x170/0x170 [ 270.754648] ? lock_downgrade+0x8f0/0x8f0 [ 270.758831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.764386] ? should_fail+0x246/0xd86 [ 270.768273] ? find_held_lock+0x36/0x1c0 [ 270.772343] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.777457] __alloc_pages_nodemask+0x365/0xd10 [ 270.782127] ? lock_downgrade+0x8f0/0x8f0 [ 270.786283] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 270.791306] ? timespec64_trunc+0xea/0x180 [ 270.795547] ? inode_init_owner+0x340/0x340 [ 270.799874] ? find_held_lock+0x36/0x1c0 [ 270.803958] ? trace_hardirqs_off+0xb8/0x2b0 [ 270.808370] cache_grow_begin+0x91/0x710 [ 270.812444] kmem_cache_alloc+0x63a/0x710 [ 270.816597] ? lock_downgrade+0x8f0/0x8f0 [ 270.820752] getname_flags+0xd0/0x5a0 [ 270.824569] ? __lock_is_held+0xb5/0x140 [ 270.828639] getname+0x19/0x20 [ 270.831842] do_sys_open+0x3a2/0x720 [ 270.835565] ? filp_open+0x80/0x80 [ 270.839113] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 270.844227] ? do_sys_ftruncate+0x44e/0x560 [ 270.848556] __x64_sys_open+0x7e/0xc0 [ 270.852369] do_syscall_64+0x1b9/0x820 [ 270.856263] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 270.861634] ? syscall_return_slowpath+0x5e0/0x5e0 [ 270.866570] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 270.871593] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 270.876609] ? recalc_sigpending_tsk+0x180/0x180 [ 270.881368] ? kasan_check_write+0x14/0x20 [ 270.885618] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.890474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.895662] RIP: 0033:0x410dd1 [ 270.898860] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 19:23:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) [ 270.917766] RSP: 002b:00007f458362fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 270.925479] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000410dd1 [ 270.932750] RDX: 00007f458362fafa RSI: 0000000000000002 RDI: 00007f458362faf0 [ 270.940018] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 270.947289] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 270.954559] R13: 0000000000000000 R14: 00000000004ca278 R15: 0000000000000006 [ 270.961852] CPU: 0 PID: 10225 Comm: syz-executor5 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 270.970357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.979457] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 270.979710] Call Trace: [ 270.979738] dump_stack+0x1c9/0x2b4 [ 270.990399] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 270.991161] ? dump_stack_print_info.cold.2+0x52/0x52 [ 270.991182] ? mark_held_locks+0x160/0x160 [ 270.991225] should_fail.cold.4+0xa/0x11 [ 270.991246] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.022252] ? print_usage_bug+0xc0/0xc0 [ 271.026334] ? mark_held_locks+0x160/0x160 [ 271.030581] ? graph_lock+0x170/0x170 [ 271.034392] ? print_usage_bug+0xc0/0xc0 [ 271.038463] ? graph_lock+0x170/0x170 [ 271.042271] ? lock_downgrade+0x8f0/0x8f0 [ 271.046445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.051997] ? should_fail+0x246/0xd86 [ 271.055896] ? find_held_lock+0x36/0x1c0 [ 271.059976] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.065098] __alloc_pages_nodemask+0x365/0xd10 19:23:47 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 271.069776] ? lock_downgrade+0x8f0/0x8f0 [ 271.073936] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 271.078962] ? timespec64_trunc+0xea/0x180 [ 271.083226] ? inode_init_owner+0x340/0x340 [ 271.087563] ? find_held_lock+0x36/0x1c0 [ 271.091657] ? trace_hardirqs_off+0xb8/0x2b0 [ 271.096081] cache_grow_begin+0x91/0x710 [ 271.100162] kmem_cache_alloc+0x63a/0x710 [ 271.104342] ? lock_downgrade+0x8f0/0x8f0 [ 271.108503] getname_flags+0xd0/0x5a0 [ 271.112314] ? __lock_is_held+0xb5/0x140 [ 271.116388] getname+0x19/0x20 [ 271.119589] do_sys_open+0x3a2/0x720 [ 271.123315] ? filp_open+0x80/0x80 [ 271.126871] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 271.131987] ? do_sys_ftruncate+0x44e/0x560 [ 271.136325] __x64_sys_open+0x7e/0xc0 [ 271.140143] do_syscall_64+0x1b9/0x820 [ 271.144045] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 271.149424] ? syscall_return_slowpath+0x5e0/0x5e0 [ 271.154376] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 271.159407] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 271.164437] ? recalc_sigpending_tsk+0x180/0x180 [ 271.169222] ? kasan_check_write+0x14/0x20 [ 271.173476] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.178341] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.183563] RIP: 0033:0x410dd1 [ 271.183581] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 271.205700] RSP: 002b:00007f556fb51a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 271.213430] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000410dd1 19:23:47 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 271.220706] RDX: 00007f556fb51afa RSI: 0000000000000002 RDI: 00007f556fb51af0 [ 271.227983] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 271.235259] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 271.242538] R13: 0000000000000000 R14: 00000000004ca278 R15: 0000000000000006 19:23:47 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) connect$l2tp(r1, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x2, 0x2, {0xa, 0x4e22, 0xd975, @mcast1, 0x8001}}}, 0x32) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) write$cgroup_pid(r1, &(0x7f00000000c0)=r2, 0x12) 19:23:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x2, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000100)={0x1f000, 0x100000, 0x4, 0x6, 0x43}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x100000, 0x2000, &(0x7f0000000000/0x2000)=nil}) 19:23:48 executing program 6 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:48 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:48 executing program 4: socketpair(0xfffffffffffffffc, 0x7, 0xffffffffffffffc8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x5, 0x4) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000002c0)) socketpair(0x14, 0x803, 0xffff, &(0x7f0000000000)={0xffffffffffffffff}) socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8915, &(0x7f00000001c0)="154dd7931bd2c5233372e47999310000000000000000000000000000") ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000140)={0x40}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x200000000000008d, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000200), 0x8) socket$inet6_sctp(0xa, 0x5, 0x84) [ 271.456995] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 271.473308] FAULT_INJECTION: forcing a failure. [ 271.473308] name failslab, interval 1, probability 0, space 0, times 0 [ 271.484675] CPU: 1 PID: 10263 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 271.493229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.502592] Call Trace: [ 271.505210] dump_stack+0x1c9/0x2b4 [ 271.508863] ? dump_stack_print_info.cold.2+0x52/0x52 [ 271.514083] should_fail.cold.4+0xa/0x11 [ 271.518170] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.523319] ? print_usage_bug+0xc0/0xc0 [ 271.527396] ? lock_downgrade+0x8f0/0x8f0 [ 271.531563] ? find_held_lock+0x36/0x1c0 [ 271.535656] ? check_same_owner+0x340/0x340 [ 271.539987] ? rcu_note_context_switch+0x680/0x680 [ 271.544932] __should_failslab+0x124/0x180 [ 271.549179] should_failslab+0x9/0x14 [ 271.553169] kmem_cache_alloc+0x29c/0x710 [ 271.557331] ? graph_lock+0x170/0x170 [ 271.561141] ? mark_held_locks+0x160/0x160 [ 271.565389] __alloc_file+0xac/0x400 [ 271.569107] ? file_free_rcu+0x90/0x90 [ 271.572998] ? mark_held_locks+0x160/0x160 [ 271.577241] ? find_held_lock+0x36/0x1c0 [ 271.581318] ? lock_downgrade+0x8f0/0x8f0 [ 271.585474] alloc_empty_file+0x72/0x170 [ 271.589545] path_openat+0x15f/0x5340 [ 271.593358] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 271.598039] ? graph_lock+0x170/0x170 [ 271.601859] ? path_lookupat.isra.43+0xc00/0xc00 [ 271.606629] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 271.611652] ? expand_files.part.8+0x571/0x9c0 [ 271.616244] ? find_held_lock+0x36/0x1c0 [ 271.620318] ? lock_downgrade+0x8f0/0x8f0 [ 271.624468] ? do_sys_open+0x3a2/0x720 [ 271.628366] ? kasan_check_read+0x11/0x20 [ 271.632518] ? do_raw_spin_unlock+0xa7/0x2f0 [ 271.636930] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 271.641519] ? __lock_is_held+0xb5/0x140 [ 271.645598] ? _raw_spin_unlock+0x22/0x30 [ 271.649757] ? __alloc_fd+0x34e/0x710 [ 271.653564] ? usercopy_warn+0x120/0x120 [ 271.657643] do_filp_open+0x255/0x380 [ 271.661448] ? may_open_dev+0x100/0x100 [ 271.665439] ? get_unused_fd_flags+0x122/0x1a0 [ 271.670028] ? __alloc_fd+0x710/0x710 [ 271.673830] ? __lock_is_held+0xb5/0x140 [ 271.677901] do_sys_open+0x584/0x720 [ 271.681620] ? filp_open+0x80/0x80 [ 271.685163] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 271.690280] ? do_sys_ftruncate+0x44e/0x560 [ 271.694608] __x64_sys_open+0x7e/0xc0 [ 271.698416] do_syscall_64+0x1b9/0x820 [ 271.702307] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 271.707675] ? syscall_return_slowpath+0x5e0/0x5e0 [ 271.712613] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 271.717636] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 271.722652] ? recalc_sigpending_tsk+0x180/0x180 [ 271.727417] ? kasan_check_write+0x14/0x20 [ 271.731661] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.736519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.741716] RIP: 0033:0x410dd1 19:23:48 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 271.744915] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 271.763821] RSP: 002b:00007f458362fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 271.771540] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000410dd1 [ 271.778813] RDX: 00007f458362fafa RSI: 0000000000000002 RDI: 00007f458362faf0 [ 271.786082] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 271.793353] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 271.800620] R13: 0000000000000000 R14: 00000000004ca278 R15: 0000000000000007 [ 271.817673] QAT: Invalid ioctl 19:23:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\nxt4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 271.902457] QAT: Invalid ioctl 19:23:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r5 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r5, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r5, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r4, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r4, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r4, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:23:48 executing program 6 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:48 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000001c0)={'vcan0\x00', {0x2, 0x4e23, @local}}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x201, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x80, 0x400000000000000, 0x815, 0x80000000, @time={0x77359400}, {0x64e, 0x804b}, {0x0, 0x8001}, @note={0x100000001, 0x0, 0x9, 0x4, 0x3}}, {0x40ac, 0x2, 0xa7e7, 0x2, @time={0x0, 0x1c9c380}, {0x3, 0x10001}, {0xf1, 0x101}, @raw32={[0x6, 0xfffffffffffff801, 0xcaa]}}], 0x60) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) getresuid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)=0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x88000, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000='version=9p2000'}, {@access_uid={'access', 0x3d, r3}}, {@access_user='access=user'}, {@mmap='mmap'}, {@cache_mmap='cache=mmap'}, {@access_uid={'access', 0x3d, r4}}, {@access_any='access=any'}]}}) 19:23:48 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 272.026926] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000, [ 272.078637] FAULT_INJECTION: forcing a failure. [ 272.078637] name failslab, interval 1, probability 0, space 0, times 0 [ 272.089985] CPU: 1 PID: 10294 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 272.098485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.107847] Call Trace: [ 272.110470] dump_stack+0x1c9/0x2b4 [ 272.114131] ? dump_stack_print_info.cold.2+0x52/0x52 [ 272.119337] ? lock_downgrade+0x8f0/0x8f0 [ 272.123515] should_fail.cold.4+0xa/0x11 19:23:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 272.127604] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.132755] ? is_bpf_text_address+0xd7/0x170 [ 272.137278] ? kernel_text_address+0x79/0xf0 [ 272.141706] ? __kernel_text_address+0xd/0x40 [ 272.146241] ? unwind_get_return_address+0x61/0xa0 [ 272.151209] ? __save_stack_trace+0x8d/0xf0 [ 272.155555] ? find_held_lock+0x36/0x1c0 [ 272.159652] ? check_same_owner+0x340/0x340 [ 272.163990] ? rcu_note_context_switch+0x680/0x680 [ 272.168942] ? lock_downgrade+0x8f0/0x8f0 [ 272.173131] __should_failslab+0x124/0x180 19:23:48 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x10000000002, &(0x7f00000000c0)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400000, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) write$binfmt_script(r2, &(0x7f0000000280)={'#! ', './file0', [{0x20, ')'}, {0x20, '/dev/rfkill\x00'}, {0x20, '/dev/sequencer\x00'}, {0x20, 'user'}, {0x20, "231cc9e49a2498cb94083dd078b511e2ba363ca9748a248252ce7aa48c74d029f4c33abe16fdd57ba4a79a493d478138a33f3df2b46458fd2cd113788a9e2805248e180f222c75f81c8bb555821fe6805fd78804fe9308bdafebecf7fb2b5b0c486a3e97c640dffd36782699afb270aa19c7c700000000000000000000"}, {0x20, '/dev/sequencer\x00'}, {0x20, '@proc'}], 0xa, "ae65af9405b912e30eb3434eb6bea726b07ff6f5ab692307c4fd76ca8b214f15f682919fed0d4bf9c7218ec25bd08da6a45e8704c58ceeec2fd9cdbdfbff16b3e9d8c1dfcdf0707ec3ddb21e015748a5"}, 0x113) [ 272.177390] should_failslab+0x9/0x14 [ 272.181220] kmem_cache_alloc_trace+0x2b5/0x730 [ 272.185912] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 272.190611] apparmor_file_alloc_security+0x162/0xa90 [ 272.195810] ? trace_hardirqs_on+0xbd/0x2c0 [ 272.200144] ? rcu_pm_notify+0xc0/0xc0 [ 272.204053] ? apparmor_socket_getpeersec_stream+0xab0/0xab0 [ 272.209876] ? rcu_read_lock_sched_held+0x108/0x120 [ 272.214912] ? kmem_cache_alloc+0x30b/0x710 [ 272.219253] ? graph_lock+0x170/0x170 [ 272.223074] security_file_alloc+0x4c/0xa0 [ 272.227330] __alloc_file+0xfc/0x400 [ 272.231061] ? file_free_rcu+0x90/0x90 [ 272.234960] ? mark_held_locks+0x160/0x160 [ 272.239222] ? find_held_lock+0x36/0x1c0 [ 272.243313] ? lock_downgrade+0x8f0/0x8f0 [ 272.247487] alloc_empty_file+0x72/0x170 [ 272.251569] path_openat+0x15f/0x5340 [ 272.255385] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 272.260081] ? graph_lock+0x170/0x170 [ 272.263906] ? path_lookupat.isra.43+0xc00/0xc00 [ 272.268681] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 272.273805] ? expand_files.part.8+0x571/0x9c0 19:23:48 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000000)={'yam0\x00', 0x10000}) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x1}) 19:23:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 272.278403] ? find_held_lock+0x36/0x1c0 [ 272.282481] ? lock_downgrade+0x8f0/0x8f0 [ 272.286637] ? do_sys_open+0x3a2/0x720 [ 272.290542] ? kasan_check_read+0x11/0x20 [ 272.294700] ? do_raw_spin_unlock+0xa7/0x2f0 [ 272.299130] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 272.303808] ? __lock_is_held+0xb5/0x140 [ 272.307885] ? _raw_spin_unlock+0x22/0x30 [ 272.312046] ? __alloc_fd+0x34e/0x710 [ 272.315860] ? usercopy_warn+0x120/0x120 [ 272.319942] do_filp_open+0x255/0x380 [ 272.323759] ? may_open_dev+0x100/0x100 [ 272.327930] ? get_unused_fd_flags+0x122/0x1a0 [ 272.332527] ? __alloc_fd+0x710/0x710 [ 272.336334] ? __lock_is_held+0xb5/0x140 [ 272.340455] do_sys_open+0x584/0x720 [ 272.344187] ? filp_open+0x80/0x80 [ 272.347758] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 272.352871] ? do_sys_ftruncate+0x44e/0x560 [ 272.357227] __x64_sys_open+0x7e/0xc0 [ 272.361045] do_syscall_64+0x1b9/0x820 [ 272.364950] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.370330] ? syscall_return_slowpath+0x5e0/0x5e0 19:23:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='%xt4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 272.375268] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 272.380298] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 272.385327] ? recalc_sigpending_tsk+0x180/0x180 [ 272.390095] ? kasan_check_write+0x14/0x20 [ 272.394661] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.399529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.404739] RIP: 0033:0x410dd1 [ 272.407966] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 272.426877] RSP: 002b:00007f458362fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 272.434592] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000410dd1 [ 272.441861] RDX: 00007f458362fafa RSI: 0000000000000002 RDI: 00007f458362faf0 [ 272.449134] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 272.456406] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 272.463676] R13: 0000000000000000 R14: 00000000004ca278 R15: 0000000000000008 19:23:49 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400000, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x212}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000000), 0xfffffffffffffff5) [ 272.489244] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:23:49 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\nxt4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 272.573266] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000, 19:23:49 executing program 6 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:49 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:23:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 272.649551] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000, [ 272.734523] FAULT_INJECTION: forcing a failure. [ 272.734523] name failslab, interval 1, probability 0, space 0, times 0 [ 272.745945] CPU: 1 PID: 10345 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 272.754454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.763817] Call Trace: [ 272.766428] dump_stack+0x1c9/0x2b4 [ 272.770077] ? dump_stack_print_info.cold.2+0x52/0x52 [ 272.775282] ? lock_downgrade+0x8f0/0x8f0 [ 272.779462] should_fail.cold.4+0xa/0x11 [ 272.783549] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.788680] ? is_bpf_text_address+0xd7/0x170 [ 272.793187] ? kernel_text_address+0x79/0xf0 [ 272.797618] ? __kernel_text_address+0xd/0x40 [ 272.802119] ? unwind_get_return_address+0x61/0xa0 [ 272.807056] ? __save_stack_trace+0x8d/0xf0 [ 272.811388] ? find_held_lock+0x36/0x1c0 [ 272.815477] ? check_same_owner+0x340/0x340 [ 272.819811] ? rcu_note_context_switch+0x680/0x680 [ 272.824748] ? lock_downgrade+0x8f0/0x8f0 [ 272.828915] __should_failslab+0x124/0x180 [ 272.833160] should_failslab+0x9/0x14 [ 272.836972] kmem_cache_alloc_trace+0x2b5/0x730 [ 272.841646] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 272.846330] apparmor_file_alloc_security+0x162/0xa90 [ 272.851543] ? trace_hardirqs_on+0xbd/0x2c0 [ 272.855875] ? rcu_pm_notify+0xc0/0xc0 [ 272.859776] ? apparmor_socket_getpeersec_stream+0xab0/0xab0 [ 272.865588] ? rcu_read_lock_sched_held+0x108/0x120 [ 272.870611] ? kmem_cache_alloc+0x30b/0x710 [ 272.874938] ? graph_lock+0x170/0x170 [ 272.878754] security_file_alloc+0x4c/0xa0 [ 272.883016] __alloc_file+0xfc/0x400 [ 272.886745] ? file_free_rcu+0x90/0x90 [ 272.890640] ? mark_held_locks+0x160/0x160 [ 272.894882] ? find_held_lock+0x36/0x1c0 [ 272.898959] ? lock_downgrade+0x8f0/0x8f0 [ 272.903118] alloc_empty_file+0x72/0x170 [ 272.907188] path_openat+0x15f/0x5340 [ 272.911009] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 272.915691] ? graph_lock+0x170/0x170 [ 272.919507] ? path_lookupat.isra.43+0xc00/0xc00 [ 272.924271] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 272.929294] ? expand_files.part.8+0x571/0x9c0 [ 272.933884] ? find_held_lock+0x36/0x1c0 [ 272.937958] ? lock_downgrade+0x8f0/0x8f0 [ 272.942108] ? do_sys_open+0x3a2/0x720 [ 272.946003] ? kasan_check_read+0x11/0x20 [ 272.950158] ? do_raw_spin_unlock+0xa7/0x2f0 [ 272.954568] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 272.959149] ? __lock_is_held+0xb5/0x140 [ 272.963234] ? _raw_spin_unlock+0x22/0x30 [ 272.967390] ? __alloc_fd+0x34e/0x710 [ 272.971191] ? usercopy_warn+0x120/0x120 [ 272.975278] do_filp_open+0x255/0x380 [ 272.979084] ? may_open_dev+0x100/0x100 [ 272.983074] ? get_unused_fd_flags+0x122/0x1a0 [ 272.987659] ? __alloc_fd+0x710/0x710 [ 272.991462] ? __lock_is_held+0xb5/0x140 [ 272.995531] do_sys_open+0x584/0x720 [ 272.999256] ? filp_open+0x80/0x80 [ 273.002798] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 273.007903] ? do_sys_ftruncate+0x44e/0x560 [ 273.012243] __x64_sys_open+0x7e/0xc0 [ 273.016051] do_syscall_64+0x1b9/0x820 [ 273.019947] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 273.025317] ? syscall_return_slowpath+0x5e0/0x5e0 [ 273.030281] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 273.035300] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 273.040315] ? recalc_sigpending_tsk+0x180/0x180 [ 273.045073] ? kasan_check_write+0x14/0x20 [ 273.049324] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.054178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.059378] RIP: 0033:0x410dd1 [ 273.062579] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 19:23:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='e\nt4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 273.081478] RSP: 002b:00007f458362fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 273.089189] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000410dd1 [ 273.096469] RDX: 00007f458362fafa RSI: 0000000000000002 RDI: 00007f458362faf0 [ 273.103738] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 273.111018] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 273.118374] R13: 0000000000000000 R14: 00000000004ca278 R15: 0000000000000009 [ 273.144522] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000, 19:23:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:23:49 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x5, @local, 0xa2}, 0x1c) ppoll(&(0x7f00000001c0), 0x2000000000000094, &(0x7f0000000140)={0x77359400}, &(0x7f00000000c0), 0xfffffffffffffe4b) socket$l2tp(0x18, 0x1, 0x1) fanotify_mark(r1, 0x20, 0x30030, r1, &(0x7f0000000000)='./file0\x00') socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) 19:23:49 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 273.194058] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000, 19:23:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='%xt4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 273.288051] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000, 19:23:50 executing program 6 (fault-call:2 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r5 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r5, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r5, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r4, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r4, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r4, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:23:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = dup2(r0, r0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) sendto$unix(r2, &(0x7f0000000000)="5dfe55ed102ebc2653069399581968f296285acee0b7f6385185817beea729fdbcc1ccf6cd6dea", 0x27, 0x80, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) r3 = semget$private(0x0, 0x7, 0x2) semctl$GETNCNT(r3, 0x3, 0xe, &(0x7f00000002c0)=""/75) [ 273.494439] FAULT_INJECTION: forcing a failure. [ 273.494439] name failslab, interval 1, probability 0, space 0, times 0 [ 273.506034] CPU: 0 PID: 10392 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 273.514540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.523905] Call Trace: [ 273.526513] dump_stack+0x1c9/0x2b4 [ 273.530164] ? dump_stack_print_info.cold.2+0x52/0x52 [ 273.535401] should_fail.cold.4+0xa/0x11 [ 273.539485] ? fault_create_debugfs_attr+0x1f0/0x1f0 19:23:50 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 273.544608] ? up_read+0x110/0x110 [ 273.548162] ? down_read+0x1d0/0x1d0 [ 273.551917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.557546] ? process_measurement+0x280/0x1c10 [ 273.562255] ? graph_lock+0x170/0x170 [ 273.566110] ? lo_ioctl+0x8e/0x1d90 [ 273.569759] ? find_held_lock+0x36/0x1c0 [ 273.573846] ? __lock_is_held+0xb5/0x140 [ 273.577950] ? check_same_owner+0x340/0x340 [ 273.582387] ? rcu_note_context_switch+0x680/0x680 [ 273.587347] __should_failslab+0x124/0x180 19:23:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ex\n4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='e\nt4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 273.591607] should_failslab+0x9/0x14 [ 273.595428] kmem_cache_alloc_trace+0x2b5/0x730 [ 273.600117] ? init_wait_entry+0x1c0/0x1c0 [ 273.604380] ? loop_get_status64+0x140/0x140 [ 273.608806] __kthread_create_on_node+0x13d/0x530 [ 273.613664] ? __kthread_parkme+0x1b0/0x1b0 [ 273.618016] ? __lockdep_init_map+0x105/0x590 [ 273.622531] ? __lockdep_init_map+0x105/0x590 [ 273.627050] ? loop_get_status64+0x140/0x140 [ 273.631476] kthread_create_on_node+0xb1/0xe0 [ 273.635994] ? __kthread_create_on_node+0x530/0x530 [ 273.641036] ? kasan_check_read+0x11/0x20 [ 273.645233] lo_ioctl+0x7f6/0x1d90 [ 273.648807] ? lo_rw_aio_complete+0x450/0x450 [ 273.653419] blkdev_ioctl+0x9cd/0x2030 [ 273.657335] ? blkpg_ioctl+0xc40/0xc40 [ 273.661264] ? kasan_check_read+0x11/0x20 [ 273.665429] ? rcu_is_watching+0x8c/0x150 [ 273.669597] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 273.674297] ? __fget+0x4d5/0x740 [ 273.677781] ? ksys_dup3+0x690/0x690 [ 273.681507] ? trace_hardirqs_on+0x2c0/0x2c0 [ 273.685934] ? kasan_check_write+0x14/0x20 [ 273.690193] block_ioctl+0xee/0x130 [ 273.693850] ? blkdev_fallocate+0x400/0x400 [ 273.698190] do_vfs_ioctl+0x1de/0x1720 [ 273.702122] ? kasan_check_read+0x11/0x20 [ 273.706282] ? rcu_is_watching+0x8c/0x150 [ 273.710435] ? trace_hardirqs_on+0xbd/0x2c0 [ 273.714766] ? ioctl_preallocate+0x300/0x300 [ 273.719191] ? __fget_light+0x2f7/0x440 [ 273.723190] ? putname+0xf2/0x130 [ 273.726675] ? fget_raw+0x20/0x20 [ 273.730144] ? rcu_read_lock_sched_held+0x108/0x120 [ 273.735170] ? kmem_cache_free+0x246/0x280 [ 273.739438] ? do_syscall_64+0x9a/0x820 19:23:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 273.743426] ? do_syscall_64+0x9a/0x820 [ 273.747412] ? lockdep_hardirqs_on+0x421/0x5c0 [ 273.752007] ? security_file_ioctl+0x94/0xc0 [ 273.756428] ksys_ioctl+0xa9/0xd0 [ 273.759894] __x64_sys_ioctl+0x73/0xb0 [ 273.763793] do_syscall_64+0x1b9/0x820 [ 273.767695] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 273.773073] ? syscall_return_slowpath+0x5e0/0x5e0 [ 273.778016] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 273.783049] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 273.788072] ? recalc_sigpending_tsk+0x180/0x180 19:23:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 273.792836] ? kasan_check_write+0x14/0x20 [ 273.797085] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.801949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.807150] RIP: 0033:0x456f07 [ 273.810358] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.829269] RSP: 002b:00007f458362fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 273.836989] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000456f07 19:23:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000000)) [ 273.844266] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 273.851583] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 273.858860] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 273.866139] R13: 0000000000000000 R14: 00000000004ca278 R15: 000000000000000a 19:23:50 executing program 6 (fault-call:2 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 274.077292] FAULT_INJECTION: forcing a failure. [ 274.077292] name failslab, interval 1, probability 0, space 0, times 0 [ 274.088676] CPU: 1 PID: 10440 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 274.097188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.106568] Call Trace: [ 274.109175] dump_stack+0x1c9/0x2b4 [ 274.112834] ? dump_stack_print_info.cold.2+0x52/0x52 [ 274.118043] ? graph_lock+0x170/0x170 [ 274.121873] should_fail.cold.4+0xa/0x11 [ 274.125963] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.131089] ? kernfs_activate+0x8e/0x2c0 [ 274.135255] ? graph_lock+0x170/0x170 [ 274.139067] ? lock_release+0x9f0/0x9f0 [ 274.143064] ? check_same_owner+0x340/0x340 [ 274.147407] ? find_held_lock+0x36/0x1c0 [ 274.151494] ? __lock_is_held+0xb5/0x140 [ 274.155591] ? check_same_owner+0x340/0x340 [ 274.159935] ? rcu_note_context_switch+0x680/0x680 [ 274.164892] __should_failslab+0x124/0x180 [ 274.169152] should_failslab+0x9/0x14 [ 274.172973] kmem_cache_alloc+0x29c/0x710 [ 274.177139] ? find_held_lock+0x36/0x1c0 [ 274.181244] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 274.186287] __kernfs_new_node+0x127/0x8d0 [ 274.190551] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 274.195324] ? kasan_check_write+0x14/0x20 [ 274.199578] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 274.204523] ? __kernfs_new_node+0x692/0x8d0 [ 274.208946] ? wait_for_completion+0x8d0/0x8d0 [ 274.213544] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 274.218317] ? graph_lock+0x170/0x170 [ 274.222140] ? kasan_check_write+0x14/0x20 [ 274.226395] ? __lock_is_held+0xb5/0x140 [ 274.230471] ? wait_for_completion+0x8d0/0x8d0 [ 274.235081] ? mutex_unlock+0xd/0x10 [ 274.238818] ? kernfs_activate+0x21a/0x2c0 [ 274.243072] kernfs_new_node+0x95/0x120 [ 274.247068] __kernfs_create_file+0x5a/0x340 [ 274.251493] sysfs_add_file_mode_ns+0x221/0x520 [ 274.256269] ? component_del+0x470/0x550 [ 274.260351] internal_create_group+0x3e1/0xd80 [ 274.264960] ? remove_files.isra.1+0x190/0x190 [ 274.269558] ? up_write+0x7b/0x220 [ 274.273109] ? up_read+0x110/0x110 [ 274.276664] ? down_read+0x1d0/0x1d0 [ 274.280398] sysfs_create_group+0x1f/0x30 [ 274.284559] lo_ioctl+0x1310/0x1d90 [ 274.288211] ? lo_rw_aio_complete+0x450/0x450 [ 274.292725] blkdev_ioctl+0x9cd/0x2030 [ 274.296623] ? blkpg_ioctl+0xc40/0xc40 [ 274.300527] ? kasan_check_read+0x11/0x20 [ 274.304683] ? rcu_is_watching+0x8c/0x150 [ 274.308846] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 274.313531] ? __fget+0x4d5/0x740 [ 274.317000] ? ksys_dup3+0x690/0x690 [ 274.320732] ? trace_hardirqs_on+0x2c0/0x2c0 [ 274.325156] ? kasan_check_write+0x14/0x20 [ 274.329413] block_ioctl+0xee/0x130 [ 274.333054] ? blkdev_fallocate+0x400/0x400 [ 274.337392] do_vfs_ioctl+0x1de/0x1720 [ 274.341295] ? kasan_check_read+0x11/0x20 [ 274.345453] ? rcu_is_watching+0x8c/0x150 [ 274.349608] ? trace_hardirqs_on+0xbd/0x2c0 [ 274.353944] ? ioctl_preallocate+0x300/0x300 [ 274.358361] ? __fget_light+0x2f7/0x440 [ 274.362342] ? putname+0xf2/0x130 [ 274.365807] ? fget_raw+0x20/0x20 [ 274.369278] ? rcu_read_lock_sched_held+0x108/0x120 [ 274.374300] ? kmem_cache_free+0x246/0x280 [ 274.378549] ? do_syscall_64+0x9a/0x820 [ 274.382530] ? do_syscall_64+0x9a/0x820 [ 274.386514] ? lockdep_hardirqs_on+0x421/0x5c0 [ 274.391111] ? security_file_ioctl+0x94/0xc0 [ 274.395767] ksys_ioctl+0xa9/0xd0 [ 274.399243] __x64_sys_ioctl+0x73/0xb0 [ 274.403139] do_syscall_64+0x1b9/0x820 [ 274.407037] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 274.412417] ? syscall_return_slowpath+0x5e0/0x5e0 [ 274.417358] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 274.422387] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 274.427410] ? recalc_sigpending_tsk+0x180/0x180 [ 274.432177] ? kasan_check_write+0x14/0x20 [ 274.436434] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.441295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.446489] RIP: 0033:0x456f07 [ 274.449694] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.468605] RSP: 002b:00007f458362fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 19:23:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 274.476323] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000456f07 [ 274.483691] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 274.490974] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 274.498250] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 274.505938] R13: 0000000000000000 R14: 00000000004ca278 R15: 000000000000000b 19:23:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000140), &(0x7f0000000200)=0x4) clock_gettime(0x0, &(0x7f00000001c0)) ppoll(&(0x7f0000000040)=[{r1}], 0x0, &(0x7f00000000c0), &(0x7f0000000180), 0x8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0x4) 19:23:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ex\n4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ex%4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r3, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r5 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r5, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r5, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r4, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r4, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r4, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:23:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:51 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0x7, &(0x7f0000000000)=ANY=[], 0xa0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2420, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000080)=0x1) uname(&(0x7f00000000c0)=""/113) 19:23:51 executing program 6 (fault-call:2 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1b) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev_mcast\x00') getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000002c0)={@mcast2, 0x0}, &(0x7f0000000300)=0x14) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000400)={"2d3285f2fdfb312fc7b58a497c64474c0527c336e5a8f61d6eb3959702bed7c9ee68633a5089d08cb3982ddeea304737ccd00564af19aacae1a0d246839e4f5521407c7d916d78b8af461d61c3072d9deb7232f5a3716205685148f84f9b8808ed8ba71ad6cf8abd4152176a5816a713dca2780bcd4a3b0245174672ce0d98e57610025660ae31daa95645e1feed56f8b830717f122f2189922e82bfdc196599a606c9f7181cd5e5dbfd2c042f674303f00052cc07a16cbf63f955e0ee2b46d3572f04d43ae04e5feeb501132470a88b2bbffb34aa121f3a0545eade5e2cdf0cd1b0015709c8d86664bac83b536298c45c3dfe1908b47692773c282d6a70b2ba0117cb85438122c10bb5bdc5bc06f66802965fb825f78b250301b4281df4603858dc290c9237bede3017f9bf8a84c626afc7089429b05c98e359bd3a994120af1e54ea57d6ac70ad0b8231939f87d15cdb1ae68680fd268d91e781700bb9f4c69c6f7e7a73b1345c2db98e354f75479a3ece3c069a5a501b42889ff9e25ff600f607ac46cdb6c4f553f944ee17362e62dabce3583561ee8a86aec7e4df39ca8caebe04532d001e6d65838d36debffab486e2f85a45d5dd45951b9787d56d2ab6851e8c66980c406b40d24135bfcda05768f94ff6d516e5e59938a515e38d2460f58f8cfc6ac47480b7d302fe17d0dbba879b2714fc6f25cc222d7d9f4b52cd00f99faf2cf730866064f0d33e3b58428788fcf4b88f702b410febef90b7dfd68d1fd1f035cfd66427d862aad1378c6e6c74ed58f334565c6502294c3f510d7f377bffd9b84e248a4a25b5f81a1978b4cb48cf53af6d53f802257641cb4bee5aff8f600de482b12ced431b30fdd55206f9ee60a563236acfa30fc25090f4273e3502a1088d906be704b470668a2a2a97c2d0fc6b5c5f7781a5962640c88d678b4fa2573a74c6ad199dd1a40f8beb0dd7b5fee0b3a8c4900586bfad7bddd167c7e8402efdcf2acf921e98ac86ef9e7c800758fe295ab1d40f86828745104258b216686a50afa407f08f3cdf1aa4023985dc91670f9e2b8b4e06ae3993df177c6a82c051933f31d25400c94f32ad068f56be014b6cb6ce63efe959b9d1c169812c99b78dd02f98ddd019f610ff14005f6b014d1b069a47ee106a6dc24109fe1799401c764462bb0dbdc11fca64a0a1ead2db757a18e16dc4b701874de2638acc33b5e313559731901504b7e33bfed241565c95ef1932db0dd72feff7444df1358b5ed5176d389be14800ba0982da14ba4dedfc0a36313eec03ca5e71aa00cb4ad9b516ba534108cf258d28c7b9df4f5fc4676a89ddbb72ec3aaa8452141a44e0d374247c5b265af9ed32404de3cb52180106b67c34972a7bebd5a738a6684f947c770f0544f61175ca627fc7765d4671ba8dd34bc285119292763d03c3f9deccc534"}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000340)={@rand_addr=0x3a09, @rand_addr=0x47, r2}, 0xc) syz_open_dev$mouse(&(0x7f00000003c0)='/dev/input/mouse#\x00', 0x1, 0x0) close(r0) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000080)='user]\x00', 0xfffffffffffffff8) pwrite64(r1, &(0x7f0000000140)="60d6071a3145dcdc8eb105c30ecf30bc9bee918e0ad994920683a645", 0x1c, 0x0) preadv(r1, &(0x7f0000000480), 0x100000000000015e, 0x0) 19:23:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ex%4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 274.790112] FAULT_INJECTION: forcing a failure. [ 274.790112] name failslab, interval 1, probability 0, space 0, times 0 [ 274.801444] CPU: 1 PID: 10489 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 274.809954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.819316] Call Trace: [ 274.821917] dump_stack+0x1c9/0x2b4 [ 274.825563] ? dump_stack_print_info.cold.2+0x52/0x52 [ 274.830768] ? graph_lock+0x170/0x170 [ 274.834594] should_fail.cold.4+0xa/0x11 [ 274.838765] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.843895] ? kernfs_activate+0x8e/0x2c0 [ 274.848528] ? graph_lock+0x170/0x170 [ 274.848549] ? lock_release+0x9f0/0x9f0 [ 274.856334] ? check_same_owner+0x340/0x340 [ 274.860681] ? find_held_lock+0x36/0x1c0 [ 274.864776] ? __lock_is_held+0xb5/0x140 [ 274.868989] ? check_same_owner+0x340/0x340 [ 274.873332] ? rcu_note_context_switch+0x680/0x680 [ 274.878285] __should_failslab+0x124/0x180 [ 274.882538] should_failslab+0x9/0x14 [ 274.886355] kmem_cache_alloc+0x29c/0x710 [ 274.890517] ? find_held_lock+0x36/0x1c0 [ 274.894596] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 274.899632] __kernfs_new_node+0x127/0x8d0 [ 274.903887] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 274.908656] ? kasan_check_write+0x14/0x20 [ 274.912903] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 274.917852] ? __kernfs_new_node+0x692/0x8d0 [ 274.922303] ? wait_for_completion+0x8d0/0x8d0 [ 274.926988] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 274.931756] ? graph_lock+0x170/0x170 [ 274.935568] ? kasan_check_write+0x14/0x20 [ 274.939820] ? __lock_is_held+0xb5/0x140 [ 274.943894] ? wait_for_completion+0x8d0/0x8d0 [ 274.948501] ? mutex_unlock+0xd/0x10 [ 274.952243] ? kernfs_activate+0x21a/0x2c0 [ 274.956509] kernfs_new_node+0x95/0x120 [ 274.960501] __kernfs_create_file+0x5a/0x340 [ 274.964927] sysfs_add_file_mode_ns+0x221/0x520 [ 274.969610] ? component_del+0x470/0x550 [ 274.973692] internal_create_group+0x3e1/0xd80 [ 274.978299] ? remove_files.isra.1+0x190/0x190 [ 274.982893] ? up_write+0x7b/0x220 [ 274.986451] ? up_read+0x110/0x110 [ 274.989999] ? down_read+0x1d0/0x1d0 [ 274.993741] sysfs_create_group+0x1f/0x30 [ 274.997899] lo_ioctl+0x1310/0x1d90 [ 275.001546] ? lo_rw_aio_complete+0x450/0x450 [ 275.006056] blkdev_ioctl+0x9cd/0x2030 [ 275.009961] ? blkpg_ioctl+0xc40/0xc40 [ 275.013864] ? kasan_check_read+0x11/0x20 [ 275.018028] ? rcu_is_watching+0x8c/0x150 [ 275.022190] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 275.026896] ? __fget+0x4d5/0x740 [ 275.030372] ? ksys_dup3+0x690/0x690 [ 275.034101] ? trace_hardirqs_on+0x2c0/0x2c0 [ 275.038529] ? kasan_check_write+0x14/0x20 [ 275.042787] block_ioctl+0xee/0x130 [ 275.046427] ? blkdev_fallocate+0x400/0x400 [ 275.050764] do_vfs_ioctl+0x1de/0x1720 [ 275.054658] ? kasan_check_read+0x11/0x20 [ 275.058818] ? rcu_is_watching+0x8c/0x150 [ 275.062981] ? trace_hardirqs_on+0xbd/0x2c0 [ 275.067317] ? ioctl_preallocate+0x300/0x300 [ 275.071739] ? __fget_light+0x2f7/0x440 [ 275.075732] ? putname+0xf2/0x130 [ 275.079213] ? fget_raw+0x20/0x20 [ 275.082682] ? rcu_read_lock_sched_held+0x108/0x120 [ 275.087724] ? kmem_cache_free+0x246/0x280 [ 275.091981] ? do_syscall_64+0x9a/0x820 [ 275.095967] ? do_syscall_64+0x9a/0x820 [ 275.099955] ? lockdep_hardirqs_on+0x421/0x5c0 [ 275.104554] ? security_file_ioctl+0x94/0xc0 [ 275.108977] ksys_ioctl+0xa9/0xd0 [ 275.112446] __x64_sys_ioctl+0x73/0xb0 [ 275.116352] do_syscall_64+0x1b9/0x820 [ 275.120255] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.125639] ? syscall_return_slowpath+0x5e0/0x5e0 [ 275.130589] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 275.135625] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 275.140655] ? recalc_sigpending_tsk+0x180/0x180 [ 275.145424] ? kasan_check_write+0x14/0x20 [ 275.149678] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.154554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.159752] RIP: 0033:0x456f07 [ 275.162956] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.181865] RSP: 002b:00007f458362fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 19:23:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext%\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000080)=r2) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:23:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x939d, &(0x7f0000000080)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f00000000c0)) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @pic={0x6, 0x3, 0x1c5, 0x1, 0x9, 0x80, 0x100000000, 0x1, 0x5, 0x4, 0x6, 0x3f, 0x800000000, 0x7, 0x6, 0x4}}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:23:51 executing program 3: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x8080) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) prctl$intptr(0x29, 0x202) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000200)={0xffffffff, 0x7, 0x9, 'queue0\x00', 0x2abb}) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000001000), &(0x7f0000000200)) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x3, &(0x7f00000000c0), 0x4) [ 275.189587] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000456f07 [ 275.196866] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 275.204142] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 275.211415] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 275.218690] R13: 0000000000000000 R14: 00000000004ca278 R15: 000000000000000c 19:23:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x1000000000}], 0x1, &(0x7f0000000000)={0x0, 0x989680}, &(0x7f0000000180), 0x182) 19:23:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext\a\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r3, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r5 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r5, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r5, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r4, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r4, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r4, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:23:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext\a\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:52 executing program 6 (fault-call:2 fault-nth:13): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:52 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000080)=0x40) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) set_tid_address(&(0x7f00000000c0)) 19:23:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578741100", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:52 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) ioctl$KVM_SMI(r1, 0xaeb7) 19:23:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578741100", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='extc\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 276.051231] FAULT_INJECTION: forcing a failure. [ 276.051231] name failslab, interval 1, probability 0, space 0, times 0 [ 276.062637] CPU: 0 PID: 10606 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 276.071137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.080506] Call Trace: [ 276.083112] dump_stack+0x1c9/0x2b4 [ 276.086762] ? dump_stack_print_info.cold.2+0x52/0x52 [ 276.091974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.097546] ? replace_slot+0x151/0x520 [ 276.101551] should_fail.cold.4+0xa/0x11 [ 276.105640] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.110767] ? rcu_note_context_switch+0x680/0x680 [ 276.115710] ? graph_lock+0x170/0x170 [ 276.119533] ? find_held_lock+0x36/0x1c0 [ 276.123620] ? __lock_is_held+0xb5/0x140 [ 276.127780] ? ib_mad_recv_done+0x3618/0x3690 [ 276.132313] ? check_same_owner+0x340/0x340 [ 276.136651] ? rcu_note_context_switch+0x680/0x680 [ 276.141603] __should_failslab+0x124/0x180 [ 276.145858] should_failslab+0x9/0x14 [ 276.149679] kmem_cache_alloc+0x29c/0x710 [ 276.153843] ? lock_downgrade+0x8f0/0x8f0 [ 276.158016] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 276.163057] __kernfs_new_node+0x127/0x8d0 [ 276.167314] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 276.172086] ? graph_lock+0x170/0x170 [ 276.175911] ? kasan_check_write+0x14/0x20 [ 276.180179] ? __lock_is_held+0xb5/0x140 [ 276.184279] ? wait_for_completion+0x8d0/0x8d0 [ 276.188891] ? mutex_unlock+0xd/0x10 [ 276.192629] ? kernfs_activate+0x21a/0x2c0 [ 276.196890] ? kernfs_walk_and_get_ns+0x340/0x340 [ 276.201768] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 276.207320] ? kernfs_link_sibling+0x1d2/0x3b0 [ 276.211941] kernfs_new_node+0x95/0x120 [ 276.215944] __kernfs_create_file+0x5a/0x340 [ 276.220378] sysfs_add_file_mode_ns+0x221/0x520 [ 276.225067] ? component_del+0x470/0x550 [ 276.229158] internal_create_group+0x3e1/0xd80 [ 276.233776] ? remove_files.isra.1+0x190/0x190 [ 276.238387] ? up_write+0x7b/0x220 [ 276.241948] ? up_read+0x110/0x110 [ 276.245500] ? down_read+0x1d0/0x1d0 [ 276.249256] sysfs_create_group+0x1f/0x30 [ 276.253416] lo_ioctl+0x1310/0x1d90 [ 276.257063] ? lo_rw_aio_complete+0x450/0x450 [ 276.261572] blkdev_ioctl+0x9cd/0x2030 [ 276.265473] ? blkpg_ioctl+0xc40/0xc40 [ 276.269378] ? kasan_check_read+0x11/0x20 [ 276.273538] ? rcu_is_watching+0x8c/0x150 [ 276.277702] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 276.282386] ? __fget+0x4d5/0x740 [ 276.285857] ? ksys_dup3+0x690/0x690 [ 276.289583] ? trace_hardirqs_on+0x2c0/0x2c0 [ 276.294006] ? kasan_check_write+0x14/0x20 [ 276.298265] block_ioctl+0xee/0x130 19:23:52 executing program 3: r0 = socket(0x1e, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000004b40)={'syz_tun\x00', 0x0}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x3, 0x2, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xb9, &(0x7f00000012c0)=""/185, 0x0, 0x0, [], r1}, 0x48) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000040)=0x5, &(0x7f0000000080)=0x2) bind$can_raw(r0, &(0x7f00000000c0), 0x10) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x8000, 0x0) 19:23:52 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x7) 19:23:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='extc\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 276.301904] ? blkdev_fallocate+0x400/0x400 [ 276.306250] do_vfs_ioctl+0x1de/0x1720 [ 276.310151] ? kasan_check_read+0x11/0x20 [ 276.314396] ? rcu_is_watching+0x8c/0x150 [ 276.318554] ? trace_hardirqs_on+0xbd/0x2c0 [ 276.322885] ? ioctl_preallocate+0x300/0x300 [ 276.327305] ? __fget_light+0x2f7/0x440 [ 276.331310] ? putname+0xf2/0x130 [ 276.334778] ? fget_raw+0x20/0x20 [ 276.338262] ? rcu_read_lock_sched_held+0x108/0x120 [ 276.343292] ? kmem_cache_free+0x246/0x280 [ 276.347633] ? do_syscall_64+0x9a/0x820 [ 276.351647] ? do_syscall_64+0x9a/0x820 [ 276.355636] ? lockdep_hardirqs_on+0x421/0x5c0 [ 276.360260] ? security_file_ioctl+0x94/0xc0 [ 276.364499] EXT4-fs: 24 callbacks suppressed [ 276.364511] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 276.364684] ksys_ioctl+0xa9/0xd0 [ 276.381371] __x64_sys_ioctl+0x73/0xb0 [ 276.385278] do_syscall_64+0x1b9/0x820 [ 276.389178] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 276.395060] ? syscall_return_slowpath+0x5e0/0x5e0 [ 276.400086] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 276.405115] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 276.410145] ? recalc_sigpending_tsk+0x180/0x180 [ 276.414939] ? kasan_check_write+0x14/0x20 [ 276.419188] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.424146] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.429441] RIP: 0033:0x456f07 [ 276.432640] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.451553] RSP: 002b:00007f45835eda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 276.459271] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000456f07 [ 276.466544] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 276.473833] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 276.481105] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 276.488384] R13: 0000000000000000 R14: 00000000004ca278 R15: 000000000000000d [ 276.515819] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:23:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:23:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:53 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4800}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, r2, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x0, 0x2, 0x5e}, @IPVS_SVC_ATTR_FLAGS={0x0, 0x7, {0x15, 0x20}}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3, 0x3c}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0xfffffcff}}, 0x4000) ppoll(&(0x7f0000000040)=[{r1}], 0x2000000000000388, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f00000001c0)) 19:23:53 executing program 6 (fault-call:2 fault-nth:14): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext-\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 276.596924] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:23:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext-\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 276.773188] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 276.785769] FAULT_INJECTION: forcing a failure. [ 276.785769] name failslab, interval 1, probability 0, space 0, times 0 [ 276.797096] CPU: 0 PID: 10657 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 276.805686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.815047] Call Trace: [ 276.817682] dump_stack+0x1c9/0x2b4 19:23:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 276.821337] ? dump_stack_print_info.cold.2+0x52/0x52 [ 276.826548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.832102] ? replace_slot+0x151/0x520 [ 276.836107] should_fail.cold.4+0xa/0x11 [ 276.840190] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.845343] ? rcu_note_context_switch+0x680/0x680 [ 276.850292] ? graph_lock+0x170/0x170 [ 276.854124] ? find_held_lock+0x36/0x1c0 [ 276.858235] ? __lock_is_held+0xb5/0x140 [ 276.862336] ? check_same_owner+0x340/0x340 [ 276.866683] ? rcu_note_context_switch+0x680/0x680 [ 276.871640] __should_failslab+0x124/0x180 [ 276.875907] should_failslab+0x9/0x14 [ 276.879729] kmem_cache_alloc+0x29c/0x710 [ 276.883896] ? lock_downgrade+0x8f0/0x8f0 [ 276.888068] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 276.893108] __kernfs_new_node+0x127/0x8d0 [ 276.897371] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 276.902146] ? graph_lock+0x170/0x170 [ 276.905967] ? kasan_check_write+0x14/0x20 [ 276.910244] ? __lock_is_held+0xb5/0x140 [ 276.914324] ? wait_for_completion+0x8d0/0x8d0 [ 276.918935] ? mutex_unlock+0xd/0x10 [ 276.922665] ? kernfs_activate+0x21a/0x2c0 [ 276.926924] ? kernfs_walk_and_get_ns+0x340/0x340 [ 276.931785] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 276.937337] ? kernfs_link_sibling+0x1d2/0x3b0 [ 276.941941] kernfs_new_node+0x95/0x120 [ 276.945969] __kernfs_create_file+0x5a/0x340 [ 276.950398] sysfs_add_file_mode_ns+0x221/0x520 [ 276.955082] ? component_del+0x470/0x550 [ 276.959158] internal_create_group+0x3e1/0xd80 [ 276.963773] ? remove_files.isra.1+0x190/0x190 [ 276.968366] ? up_write+0x7b/0x220 [ 276.971920] ? up_read+0x110/0x110 [ 276.975469] ? down_read+0x1d0/0x1d0 [ 276.979221] sysfs_create_group+0x1f/0x30 [ 276.983383] lo_ioctl+0x1310/0x1d90 [ 276.987028] ? lo_rw_aio_complete+0x450/0x450 [ 276.991537] blkdev_ioctl+0x9cd/0x2030 [ 276.995438] ? blkpg_ioctl+0xc40/0xc40 [ 276.999341] ? kasan_check_read+0x11/0x20 [ 277.003495] ? rcu_is_watching+0x8c/0x150 [ 277.007651] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 277.012345] ? __fget+0x4d5/0x740 [ 277.015817] ? ksys_dup3+0x690/0x690 [ 277.019538] ? trace_hardirqs_on+0x2c0/0x2c0 [ 277.023960] ? kasan_check_write+0x14/0x20 [ 277.028245] block_ioctl+0xee/0x130 [ 277.031888] ? blkdev_fallocate+0x400/0x400 [ 277.036235] do_vfs_ioctl+0x1de/0x1720 [ 277.040132] ? kasan_check_read+0x11/0x20 [ 277.044290] ? rcu_is_watching+0x8c/0x150 [ 277.048477] ? trace_hardirqs_on+0xbd/0x2c0 [ 277.052816] ? ioctl_preallocate+0x300/0x300 [ 277.057245] ? __fget_light+0x2f7/0x440 [ 277.061241] ? putname+0xf2/0x130 [ 277.064707] ? fget_raw+0x20/0x20 [ 277.068174] ? rcu_read_lock_sched_held+0x108/0x120 [ 277.073228] ? kmem_cache_free+0x246/0x280 [ 277.077480] ? do_syscall_64+0x9a/0x820 [ 277.081462] ? do_syscall_64+0x9a/0x820 [ 277.085444] ? lockdep_hardirqs_on+0x421/0x5c0 [ 277.090037] ? security_file_ioctl+0x94/0xc0 [ 277.094461] ksys_ioctl+0xa9/0xd0 [ 277.097932] __x64_sys_ioctl+0x73/0xb0 [ 277.101862] do_syscall_64+0x1b9/0x820 [ 277.105763] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 277.111167] ? syscall_return_slowpath+0x5e0/0x5e0 [ 277.116117] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.120970] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 277.125997] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 277.131023] ? prepare_exit_to_usermode+0x291/0x3b0 [ 277.136053] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.140914] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.146110] RIP: 0033:0x456f07 [ 277.149312] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:23:53 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") timer_create(0x4, &(0x7f0000000000)={0x0, 0x3b, 0x3, @thr={&(0x7f00000001c0)="cca0be231de3b623d449a86b4cbaaf084ec4041c79ac88afd603e73c7dd3faa7b690a56df9fc598f24c4a696008e1c83b81a38547f46fa3de549bd2256d4fdbab412d5e7065020232ce78c242fbc6ce3ca100f94a229cd745b22e4e32ebcb260ea8399f9279d7aaba4665397204f61aa44985659b703ada1391ca46c78de9cd3b86e5717", &(0x7f0000000080)="afafdf49b088ad2cb7d221497d98a46cec8526d3a9557a867876c13ab8cfdfe6a6ac75c5da0ac797cacfe002b331bc28540a630b38b43ac0937b6a60aa27939453e0b7dc0c95f3de46d5df"}}, &(0x7f00000002c0)=0x0) timer_settime(r1, 0x1, &(0x7f0000000300)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f0000000340)) r2 = memfd_create(&(0x7f0000000380)='^\x00', 0x3) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000003c0)={@local, 0x2, 0x7, 0x0, 0x6, 0x5, 0xd09, 0x41}, &(0x7f0000000400)=0x20) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) r5 = fcntl$getown(r2, 0x9) setpgid(r4, r5) ppoll(&(0x7f0000000040)=[{r3}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) [ 277.168238] RSP: 002b:00007f458362fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 277.175962] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000456f07 [ 277.183242] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 277.190517] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 277.197793] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 277.205192] R13: 0000000000000000 R14: 00000000004ca278 R15: 000000000000000e 19:23:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 277.236503] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 277.256820] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 277.272577] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 277.312787] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:23:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext\n\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:54 executing program 6 (fault-call:2 fault-nth:15): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext\n\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:54 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000100)={0x100}, 0x1) exit(0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, &(0x7f0000000180)=0xc) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f00000000c0)) sendfile(r0, r0, &(0x7f0000000080), 0x1) 19:23:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:54 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@generic={0x1, 0x7fffffff, 0x8001}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) [ 277.559924] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 277.591237] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 277.604461] FAULT_INJECTION: forcing a failure. [ 277.604461] name failslab, interval 1, probability 0, space 0, times 0 [ 277.615799] CPU: 1 PID: 10700 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 277.624304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.633756] Call Trace: [ 277.636359] dump_stack+0x1c9/0x2b4 [ 277.640010] ? dump_stack_print_info.cold.2+0x52/0x52 [ 277.645235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.650792] ? replace_slot+0x151/0x520 [ 277.654796] should_fail.cold.4+0xa/0x11 [ 277.658884] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.664014] ? rcu_note_context_switch+0x680/0x680 [ 277.668964] ? graph_lock+0x170/0x170 [ 277.672792] ? find_held_lock+0x36/0x1c0 [ 277.676879] ? __lock_is_held+0xb5/0x140 [ 277.680974] ? check_same_owner+0x340/0x340 [ 277.685320] ? rcu_note_context_switch+0x680/0x680 [ 277.690273] __should_failslab+0x124/0x180 [ 277.694532] should_failslab+0x9/0x14 [ 277.698348] kmem_cache_alloc+0x29c/0x710 [ 277.702527] ? lock_downgrade+0x8f0/0x8f0 [ 277.706705] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 277.711760] __kernfs_new_node+0x127/0x8d0 [ 277.716020] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 277.720796] ? graph_lock+0x170/0x170 [ 277.724616] ? kasan_check_write+0x14/0x20 [ 277.728872] ? __lock_is_held+0xb5/0x140 [ 277.732954] ? wait_for_completion+0x8d0/0x8d0 [ 277.737564] ? mutex_unlock+0xd/0x10 [ 277.741303] ? kernfs_activate+0x21a/0x2c0 [ 277.745560] ? kernfs_walk_and_get_ns+0x340/0x340 [ 277.750423] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 277.755977] ? kernfs_link_sibling+0x1d2/0x3b0 [ 277.760584] kernfs_new_node+0x95/0x120 [ 277.764587] __kernfs_create_file+0x5a/0x340 [ 277.769029] sysfs_add_file_mode_ns+0x221/0x520 [ 277.773809] ? component_del+0x470/0x550 [ 277.777894] internal_create_group+0x3e1/0xd80 [ 277.782518] ? remove_files.isra.1+0x190/0x190 [ 277.782537] ? up_write+0x7b/0x220 [ 277.782558] ? up_read+0x110/0x110 [ 277.782574] ? down_read+0x1d0/0x1d0 [ 277.782607] sysfs_create_group+0x1f/0x30 [ 277.782629] lo_ioctl+0x1310/0x1d90 [ 277.782656] ? lo_rw_aio_complete+0x450/0x450 [ 277.782679] blkdev_ioctl+0x9cd/0x2030 [ 277.782700] ? blkpg_ioctl+0xc40/0xc40 [ 277.782732] ? kasan_check_read+0x11/0x20 [ 277.782753] ? rcu_is_watching+0x8c/0x150 [ 277.826387] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 277.831077] ? __fget+0x4d5/0x740 [ 277.834555] ? ksys_dup3+0x690/0x690 [ 277.838283] ? trace_hardirqs_on+0x2c0/0x2c0 [ 277.842709] ? kasan_check_write+0x14/0x20 [ 277.846971] block_ioctl+0xee/0x130 [ 277.850611] ? blkdev_fallocate+0x400/0x400 [ 277.854947] do_vfs_ioctl+0x1de/0x1720 [ 277.858846] ? kasan_check_read+0x11/0x20 [ 277.863010] ? rcu_is_watching+0x8c/0x150 [ 277.867175] ? trace_hardirqs_on+0xbd/0x2c0 [ 277.871527] ? ioctl_preallocate+0x300/0x300 [ 277.875949] ? __fget_light+0x2f7/0x440 [ 277.879937] ? putname+0xf2/0x130 [ 277.883405] ? fget_raw+0x20/0x20 [ 277.886873] ? rcu_read_lock_sched_held+0x108/0x120 [ 277.891903] ? kmem_cache_free+0x246/0x280 [ 277.896149] ? do_syscall_64+0x9a/0x820 [ 277.900134] ? do_syscall_64+0x9a/0x820 [ 277.904121] ? lockdep_hardirqs_on+0x421/0x5c0 [ 277.908722] ? security_file_ioctl+0x94/0xc0 [ 277.913147] ksys_ioctl+0xa9/0xd0 [ 277.916616] __x64_sys_ioctl+0x73/0xb0 [ 277.920520] do_syscall_64+0x1b9/0x820 [ 277.924419] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 277.929797] ? syscall_return_slowpath+0x5e0/0x5e0 [ 277.934751] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 277.939781] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 277.944803] ? recalc_sigpending_tsk+0x180/0x180 [ 277.949570] ? kasan_check_write+0x14/0x20 [ 277.953820] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.958679] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.963882] RIP: 0033:0x456f07 [ 277.967085] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.985998] RSP: 002b:00007f458362fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 277.993724] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000456f07 [ 278.001001] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 19:23:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r3, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r5 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r5, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r5, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r4, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r4, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r4, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:23:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 278.008276] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 278.015550] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 278.022823] R13: 0000000000000000 R14: 00000000004ca278 R15: 000000000000000f 19:23:54 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:23:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:54 executing program 3: socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd010000000000200a0501000800010004f2511a10df00", 0x1f) 19:23:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:54 executing program 6 (fault-call:2 fault-nth:16): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext%\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 278.277504] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 278.333431] FAULT_INJECTION: forcing a failure. [ 278.333431] name failslab, interval 1, probability 0, space 0, times 0 [ 278.344820] CPU: 0 PID: 10756 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 278.353327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.362687] Call Trace: [ 278.365292] dump_stack+0x1c9/0x2b4 [ 278.368936] ? dump_stack_print_info.cold.2+0x52/0x52 [ 278.374140] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.379690] ? replace_slot+0x151/0x520 [ 278.383692] should_fail.cold.4+0xa/0x11 [ 278.387774] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 278.392907] ? rcu_note_context_switch+0x680/0x680 [ 278.398373] ? graph_lock+0x170/0x170 [ 278.402193] ? find_held_lock+0x36/0x1c0 [ 278.406289] ? __lock_is_held+0xb5/0x140 [ 278.410383] ? check_same_owner+0x340/0x340 [ 278.414721] ? rcu_note_context_switch+0x680/0x680 [ 278.419675] __should_failslab+0x124/0x180 [ 278.423927] should_failslab+0x9/0x14 [ 278.427741] kmem_cache_alloc+0x29c/0x710 [ 278.431936] ? lock_downgrade+0x8f0/0x8f0 [ 278.436100] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 278.441133] __kernfs_new_node+0x127/0x8d0 [ 278.445387] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 278.450153] ? graph_lock+0x170/0x170 [ 278.453969] ? kasan_check_write+0x14/0x20 [ 278.458238] ? __lock_is_held+0xb5/0x140 [ 278.462310] ? wait_for_completion+0x8d0/0x8d0 [ 278.466938] ? mutex_unlock+0xd/0x10 [ 278.470668] ? kernfs_activate+0x21a/0x2c0 [ 278.474923] ? kernfs_walk_and_get_ns+0x340/0x340 [ 278.479784] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 278.485334] ? kernfs_link_sibling+0x1d2/0x3b0 [ 278.489940] kernfs_new_node+0x95/0x120 [ 278.493939] __kernfs_create_file+0x5a/0x340 [ 278.498365] sysfs_add_file_mode_ns+0x221/0x520 [ 278.503932] ? component_del+0x470/0x550 [ 278.508010] internal_create_group+0x3e1/0xd80 [ 278.512618] ? remove_files.isra.1+0x190/0x190 [ 278.517225] ? up_write+0x7b/0x220 [ 278.520774] ? up_read+0x110/0x110 [ 278.524337] ? down_read+0x1d0/0x1d0 [ 278.528298] sysfs_create_group+0x1f/0x30 [ 278.532460] lo_ioctl+0x1310/0x1d90 [ 278.536108] ? lo_rw_aio_complete+0x450/0x450 [ 278.540618] blkdev_ioctl+0x9cd/0x2030 [ 278.544515] ? blkpg_ioctl+0xc40/0xc40 [ 278.548422] ? kasan_check_read+0x11/0x20 [ 278.552577] ? rcu_is_watching+0x8c/0x150 [ 278.556732] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 278.561425] ? __fget+0x4d5/0x740 [ 278.564895] ? ksys_dup3+0x690/0x690 [ 278.568615] ? trace_hardirqs_on+0x2c0/0x2c0 [ 278.573033] ? kasan_check_write+0x14/0x20 [ 278.577295] block_ioctl+0xee/0x130 [ 278.580931] ? blkdev_fallocate+0x400/0x400 [ 278.585265] do_vfs_ioctl+0x1de/0x1720 [ 278.589156] ? kasan_check_read+0x11/0x20 [ 278.593312] ? rcu_is_watching+0x8c/0x150 [ 278.597467] ? trace_hardirqs_on+0xbd/0x2c0 [ 278.601799] ? ioctl_preallocate+0x300/0x300 [ 278.606233] ? __fget_light+0x2f7/0x440 [ 278.610229] ? putname+0xf2/0x130 [ 278.613696] ? fget_raw+0x20/0x20 [ 278.617161] ? rcu_read_lock_sched_held+0x108/0x120 [ 278.622185] ? kmem_cache_free+0x246/0x280 [ 278.626450] ? do_syscall_64+0x9a/0x820 [ 278.630430] ? do_syscall_64+0x9a/0x820 [ 278.634425] ? lockdep_hardirqs_on+0x421/0x5c0 [ 278.639021] ? security_file_ioctl+0x94/0xc0 [ 278.643444] ksys_ioctl+0xa9/0xd0 [ 278.646916] __x64_sys_ioctl+0x73/0xb0 [ 278.650830] do_syscall_64+0x1b9/0x820 [ 278.654730] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 278.660106] ? syscall_return_slowpath+0x5e0/0x5e0 [ 278.665044] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 278.670068] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 278.675103] ? recalc_sigpending_tsk+0x180/0x180 [ 278.679885] ? kasan_check_write+0x14/0x20 [ 278.684141] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.689004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.694217] RIP: 0033:0x456f07 [ 278.697424] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.716329] RSP: 002b:00007f458362fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 278.724046] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000456f07 [ 278.731317] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 278.738590] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 278.745871] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 278.753146] R13: 0000000000000000 R14: 00000000004ca278 R15: 0000000000000010 19:23:55 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7f, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000080)=""/121) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x400, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:23:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:23:55 executing program 6 (fault-call:2 fault-nth:17): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4H', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 278.993103] FAULT_INJECTION: forcing a failure. [ 278.993103] name failslab, interval 1, probability 0, space 0, times 0 [ 279.004478] CPU: 1 PID: 10789 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 279.012980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.022348] Call Trace: [ 279.024956] dump_stack+0x1c9/0x2b4 [ 279.028610] ? dump_stack_print_info.cold.2+0x52/0x52 [ 279.031036] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 279.033834] should_fail.cold.4+0xa/0x11 [ 279.033862] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.033883] ? __lock_is_held+0xb5/0x140 [ 279.033905] ? wait_for_completion+0x8d0/0x8d0 [ 279.060086] ? graph_lock+0x170/0x170 [ 279.063897] ? mutex_unlock+0xd/0x10 [ 279.067626] ? find_held_lock+0x36/0x1c0 [ 279.071702] ? __lock_is_held+0xb5/0x140 [ 279.075800] ? check_same_owner+0x340/0x340 [ 279.080140] ? rcu_note_context_switch+0x680/0x680 [ 279.085084] ? sysfs_add_file_mode_ns+0x245/0x520 [ 279.089943] __should_failslab+0x124/0x180 [ 279.094194] should_failslab+0x9/0x14 [ 279.098015] kmem_cache_alloc_trace+0x2b5/0x730 [ 279.102710] ? device_create_file+0x1e0/0x1e0 [ 279.107235] kobject_uevent_env+0x20f/0x1110 [ 279.111675] kobject_uevent+0x1f/0x30 [ 279.115501] lo_ioctl+0x138e/0x1d90 [ 279.119153] ? lo_rw_aio_complete+0x450/0x450 [ 279.123664] blkdev_ioctl+0x9cd/0x2030 [ 279.127567] ? blkpg_ioctl+0xc40/0xc40 [ 279.131476] ? kasan_check_read+0x11/0x20 [ 279.135635] ? rcu_is_watching+0x8c/0x150 [ 279.139798] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 279.144484] ? __fget+0x4d5/0x740 [ 279.147957] ? ksys_dup3+0x690/0x690 [ 279.151686] ? trace_hardirqs_on+0x2c0/0x2c0 [ 279.156114] ? kasan_check_write+0x14/0x20 [ 279.160369] block_ioctl+0xee/0x130 [ 279.164014] ? blkdev_fallocate+0x400/0x400 [ 279.168349] do_vfs_ioctl+0x1de/0x1720 [ 279.172246] ? kasan_check_read+0x11/0x20 [ 279.176402] ? rcu_is_watching+0x8c/0x150 [ 279.180558] ? trace_hardirqs_on+0xbd/0x2c0 [ 279.184896] ? ioctl_preallocate+0x300/0x300 [ 279.189322] ? __fget_light+0x2f7/0x440 [ 279.193311] ? putname+0xf2/0x130 [ 279.196777] ? fget_raw+0x20/0x20 [ 279.200252] ? rcu_read_lock_sched_held+0x108/0x120 [ 279.205279] ? kmem_cache_free+0x246/0x280 [ 279.209529] ? do_syscall_64+0x9a/0x820 [ 279.213518] ? do_syscall_64+0x9a/0x820 [ 279.217506] ? lockdep_hardirqs_on+0x421/0x5c0 [ 279.222103] ? security_file_ioctl+0x94/0xc0 [ 279.226529] ksys_ioctl+0xa9/0xd0 [ 279.229998] __x64_sys_ioctl+0x73/0xb0 [ 279.233898] do_syscall_64+0x1b9/0x820 [ 279.237807] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 279.243190] ? syscall_return_slowpath+0x5e0/0x5e0 [ 279.248147] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 279.253174] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 279.258220] ? recalc_sigpending_tsk+0x180/0x180 [ 279.262994] ? kasan_check_write+0x14/0x20 [ 279.267256] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.272121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.277323] RIP: 0033:0x456f07 19:23:55 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) sendto$inet(r1, &(0x7f0000000080)="ef6ea59b08ac682d6e5945c7c7f4cc1f605d98d14ba82999903c", 0x1a, 0x20000000, 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast1}, 0x10) init_module(&(0x7f00000000c0)='/dev/sequencer\x00', 0xf, &(0x7f00000001c0)='\x00') ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000200)) 19:23:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:55 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f0000000000)={0x7, 0x79, 0x1}, 0x7) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:23:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 279.280522] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.299432] RSP: 002b:00007f458362fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 279.307160] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000456f07 [ 279.314439] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 279.321725] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 279.329005] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 279.336284] R13: 0000000000000000 R14: 00000000004ca278 R15: 0000000000000011 19:23:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:56 executing program 3: r0 = memfd_create(&(0x7f0000000000)='/dev/ion\x00', 0x1) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_bridge\x00', @ifru_settings={0xfffffffffffffffd, 0x5, @sync=&(0x7f0000000040)={0xb2f, 0x8000, 0x4}}}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='veth0_to_bridge\x00', r0}, 0x10) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000005ff7)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184908, &(0x7f0000009fe8)) 19:23:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743403", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4z', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:56 executing program 6 (fault-call:2 fault-nth:18): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:56 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd25d766070ab99e905094e1167509c6a44ecc1500ad90e67244a597227465be84d90a9324c61d90aa3b7f1bacf5f7d") r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x100000001, 0x40) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000080), 0x4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) [ 279.565504] ion_ioctl: ioctl validate failed 19:23:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 279.604270] FAULT_INJECTION: forcing a failure. [ 279.604270] name failslab, interval 1, probability 0, space 0, times 0 [ 279.615672] CPU: 0 PID: 10839 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 279.624178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.633552] Call Trace: [ 279.636155] dump_stack+0x1c9/0x2b4 [ 279.639806] ? dump_stack_print_info.cold.2+0x52/0x52 [ 279.645039] ? is_bpf_text_address+0xd7/0x170 [ 279.649566] should_fail.cold.4+0xa/0x11 [ 279.653741] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.658879] ? save_stack+0xa9/0xd0 [ 279.662526] ? graph_lock+0x170/0x170 [ 279.666346] ? kasan_kmalloc+0xc4/0xe0 [ 279.670342] ? kmem_cache_alloc_trace+0x152/0x730 [ 279.675195] ? kobject_uevent_env+0x20f/0x1110 [ 279.679811] ? kobject_uevent+0x1f/0x30 [ 279.683806] ? lo_ioctl+0x138e/0x1d90 [ 279.687622] ? find_held_lock+0x36/0x1c0 [ 279.691704] ? __lock_is_held+0xb5/0x140 [ 279.695802] ? check_same_owner+0x340/0x340 [ 279.700144] ? kmem_cache_alloc_trace+0x275/0x730 [ 279.705002] ? rcu_note_context_switch+0x680/0x680 [ 279.709959] __should_failslab+0x124/0x180 [ 279.714250] should_failslab+0x9/0x14 [ 279.718071] __kmalloc+0x2b2/0x720 [ 279.721631] ? kobject_uevent_env+0x20f/0x1110 [ 279.726249] ? rcu_read_lock_sched_held+0x108/0x120 [ 279.731282] ? kobject_get_path+0xc2/0x1a0 [ 279.735546] kobject_get_path+0xc2/0x1a0 [ 279.739646] kobject_uevent_env+0x234/0x1110 [ 279.744083] kobject_uevent+0x1f/0x30 [ 279.747905] lo_ioctl+0x138e/0x1d90 [ 279.751561] ? lo_rw_aio_complete+0x450/0x450 [ 279.756076] blkdev_ioctl+0x9cd/0x2030 [ 279.759990] ? blkpg_ioctl+0xc40/0xc40 [ 279.763909] ? kasan_check_read+0x11/0x20 [ 279.768087] ? rcu_is_watching+0x8c/0x150 [ 279.772265] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 279.776970] ? __fget+0x4d5/0x740 [ 279.780460] ? ksys_dup3+0x690/0x690 [ 279.784192] ? trace_hardirqs_on+0x2c0/0x2c0 [ 279.788643] ? kasan_check_write+0x14/0x20 [ 279.792907] block_ioctl+0xee/0x130 [ 279.796550] ? blkdev_fallocate+0x400/0x400 [ 279.800884] do_vfs_ioctl+0x1de/0x1720 [ 279.804783] ? kasan_check_read+0x11/0x20 [ 279.808946] ? rcu_is_watching+0x8c/0x150 [ 279.813103] ? trace_hardirqs_on+0xbd/0x2c0 [ 279.817446] ? ioctl_preallocate+0x300/0x300 [ 279.821870] ? __fget_light+0x2f7/0x440 [ 279.825855] ? putname+0xf2/0x130 [ 279.829326] ? fget_raw+0x20/0x20 [ 279.832796] ? rcu_read_lock_sched_held+0x108/0x120 [ 279.837827] ? kmem_cache_free+0x246/0x280 [ 279.842080] ? do_syscall_64+0x9a/0x820 [ 279.846067] ? do_syscall_64+0x9a/0x820 [ 279.850059] ? lockdep_hardirqs_on+0x421/0x5c0 [ 279.854657] ? security_file_ioctl+0x94/0xc0 [ 279.859088] ksys_ioctl+0xa9/0xd0 [ 279.862556] __x64_sys_ioctl+0x73/0xb0 [ 279.866454] do_syscall_64+0x1b9/0x820 [ 279.870357] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 279.875733] ? syscall_return_slowpath+0x5e0/0x5e0 [ 279.880935] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 279.885970] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 279.890997] ? recalc_sigpending_tsk+0x180/0x180 [ 279.895773] ? kasan_check_write+0x14/0x20 [ 279.900011] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.904849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.910040] RIP: 0033:0x456f07 [ 279.913240] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.932266] RSP: 002b:00007f458362fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 279.939968] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000456f07 [ 279.947237] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 279.954491] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 279.961756] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 279.969017] R13: 0000000000000000 R14: 00000000004ca278 R15: 0000000000000012 19:23:56 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x102d}, 0x48) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x5, 0x4, "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", 0xcb, 0x2, 0x10001, 0x5, 0x2, 0xffffffffffffffff, 0x3, 0x1}, r1}}, 0x120) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffc5, 0x0, 0x2}, [@ldst={0x7, 0x18d1fb, 0x0, 0x0, 0x1ab021}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195}, 0x48) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x200200, 0x0) 19:23:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:56 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3a2, 0x2) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000080)=0x3) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) ftruncate(r0, 0x2) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) 19:23:56 executing program 6 (fault-call:2 fault-nth:19): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:56 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x20000400) r0 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r3, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r5 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r5, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r5, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r4, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r4, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r4, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r0, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:23:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:56 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000000)=""/116, &(0x7f0000000180)=0x74) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x1}, {r1, 0x80}, {r0, 0x41}, {r0, 0x180}], 0x21cb, &(0x7f0000000140), &(0x7f00000000c0)={0x100000000000000}, 0x351) [ 280.236840] FAULT_INJECTION: forcing a failure. [ 280.236840] name failslab, interval 1, probability 0, space 0, times 0 [ 280.248240] CPU: 0 PID: 10890 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 280.256738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.266121] Call Trace: [ 280.266146] dump_stack+0x1c9/0x2b4 [ 280.266169] ? dump_stack_print_info.cold.2+0x52/0x52 [ 280.277566] ? is_bpf_text_address+0xd7/0x170 [ 280.282095] should_fail.cold.4+0xa/0x11 [ 280.286185] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.291342] ? save_stack+0xa9/0xd0 [ 280.294987] ? graph_lock+0x170/0x170 [ 280.298808] ? kasan_kmalloc+0xc4/0xe0 [ 280.302713] ? kmem_cache_alloc_trace+0x152/0x730 [ 280.307605] ? kobject_uevent_env+0x20f/0x1110 [ 280.312224] ? kobject_uevent+0x1f/0x30 [ 280.316233] ? lo_ioctl+0x138e/0x1d90 [ 280.320057] ? find_held_lock+0x36/0x1c0 [ 280.324141] ? __lock_is_held+0xb5/0x140 [ 280.328250] ? check_same_owner+0x340/0x340 [ 280.332592] ? kmem_cache_alloc_trace+0x275/0x730 19:23:57 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0xa52}}, 0x10) 19:23:57 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x10) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f0000000340)=""/4096, 0x1000}, &(0x7f00000001c0), 0x20}, 0x20) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x18) r4 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x2, 0x40) poll(&(0x7f0000000280)=[{r2, 0x4001}, {r3, 0x4}, {r2, 0x2000}, {r4, 0x40}], 0x4, 0x0) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000180)=0x8, 0x6344) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r3, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) sendto$inet6(r3, &(0x7f0000000440), 0xfffffffffffffd66, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) 19:23:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 280.337462] ? rcu_note_context_switch+0x680/0x680 [ 280.342412] __should_failslab+0x124/0x180 [ 280.346667] should_failslab+0x9/0x14 [ 280.350476] __kmalloc+0x2b2/0x720 [ 280.354030] ? kobject_uevent_env+0x20f/0x1110 [ 280.358627] ? rcu_read_lock_sched_held+0x108/0x120 [ 280.363657] ? kobject_get_path+0xc2/0x1a0 [ 280.367904] kobject_get_path+0xc2/0x1a0 [ 280.371982] kobject_uevent_env+0x234/0x1110 [ 280.376413] kobject_uevent+0x1f/0x30 [ 280.380248] lo_ioctl+0x138e/0x1d90 [ 280.383893] ? lo_rw_aio_complete+0x450/0x450 [ 280.388407] blkdev_ioctl+0x9cd/0x2030 [ 280.392311] ? blkpg_ioctl+0xc40/0xc40 [ 280.396721] ? kasan_check_read+0x11/0x20 [ 280.400885] ? rcu_is_watching+0x8c/0x150 [ 280.405055] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 280.409750] ? __fget+0x4d5/0x740 [ 280.413242] ? ksys_dup3+0x690/0x690 [ 280.416964] ? trace_hardirqs_on+0x2c0/0x2c0 [ 280.421387] ? kasan_check_write+0x14/0x20 [ 280.425654] block_ioctl+0xee/0x130 [ 280.429302] ? blkdev_fallocate+0x400/0x400 [ 280.433636] do_vfs_ioctl+0x1de/0x1720 [ 280.437538] ? kasan_check_read+0x11/0x20 [ 280.441696] ? rcu_is_watching+0x8c/0x150 [ 280.445854] ? trace_hardirqs_on+0xbd/0x2c0 [ 280.450192] ? ioctl_preallocate+0x300/0x300 [ 280.454628] ? __fget_light+0x2f7/0x440 [ 280.458610] ? putname+0xf2/0x130 [ 280.462078] ? fget_raw+0x20/0x20 [ 280.465548] ? rcu_read_lock_sched_held+0x108/0x120 [ 280.470579] ? kmem_cache_free+0x246/0x280 [ 280.474830] ? do_syscall_64+0x9a/0x820 [ 280.478811] ? do_syscall_64+0x9a/0x820 [ 280.482803] ? lockdep_hardirqs_on+0x421/0x5c0 [ 280.487401] ? security_file_ioctl+0x94/0xc0 [ 280.491827] ksys_ioctl+0xa9/0xd0 [ 280.495298] __x64_sys_ioctl+0x73/0xb0 [ 280.499220] do_syscall_64+0x1b9/0x820 [ 280.504039] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 280.509425] ? syscall_return_slowpath+0x5e0/0x5e0 [ 280.514384] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 280.519416] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 280.524441] ? recalc_sigpending_tsk+0x180/0x180 [ 280.529470] ? kasan_check_write+0x14/0x20 [ 280.533722] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.538585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.543786] RIP: 0033:0x456f07 [ 280.546992] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.565903] RSP: 002b:00007f458362fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 280.573623] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000456f07 [ 280.580900] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 19:23:57 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000000)=[0x7, 0xb884]) [ 280.588174] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 280.595466] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 280.602742] R13: 0000000000000000 R14: 00000000004ca278 R15: 0000000000000013 19:23:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:57 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) accept(r0, 0x0, &(0x7f0000000000)) r2 = accept4(r1, 0x0, &(0x7f0000000200), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000300), 0x0) sendmmsg(r2, &(0x7f000000c8c0)=[{{&(0x7f0000006b00)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000009d00), 0x0, &(0x7f0000009d80)}}, {{&(0x7f000000b1c0)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f000000c840)}}], 0x2, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x400040) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000240)) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000a40)={"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"}) splice(r3, &(0x7f0000000180), r3, &(0x7f00000001c0), 0xffffffff, 0x1) 19:23:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:57 executing program 6 (fault-call:2 fault-nth:20): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:57 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101000, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000080)=0x1) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000002c0)=""/180) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f00000001c0)) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:23:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:57 executing program 3: r0 = socket$inet6(0xa, 0x7, 0x9) ioctl(r0, 0x80008912, &(0x7f00000000c0)="153f623448000000006070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xe8) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004551a, &(0x7f0000000040)) 19:23:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:57 executing program 1 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:57 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r0 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r3, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r5 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r5, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r5, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r4, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r4, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r4, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r0, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) [ 281.092167] Unknown ioctl 4701 [ 281.114317] Unknown ioctl -2143271647 [ 281.116994] FAULT_INJECTION: forcing a failure. [ 281.116994] name failslab, interval 1, probability 0, space 0, times 0 [ 281.129475] CPU: 1 PID: 10983 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 281.137979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.147337] Call Trace: [ 281.149941] dump_stack+0x1c9/0x2b4 [ 281.152287] Unknown ioctl -1068978587 [ 281.153590] ? dump_stack_print_info.cold.2+0x52/0x52 19:23:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 281.153609] ? mark_held_locks+0x160/0x160 [ 281.153640] should_fail.cold.4+0xa/0x11 [ 281.153665] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.176046] ? graph_lock+0x170/0x170 [ 281.176063] ? graph_lock+0x170/0x170 [ 281.180413] Unknown ioctl 4701 [ 281.183664] ? find_held_lock+0x36/0x1c0 [ 281.183701] ? check_same_owner+0x340/0x340 [ 281.183731] ? rcu_note_context_switch+0x680/0x680 [ 281.200314] __should_failslab+0x124/0x180 [ 281.204564] should_failslab+0x9/0x14 [ 281.208377] __kmalloc+0x2b2/0x720 [ 281.211930] ? rcu_is_watching+0x8c/0x150 [ 281.216088] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 281.220773] ? rw_copy_check_uvector+0x361/0x3e0 [ 281.225547] rw_copy_check_uvector+0x361/0x3e0 [ 281.227102] Unknown ioctl -1068978587 [ 281.230237] import_iovec+0xcf/0x470 [ 281.230257] ? dup_iter+0x270/0x270 [ 281.241390] ? proc_cwd_link+0x1d0/0x1d0 [ 281.245477] vfs_readv+0xf5/0x1c0 [ 281.248951] ? compat_rw_copy_check_uvector+0x440/0x440 [ 281.254335] ? __fget_light+0x2f7/0x440 [ 281.258322] ? fget_raw+0x20/0x20 [ 281.261801] ? __sb_end_write+0xac/0xe0 [ 281.263898] FAULT_INJECTION: forcing a failure. [ 281.263898] name failslab, interval 1, probability 0, space 0, times 0 [ 281.265793] do_preadv+0x1cc/0x280 [ 281.265814] ? do_readv+0x310/0x310 [ 281.265830] ? __ia32_sys_read+0xb0/0xb0 [ 281.265849] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.265865] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 281.265883] __x64_sys_preadv+0x9a/0xf0 [ 281.265903] do_syscall_64+0x1b9/0x820 [ 281.265920] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 281.265949] ? syscall_return_slowpath+0x5e0/0x5e0 [ 281.265966] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 281.265983] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 281.327018] ? recalc_sigpending_tsk+0x180/0x180 [ 281.331783] ? kasan_check_write+0x14/0x20 [ 281.336029] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.340886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.346078] RIP: 0033:0x457099 [ 281.349276] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.368277] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 281.375999] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 281.383272] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 281.390543] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 281.397815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 281.405087] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000000 [ 281.412386] CPU: 0 PID: 10991 Comm: syz-executor6 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 281.420886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.430250] Call Trace: [ 281.432850] dump_stack+0x1c9/0x2b4 [ 281.436497] ? dump_stack_print_info.cold.2+0x52/0x52 [ 281.441713] should_fail.cold.4+0xa/0x11 [ 281.445792] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.450919] ? lock_release+0x9f0/0x9f0 [ 281.454908] ? graph_lock+0x170/0x170 [ 281.458723] ? rcu_note_context_switch+0x680/0x680 19:23:58 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r2, 0x1}}, 0x18) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x2) clock_settime(0x7, &(0x7f0000000000)={0x0, 0x989680}) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000200), 0x4) 19:23:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 281.463776] ? find_held_lock+0x36/0x1c0 [ 281.467853] ? __lock_is_held+0xb5/0x140 [ 281.471945] ? check_same_owner+0x340/0x340 [ 281.476279] ? graph_lock+0x170/0x170 [ 281.480091] ? rcu_note_context_switch+0x680/0x680 [ 281.485039] __should_failslab+0x124/0x180 [ 281.489300] should_failslab+0x9/0x14 [ 281.493112] kmem_cache_alloc_node+0x256/0x720 [ 281.497710] ? find_held_lock+0x36/0x1c0 [ 281.501811] __alloc_skb+0x119/0x770 [ 281.505544] ? skb_scrub_packet+0x490/0x490 [ 281.509879] ? kasan_check_read+0x11/0x20 [ 281.514041] ? rcu_is_watching+0x8c/0x150 [ 281.518221] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 281.522968] ? netlink_has_listeners+0x2cf/0x4a0 [ 281.527740] ? netlink_tap_init_net+0x3e0/0x3e0 [ 281.532428] alloc_uevent_skb+0x89/0x220 [ 281.536511] kobject_uevent_env+0x866/0x1110 [ 281.540943] kobject_uevent+0x1f/0x30 [ 281.544760] lo_ioctl+0x138e/0x1d90 [ 281.548436] ? lo_rw_aio_complete+0x450/0x450 [ 281.552947] blkdev_ioctl+0x9cd/0x2030 [ 281.556849] ? blkpg_ioctl+0xc40/0xc40 [ 281.560753] ? kasan_check_read+0x11/0x20 19:23:58 executing program 1 (fault-call:4 fault-nth:1): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 281.564914] ? rcu_is_watching+0x8c/0x150 [ 281.569074] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 281.573765] ? __fget+0x4d5/0x740 [ 281.577249] ? ksys_dup3+0x690/0x690 [ 281.580974] ? trace_hardirqs_on+0x2c0/0x2c0 [ 281.585394] ? kasan_check_write+0x14/0x20 [ 281.589650] block_ioctl+0xee/0x130 [ 281.593296] ? blkdev_fallocate+0x400/0x400 [ 281.597633] do_vfs_ioctl+0x1de/0x1720 [ 281.601529] ? kasan_check_read+0x11/0x20 [ 281.605688] ? rcu_is_watching+0x8c/0x150 [ 281.609847] ? trace_hardirqs_on+0xbd/0x2c0 [ 281.614189] ? ioctl_preallocate+0x300/0x300 [ 281.618623] ? __fget_light+0x2f7/0x440 [ 281.622610] ? putname+0xf2/0x130 [ 281.626073] ? fget_raw+0x20/0x20 [ 281.629546] ? rcu_read_lock_sched_held+0x108/0x120 [ 281.634577] ? kmem_cache_free+0x246/0x280 [ 281.638833] ? do_syscall_64+0x9a/0x820 [ 281.642820] ? do_syscall_64+0x9a/0x820 [ 281.646812] ? lockdep_hardirqs_on+0x421/0x5c0 [ 281.651411] ? security_file_ioctl+0x94/0xc0 [ 281.655830] ksys_ioctl+0xa9/0xd0 [ 281.659300] __x64_sys_ioctl+0x73/0xb0 [ 281.663225] do_syscall_64+0x1b9/0x820 [ 281.667138] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 281.672516] ? syscall_return_slowpath+0x5e0/0x5e0 [ 281.677457] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 281.682488] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 281.687520] ? recalc_sigpending_tsk+0x180/0x180 [ 281.692289] ? kasan_check_write+0x14/0x20 [ 281.696541] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.701414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.706614] RIP: 0033:0x456f07 [ 281.709820] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.723491] FAULT_INJECTION: forcing a failure. [ 281.723491] name failslab, interval 1, probability 0, space 0, times 0 [ 281.728730] RSP: 002b:00007f458362fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 281.728748] RAX: ffffffffffffffda RBX: 0000000020000450 RCX: 0000000000456f07 [ 281.728757] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 281.728766] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 281.728775] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 281.728785] R13: 0000000000000000 R14: 00000000004ca278 R15: 0000000000000014 [ 281.780951] EXT4-fs: 30 callbacks suppressed [ 281.780965] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 281.785297] CPU: 1 PID: 11011 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 281.792719] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 281.798526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.798533] Call Trace: [ 281.798556] dump_stack+0x1c9/0x2b4 [ 281.798576] ? dump_stack_print_info.cold.2+0x52/0x52 [ 281.798599] ? rcu_note_context_switch+0x680/0x680 [ 281.841547] ? find_held_lock+0x36/0x1c0 [ 281.845629] should_fail.cold.4+0xa/0x11 [ 281.849710] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.854834] ? seq_read+0x71/0x1150 [ 281.858479] ? mutex_trylock+0x2b0/0x2b0 [ 281.862571] ? rcu_cleanup_dead_rnp+0x200/0x200 19:23:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x10c, r2) r4 = socket$inet6(0xa, 0x5, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={"6c6f0000000001fff300", 0x0}) ioctl$sock_SIOCGIFINDEX(r4, 0x8914, &(0x7f0000000380)={"62707130000b00000000000000faff00", r6}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x502}) sendmsg(r4, &(0x7f0000000500)={&(0x7f00000001c0)=@nfc={0x27, 0x1, 0x1, 0x6}, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB="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"], 0x278, 0x24004040}, 0x4040040) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r8 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r7, 0x4008af30, &(0x7f0000000100)={0x2, r8}) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r3}, &(0x7f0000000740)=""/132, 0x84, 0x0) 19:23:58 executing program 7 (fault-call:5 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 281.867255] ? graph_lock+0x170/0x170 [ 281.871076] ? find_held_lock+0x36/0x1c0 [ 281.875184] ? __lock_is_held+0xb5/0x140 [ 281.879281] ? check_same_owner+0x340/0x340 [ 281.883621] ? rcu_note_context_switch+0x680/0x680 [ 281.888574] __should_failslab+0x124/0x180 [ 281.892825] should_failslab+0x9/0x14 [ 281.896638] kmem_cache_alloc_node_trace+0x259/0x720 [ 281.901764] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 281.906710] __kmalloc_node+0x33/0x70 [ 281.910528] kvmalloc_node+0x65/0xf0 [ 281.914352] seq_read+0x99b/0x1150 19:23:58 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) fstatfs(r0, &(0x7f00000002c0)=""/224) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) [ 281.917916] ? rw_verify_area+0x118/0x360 [ 281.922084] do_iter_read+0x49e/0x650 [ 281.925904] vfs_readv+0x175/0x1c0 [ 281.929462] ? compat_rw_copy_check_uvector+0x440/0x440 [ 281.934848] ? fget_raw+0x20/0x20 [ 281.938313] ? schedule+0xfb/0x450 [ 281.941867] ? __schedule+0x1df0/0x1df0 [ 281.945879] ? exit_to_usermode_loop+0x8c/0x380 [ 281.950564] ? exit_to_usermode_loop+0x8c/0x380 [ 281.950662] FAULT_INJECTION: forcing a failure. [ 281.950662] name failslab, interval 1, probability 0, space 0, times 0 [ 281.955246] ? trace_hardirqs_off+0xb8/0x2b0 [ 281.955261] ? __sb_end_write+0xac/0xe0 [ 281.955277] ? do_syscall_64+0x6be/0x820 [ 281.955304] do_preadv+0x1cc/0x280 [ 281.982411] ? do_readv+0x310/0x310 [ 281.986045] ? exit_to_usermode_loop+0x1f4/0x380 [ 281.990806] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.996173] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 282.001294] __x64_sys_preadv+0x9a/0xf0 [ 282.005276] do_syscall_64+0x1b9/0x820 [ 282.009171] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.014549] ? syscall_return_slowpath+0x5e0/0x5e0 [ 282.019486] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 282.024509] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 282.029527] ? recalc_sigpending_tsk+0x180/0x180 [ 282.034288] ? kasan_check_write+0x14/0x20 [ 282.038530] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.043382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.048575] RIP: 0033:0x457099 [ 282.051778] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.070706] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 282.078430] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 282.085701] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 282.092976] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 282.100250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 282.107519] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000001 [ 282.114811] CPU: 0 PID: 11027 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 282.123317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.132675] Call Trace: [ 282.135273] dump_stack+0x1c9/0x2b4 [ 282.138920] ? dump_stack_print_info.cold.2+0x52/0x52 [ 282.144122] ? mark_held_locks+0x160/0x160 [ 282.148382] should_fail.cold.4+0xa/0x11 [ 282.152460] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.157583] ? graph_lock+0x170/0x170 [ 282.161401] ? graph_lock+0x170/0x170 [ 282.165240] ? find_held_lock+0x36/0x1c0 [ 282.169335] ? check_same_owner+0x340/0x340 [ 282.173679] ? rcu_note_context_switch+0x680/0x680 [ 282.178629] __should_failslab+0x124/0x180 [ 282.182883] should_failslab+0x9/0x14 [ 282.186692] __kmalloc+0x2b2/0x720 [ 282.190250] ? rcu_is_watching+0x8c/0x150 [ 282.194409] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 282.199097] ? rw_copy_check_uvector+0x361/0x3e0 [ 282.203874] rw_copy_check_uvector+0x361/0x3e0 [ 282.208476] import_iovec+0xcf/0x470 [ 282.212221] ? dup_iter+0x270/0x270 [ 282.215861] ? proc_cwd_link+0x1d0/0x1d0 [ 282.219954] vfs_readv+0xf5/0x1c0 [ 282.223427] ? compat_rw_copy_check_uvector+0x440/0x440 [ 282.228813] ? __fget_light+0x2f7/0x440 [ 282.232804] ? fget_raw+0x20/0x20 [ 282.236282] ? __sb_end_write+0xac/0xe0 [ 282.240280] do_preadv+0x1cc/0x280 [ 282.243837] ? do_readv+0x310/0x310 [ 282.247482] ? __ia32_sys_read+0xb0/0xb0 [ 282.251557] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.256933] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 282.262052] __x64_sys_preadv+0x9a/0xf0 [ 282.266041] do_syscall_64+0x1b9/0x820 [ 282.269942] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.275319] ? syscall_return_slowpath+0x5e0/0x5e0 [ 282.280258] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 282.285291] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 282.290318] ? recalc_sigpending_tsk+0x180/0x180 [ 282.295078] ? kasan_check_write+0x14/0x20 [ 282.299318] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.304167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.309350] RIP: 0033:0x457099 [ 282.312544] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.331433] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 282.339127] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 282.346400] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 282.353667] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 282.361009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 282.368271] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000000 19:23:59 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:59 executing program 1 (fault-call:4 fault-nth:2): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:23:59 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:23:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743402", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:23:59 executing program 7 (fault-call:5 fault-nth:1): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 282.576595] FAULT_INJECTION: forcing a failure. [ 282.576595] name failslab, interval 1, probability 0, space 0, times 0 [ 282.587941] CPU: 1 PID: 11048 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 282.596444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.605803] Call Trace: [ 282.608409] dump_stack+0x1c9/0x2b4 [ 282.612057] ? dump_stack_print_info.cold.2+0x52/0x52 [ 282.617281] should_fail.cold.4+0xa/0x11 [ 282.621356] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 282.626057] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.631184] ? kernel_text_address+0x79/0xf0 [ 282.635619] ? graph_lock+0x170/0x170 [ 282.639435] ? __save_stack_trace+0x8d/0xf0 [ 282.643776] ? find_held_lock+0x36/0x1c0 [ 282.647858] ? __lock_is_held+0xb5/0x140 [ 282.651946] ? check_same_owner+0x340/0x340 [ 282.656284] ? rcu_note_context_switch+0x680/0x680 [ 282.658056] FAULT_INJECTION: forcing a failure. [ 282.658056] name failslab, interval 1, probability 0, space 0, times 0 [ 282.661249] __should_failslab+0x124/0x180 [ 282.661271] should_failslab+0x9/0x14 [ 282.661301] kmem_cache_alloc_trace+0x2b5/0x730 [ 282.685146] ? lock_downgrade+0x8f0/0x8f0 [ 282.689307] proc_pid_stack+0xaa/0x390 [ 282.693231] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 282.698351] proc_single_show+0x101/0x190 [ 282.702507] seq_read+0x4af/0x1150 [ 282.706071] do_iter_read+0x49e/0x650 [ 282.709890] vfs_readv+0x175/0x1c0 [ 282.713443] ? compat_rw_copy_check_uvector+0x440/0x440 [ 282.718825] ? fget_raw+0x20/0x20 [ 282.722295] ? __sb_end_write+0xac/0xe0 [ 282.726282] do_preadv+0x1cc/0x280 [ 282.729832] ? do_readv+0x310/0x310 [ 282.733465] ? __ia32_sys_read+0xb0/0xb0 [ 282.737531] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.742899] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 282.748010] __x64_sys_preadv+0x9a/0xf0 [ 282.752001] do_syscall_64+0x1b9/0x820 [ 282.755893] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.761264] ? syscall_return_slowpath+0x5e0/0x5e0 [ 282.766200] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.771060] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 282.776079] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 282.781105] ? prepare_exit_to_usermode+0x291/0x3b0 [ 282.786133] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.790990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.796184] RIP: 0033:0x457099 [ 282.799391] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.818296] RSP: 002b:00007fe5af454c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 282.826007] RAX: ffffffffffffffda RBX: 00007fe5af4556d4 RCX: 0000000000457099 [ 282.833279] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 282.840551] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 282.847819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 282.855092] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000002 [ 282.862389] CPU: 0 PID: 11052 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 282.870889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.880249] Call Trace: [ 282.882850] dump_stack+0x1c9/0x2b4 [ 282.886492] ? dump_stack_print_info.cold.2+0x52/0x52 [ 282.891694] ? rcu_note_context_switch+0x680/0x680 [ 282.896634] ? find_held_lock+0x36/0x1c0 [ 282.900719] should_fail.cold.4+0xa/0x11 [ 282.904804] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.909919] ? seq_read+0x71/0x1150 [ 282.913547] ? mutex_trylock+0x2b0/0x2b0 [ 282.917599] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 282.922257] ? graph_lock+0x170/0x170 [ 282.926064] ? find_held_lock+0x36/0x1c0 [ 282.930127] ? __lock_is_held+0xb5/0x140 [ 282.934220] ? check_same_owner+0x340/0x340 [ 282.938539] ? rcu_note_context_switch+0x680/0x680 [ 282.943477] __should_failslab+0x124/0x180 [ 282.947722] should_failslab+0x9/0x14 [ 282.951530] kmem_cache_alloc_node_trace+0x259/0x720 [ 282.956643] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 282.961574] __kmalloc_node+0x33/0x70 [ 282.965373] kvmalloc_node+0x65/0xf0 [ 282.969101] seq_read+0x99b/0x1150 [ 282.972635] ? rw_verify_area+0x118/0x360 [ 282.976783] do_iter_read+0x49e/0x650 [ 282.980588] vfs_readv+0x175/0x1c0 [ 282.984130] ? compat_rw_copy_check_uvector+0x440/0x440 [ 282.989502] ? fget_raw+0x20/0x20 [ 282.992947] ? __sb_end_write+0xac/0xe0 [ 282.996939] do_preadv+0x1cc/0x280 [ 283.000485] ? do_readv+0x310/0x310 [ 283.004098] ? __ia32_sys_read+0xb0/0xb0 [ 283.008158] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.013533] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 283.018629] __x64_sys_preadv+0x9a/0xf0 [ 283.022605] do_syscall_64+0x1b9/0x820 [ 283.026576] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 283.031929] ? syscall_return_slowpath+0x5e0/0x5e0 [ 283.036850] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 283.041880] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 283.046901] ? recalc_sigpending_tsk+0x180/0x180 [ 283.051658] ? kasan_check_write+0x14/0x20 [ 283.055905] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.060759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.065949] RIP: 0033:0x457099 [ 283.069134] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.088028] RSP: 002b:00007f9849366c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 283.095746] RAX: ffffffffffffffda RBX: 00007f98493676d4 RCX: 0000000000457099 [ 283.103014] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 283.110279] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 283.117549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 283.124810] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000001 [ 283.146231] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 283.157492] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 283.169578] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 283.204270] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:23:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 283.256141] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:23:59 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\nxt4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 283.373125] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000, [ 283.418028] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 283.427160] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000, 19:24:00 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='%xt4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4h', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:00 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='e\nt4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:00 executing program 3: 19:24:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4t', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:00 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c, 0x80000) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000240)=r2, 0x4) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000000)=0xe54) ppoll(&(0x7f0000000040)=[{r3}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:00 executing program 7 (fault-call:5 fault-nth:2): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 283.964646] FAULT_INJECTION: forcing a failure. [ 283.964646] name failslab, interval 1, probability 0, space 0, times 0 [ 283.976002] CPU: 1 PID: 11156 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 283.984501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.993951] Call Trace: [ 283.996552] dump_stack+0x1c9/0x2b4 [ 284.000199] ? dump_stack_print_info.cold.2+0x52/0x52 [ 284.005439] should_fail.cold.4+0xa/0x11 [ 284.009515] ? rcu_cleanup_dead_rnp+0x200/0x200 19:24:00 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r0 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r3, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r5 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r5, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r5, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r4, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r4, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r4, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r0, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:00 executing program 1 (fault-call:4 fault-nth:3): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:00 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ex\n4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:00 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x180) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000300)=0x9, 0x4) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x100, 0x108) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000000)={0x5e, @multicast2, 0x4e21, 0x1, 'none\x00', 0x18, 0xb98f, 0x33}, 0x2c) ppoll(&(0x7f0000000040)=[{r3}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) [ 284.014217] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.019352] ? kernel_text_address+0x79/0xf0 [ 284.023783] ? graph_lock+0x170/0x170 [ 284.027604] ? __save_stack_trace+0x8d/0xf0 [ 284.031953] ? find_held_lock+0x36/0x1c0 [ 284.036039] ? __lock_is_held+0xb5/0x140 [ 284.040136] ? check_same_owner+0x340/0x340 [ 284.044486] ? rcu_note_context_switch+0x680/0x680 [ 284.049448] __should_failslab+0x124/0x180 [ 284.053707] should_failslab+0x9/0x14 [ 284.057541] kmem_cache_alloc_trace+0x2b5/0x730 19:24:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434fd", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 284.062240] ? lock_downgrade+0x8f0/0x8f0 [ 284.066417] proc_pid_stack+0xaa/0x390 [ 284.070341] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 284.075472] proc_single_show+0x101/0x190 [ 284.079641] seq_read+0x4af/0x1150 [ 284.083236] do_iter_read+0x49e/0x650 [ 284.087073] vfs_readv+0x175/0x1c0 [ 284.091282] ? compat_rw_copy_check_uvector+0x440/0x440 19:24:00 executing program 3: 19:24:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:00 executing program 7 (fault-call:5 fault-nth:3): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 284.091313] ? fget_raw+0x20/0x20 19:24:00 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x9, &(0x7f00000025c0)=[{&(0x7f00000002c0)="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", 0x1000, 0x280}, {&(0x7f00000001c0)="08a1df465caad64fdda7e65f3ce1e464af49c14a390f6a689f3499d302f8b5e8ce10c4b475316ea21d3350942c6b3462991859df22070a8d0f6a97c91488eaa6ee46009942ddf433977a23ffe8850a0139f39971eaaf24e6c7447feacea24cf121cade22d1ec45d9099f3c3110b2e2e08f1338debdae30481b973e67885b761e02f1f461bef4690c69c48c703b6f8b0f12daa4c036534ed7b05301dc80e468e9", 0xa0, 0xff}, {&(0x7f00000000c0)="6231629026e4b9fdb0622bec", 0xc, 0x7}, {&(0x7f00000012c0)="7e77bd0ad73e838effb66036ce122233990b6eaeb92b814ef011aa8b8ed276450071d17298554325b48b77ae80c5f0e0bcf0e84bf05f2dbae4ee7dbd8f03fd81edbcd8213e9e1e531322a31e6bc6dba96dd51a88876471577a6e61b7252c0760e1d5cb322c00ad743c44625883f75c70b57e2692fcdbbbdaedd2d0fcc3e7887690eefb0bfcafa69746a1a1bb37480a1345b742aaad0812726daf7c00d0a59b9bd72e636af5335453e80b68f4c87e554a8b66a184bf9a529f7c84033e76aa78bf0211e9d8010b53b6d6d6b581891ca78fbf91f78960ac5db093b8fcaec99413757a6ca2924e508505b76f44c7f1a09b3d7b", 0xf1, 0xfffffffffffeffff}, {&(0x7f00000013c0), 0x0, 0x1}, {&(0x7f0000001400)="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", 0x1000, 0x1}, {&(0x7f0000002400)="de6b8a9438f2d056a867ee796cbe804a0abd102094ec791fa1958ce82bee1bbb2809d1637c7d1a4537bb4d0bb37dba3379e80b701ab095dc352f2fa30e1fc7aac927a4fc63def005f0422cbd58458d490974ded2395b538689c7bf203e1a853834205b72cbc584e6172c015848430a3757162e338525b04ad7b3040ccb919dfeeda1f8e7fb522dc10fd4d3e2faeef63c16c476a3e2a88f96f367c59891560c8298f27e10ff0194dc2eb2f017f060309437c8e5d7dae64b40361a6b141394220c", 0xc0, 0x90}, {&(0x7f00000024c0)="2786be74a08ff0d1a927d329bcb178e346e44d34bbb69546062a5e4e3c2604ccdf02922adbf29b6799f795f806520db58b16799111", 0x35, 0xffffffffffff5b1b}, {&(0x7f0000002500)="988a178b034ab3dd04a488d317097fb4542c230642c7263f0ab92a02481d736395603f76a72a1fff0899fa51843f2d9184a90137605a8c9f496f1a8f143a381d185bf9a7555fb1f5de3469f238bc895ce9c79ec080e2d7b2ca0f250b3d2293b656fbde7a58aa31d6600252756706044ab00df9665822a83688a83fe20a4352decccb2165295182c2e067dd709bc04d1d082874fda7a063ccdd79", 0x9a, 0x9}], 0x20000, &(0x7f00000026c0)={[{@lfs_mode='mode=lfs'}, {@nobarrier='nobarrier'}, {@background_gc_off='background_gc=off'}, {@lfs_mode='mode=lfs'}, {@discard='discard'}, {@whint_mode_user='whint_mode=user-based'}, {@discard='discard'}]}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:00 executing program 1 (fault-call:4 fault-nth:4): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 284.091346] ? __sb_end_write+0xac/0xe0 19:24:00 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ex%4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 284.091377] do_preadv+0x1cc/0x280 [ 284.091399] ? do_readv+0x310/0x310 [ 284.091415] ? __ia32_sys_read+0xb0/0xb0 19:24:01 executing program 3: 19:24:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4t', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 284.091436] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 19:24:01 executing program 7 (fault-call:5 fault-nth:4): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 284.091455] ? trace_hardirqs_off_caller+0x2b0/0x2b0 19:24:01 executing program 1 (fault-call:4 fault-nth:5): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\n', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 284.091476] __x64_sys_preadv+0x9a/0xf0 [ 284.091499] do_syscall_64+0x1b9/0x820 [ 284.091517] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.091535] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.091552] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 284.091569] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 284.091585] ? recalc_sigpending_tsk+0x180/0x180 [ 284.091604] ? kasan_check_write+0x14/0x20 [ 284.091628] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.091654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.091668] RIP: 0033:0x457099 [ 284.091686] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.091696] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 284.091724] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 284.091736] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 284.091747] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 284.091757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 284.091768] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000002 [ 284.146296] FAULT_INJECTION: forcing a failure. [ 284.146296] name failslab, interval 1, probability 0, space 0, times 0 [ 284.146318] CPU: 0 PID: 11172 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 284.146329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.146336] Call Trace: [ 284.146355] dump_stack+0x1c9/0x2b4 [ 284.146376] ? dump_stack_print_info.cold.2+0x52/0x52 [ 284.146393] ? lock_acquire+0x1e4/0x4f0 [ 284.146409] ? seq_read+0x71/0x1150 [ 284.146434] should_fail.cold.4+0xa/0x11 [ 284.146466] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.146493] ? kasan_check_write+0x14/0x20 [ 284.146508] ? __mutex_lock+0x6d0/0x1700 [ 284.146525] ? graph_lock+0x170/0x170 [ 284.146544] ? __kasan_slab_free+0x11a/0x170 [ 284.146565] ? find_held_lock+0x36/0x1c0 [ 284.146586] ? __lock_is_held+0xb5/0x140 [ 284.146620] ? check_same_owner+0x340/0x340 [ 284.146642] ? rcu_note_context_switch+0x680/0x680 [ 284.146667] __should_failslab+0x124/0x180 [ 284.146689] should_failslab+0x9/0x14 [ 284.146708] kmem_cache_alloc_trace+0x2b5/0x730 [ 284.146728] ? lock_downgrade+0x8f0/0x8f0 [ 284.146756] proc_pid_stack+0xaa/0x390 [ 284.146780] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 284.146810] proc_single_show+0x101/0x190 [ 284.146832] seq_read+0x4af/0x1150 [ 284.146870] do_iter_read+0x49e/0x650 [ 284.146903] vfs_readv+0x175/0x1c0 [ 284.146928] ? compat_rw_copy_check_uvector+0x440/0x440 [ 284.146956] ? fget_raw+0x20/0x20 [ 284.146988] ? __sb_end_write+0xac/0xe0 [ 284.147016] do_preadv+0x1cc/0x280 [ 284.147037] ? do_readv+0x310/0x310 [ 284.147054] ? __ia32_sys_read+0xb0/0xb0 [ 284.147074] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.147093] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 284.147114] __x64_sys_preadv+0x9a/0xf0 [ 284.147135] do_syscall_64+0x1b9/0x820 [ 284.147153] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.147172] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.147190] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 284.147230] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 284.147249] ? recalc_sigpending_tsk+0x180/0x180 [ 284.147268] ? kasan_check_write+0x14/0x20 [ 284.147294] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.147321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.147333] RIP: 0033:0x457099 [ 284.147352] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.147362] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 284.147382] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 284.147395] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 284.147405] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 284.147415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 284.147426] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000003 [ 284.353062] FAULT_INJECTION: forcing a failure. [ 284.353062] name failslab, interval 1, probability 0, space 0, times 0 [ 284.353085] CPU: 0 PID: 11196 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 284.353096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.353104] Call Trace: [ 284.353124] dump_stack+0x1c9/0x2b4 [ 284.353147] ? dump_stack_print_info.cold.2+0x52/0x52 [ 284.353165] ? lock_acquire+0x1e4/0x4f0 [ 284.353183] ? seq_read+0x71/0x1150 [ 284.353233] should_fail.cold.4+0xa/0x11 [ 284.353259] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.353286] ? kasan_check_write+0x14/0x20 [ 284.353305] ? __mutex_lock+0x6d0/0x1700 [ 284.353322] ? graph_lock+0x170/0x170 [ 284.353341] ? __kasan_slab_free+0x11a/0x170 [ 284.353362] ? find_held_lock+0x36/0x1c0 [ 284.353394] ? __lock_is_held+0xb5/0x140 [ 284.353428] ? check_same_owner+0x340/0x340 [ 284.353451] ? rcu_note_context_switch+0x680/0x680 [ 284.353478] __should_failslab+0x124/0x180 [ 284.353499] should_failslab+0x9/0x14 [ 284.353516] kmem_cache_alloc_trace+0x2b5/0x730 [ 284.353534] ? lock_downgrade+0x8f0/0x8f0 [ 284.353560] proc_pid_stack+0xaa/0x390 [ 284.353584] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 284.353611] proc_single_show+0x101/0x190 [ 284.353632] seq_read+0x4af/0x1150 [ 284.353669] do_iter_read+0x49e/0x650 [ 284.353701] vfs_readv+0x175/0x1c0 [ 284.353732] ? compat_rw_copy_check_uvector+0x440/0x440 [ 284.353764] ? fget_raw+0x20/0x20 [ 284.353797] ? __sb_end_write+0xac/0xe0 [ 284.353823] do_preadv+0x1cc/0x280 [ 284.353847] ? do_readv+0x310/0x310 [ 284.353865] ? __ia32_sys_read+0xb0/0xb0 [ 284.353888] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.353910] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 284.353932] __x64_sys_preadv+0x9a/0xf0 [ 284.353957] do_syscall_64+0x1b9/0x820 [ 284.353978] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.354001] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.354021] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 284.354042] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 284.354058] ? recalc_sigpending_tsk+0x180/0x180 [ 284.354077] ? kasan_check_write+0x14/0x20 [ 284.354101] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.354127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.354139] RIP: 0033:0x457099 [ 284.354158] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.354168] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 284.354188] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 284.354199] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 284.354230] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 284.354242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 284.354253] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000003 [ 284.362014] FAULT_INJECTION: forcing a failure. [ 284.362014] name failslab, interval 1, probability 0, space 0, times 0 [ 284.362060] CPU: 1 PID: 11199 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 284.362070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.362075] Call Trace: [ 284.362095] dump_stack+0x1c9/0x2b4 [ 284.362116] ? dump_stack_print_info.cold.2+0x52/0x52 [ 284.362131] ? lock_acquire+0x1e4/0x4f0 [ 284.362148] ? seq_read+0x71/0x1150 [ 284.362174] should_fail.cold.4+0xa/0x11 [ 284.362197] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.362238] ? kasan_check_write+0x14/0x20 [ 284.362254] ? __mutex_lock+0x6d0/0x1700 [ 284.362271] ? graph_lock+0x170/0x170 [ 284.362289] ? __kasan_slab_free+0x11a/0x170 [ 284.362309] ? find_held_lock+0x36/0x1c0 [ 284.362330] ? __lock_is_held+0xb5/0x140 [ 284.362360] ? check_same_owner+0x340/0x340 [ 284.362378] ? rcu_note_context_switch+0x680/0x680 [ 284.362400] __should_failslab+0x124/0x180 [ 284.362418] should_failslab+0x9/0x14 [ 284.362432] kmem_cache_alloc_trace+0x2b5/0x730 [ 284.362448] ? lock_downgrade+0x8f0/0x8f0 [ 284.362470] proc_pid_stack+0xaa/0x390 [ 284.362491] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 284.362516] proc_single_show+0x101/0x190 [ 284.362535] seq_read+0x4af/0x1150 [ 284.362567] do_iter_read+0x49e/0x650 [ 284.362594] vfs_readv+0x175/0x1c0 [ 284.362616] ? compat_rw_copy_check_uvector+0x440/0x440 [ 284.362643] ? fget_raw+0x20/0x20 [ 284.362671] ? __sb_end_write+0xac/0xe0 [ 284.362695] do_preadv+0x1cc/0x280 [ 284.362714] ? do_readv+0x310/0x310 [ 284.362740] ? __ia32_sys_read+0xb0/0xb0 [ 284.362760] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.362776] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 284.362794] __x64_sys_preadv+0x9a/0xf0 [ 284.362815] do_syscall_64+0x1b9/0x820 [ 284.362834] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.362860] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.362882] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 284.362904] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 284.362919] ? recalc_sigpending_tsk+0x180/0x180 [ 284.362935] ? kasan_check_write+0x14/0x20 [ 284.362957] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.362981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.362993] RIP: 0033:0x457099 [ 284.363008] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.363017] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 284.363034] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 284.363043] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 284.363053] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 284.363062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 284.363071] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000004 [ 284.612238] FAULT_INJECTION: forcing a failure. [ 284.612238] name failslab, interval 1, probability 0, space 0, times 0 [ 284.612262] CPU: 1 PID: 11232 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 284.612272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.612279] Call Trace: [ 284.612298] dump_stack+0x1c9/0x2b4 [ 284.612319] ? dump_stack_print_info.cold.2+0x52/0x52 [ 284.612335] ? lock_acquire+0x1e4/0x4f0 [ 284.612351] ? seq_read+0x71/0x1150 [ 284.612378] should_fail.cold.4+0xa/0x11 [ 284.612402] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.612429] ? kasan_check_write+0x14/0x20 [ 284.612444] ? __mutex_lock+0x6d0/0x1700 [ 284.612459] ? graph_lock+0x170/0x170 [ 284.612476] ? __kasan_slab_free+0x11a/0x170 [ 284.612494] ? find_held_lock+0x36/0x1c0 [ 284.612514] ? __lock_is_held+0xb5/0x140 [ 284.612543] ? check_same_owner+0x340/0x340 [ 284.612562] ? rcu_note_context_switch+0x680/0x680 [ 284.612585] __should_failslab+0x124/0x180 [ 284.612603] should_failslab+0x9/0x14 [ 284.612618] kmem_cache_alloc_trace+0x2b5/0x730 [ 284.612634] ? lock_downgrade+0x8f0/0x8f0 [ 284.612658] proc_pid_stack+0xaa/0x390 [ 284.612678] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 284.612704] proc_single_show+0x101/0x190 [ 284.612746] seq_read+0x4af/0x1150 [ 284.612783] do_iter_read+0x49e/0x650 [ 284.612812] vfs_readv+0x175/0x1c0 [ 284.612835] ? compat_rw_copy_check_uvector+0x440/0x440 [ 284.612872] ? fget_raw+0x20/0x20 [ 284.612906] ? __sb_end_write+0xac/0xe0 [ 284.612933] do_preadv+0x1cc/0x280 [ 284.612953] ? do_readv+0x310/0x310 [ 284.612971] ? __ia32_sys_read+0xb0/0xb0 [ 284.612990] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.613006] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 284.613025] __x64_sys_preadv+0x9a/0xf0 [ 284.613044] do_syscall_64+0x1b9/0x820 [ 284.613061] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.613080] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.613096] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 284.613114] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 284.613128] ? recalc_sigpending_tsk+0x180/0x180 [ 284.613143] ? kasan_check_write+0x14/0x20 [ 284.613168] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.613195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.613220] RIP: 0033:0x457099 [ 284.613241] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.613251] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 284.613271] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 284.613282] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 284.613293] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 284.613303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 284.613314] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000005 [ 284.616794] FAULT_INJECTION: forcing a failure. [ 284.616794] name failslab, interval 1, probability 0, space 0, times 0 [ 284.616813] CPU: 0 PID: 11235 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 284.616825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.616831] Call Trace: [ 284.616858] dump_stack+0x1c9/0x2b4 [ 284.616882] ? dump_stack_print_info.cold.2+0x52/0x52 [ 284.616899] ? lock_acquire+0x1e4/0x4f0 [ 284.616917] ? seq_read+0x71/0x1150 [ 284.616945] should_fail.cold.4+0xa/0x11 [ 284.616969] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.616997] ? kasan_check_write+0x14/0x20 [ 284.617015] ? __mutex_lock+0x6d0/0x1700 [ 284.617032] ? graph_lock+0x170/0x170 [ 284.617052] ? __kasan_slab_free+0x11a/0x170 [ 284.617074] ? find_held_lock+0x36/0x1c0 [ 284.617097] ? __lock_is_held+0xb5/0x140 [ 284.617128] ? check_same_owner+0x340/0x340 [ 284.617149] ? rcu_note_context_switch+0x680/0x680 [ 284.617172] __should_failslab+0x124/0x180 [ 284.617191] should_failslab+0x9/0x14 [ 284.617227] kmem_cache_alloc_trace+0x2b5/0x730 [ 284.617248] ? lock_downgrade+0x8f0/0x8f0 [ 284.617275] proc_pid_stack+0xaa/0x390 [ 284.617297] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 284.617324] proc_single_show+0x101/0x190 [ 284.617346] seq_read+0x4af/0x1150 [ 284.617381] do_iter_read+0x49e/0x650 [ 284.617413] vfs_readv+0x175/0x1c0 [ 284.617438] ? compat_rw_copy_check_uvector+0x440/0x440 [ 284.617468] ? fget_raw+0x20/0x20 [ 284.617500] ? __sb_end_write+0xac/0xe0 [ 284.617528] do_preadv+0x1cc/0x280 [ 284.617549] ? do_readv+0x310/0x310 [ 284.617568] ? __ia32_sys_read+0xb0/0xb0 [ 284.617589] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.617607] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 284.617630] __x64_sys_preadv+0x9a/0xf0 [ 284.617652] do_syscall_64+0x1b9/0x820 [ 284.617673] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.617693] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.617714] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 284.617736] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 284.617753] ? recalc_sigpending_tsk+0x180/0x180 [ 284.617770] ? kasan_check_write+0x14/0x20 [ 284.617795] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.617823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.617836] RIP: 0033:0x457099 [ 284.617856] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.617867] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 284.617887] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 284.617898] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 19:24:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:03 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x890f, &(0x7f0000000080)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000000)) 19:24:03 executing program 3: 19:24:03 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext-\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:03 executing program 7 (fault-call:5 fault-nth:5): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:03 executing program 1 (fault-call:4 fault-nth:6): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743402", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 284.617910] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 284.617921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 284.617932] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000004 19:24:03 executing program 3: [ 286.440073] FAULT_INJECTION: forcing a failure. [ 286.440073] name failslab, interval 1, probability 0, space 0, times 0 [ 286.451389] CPU: 1 PID: 11282 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 286.459892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.469255] Call Trace: [ 286.471867] dump_stack+0x1c9/0x2b4 [ 286.475524] ? dump_stack_print_info.cold.2+0x52/0x52 [ 286.480741] ? lock_acquire+0x1e4/0x4f0 [ 286.484743] ? seq_read+0x71/0x1150 [ 286.488414] should_fail.cold.4+0xa/0x11 [ 286.492503] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.497635] ? kasan_check_write+0x14/0x20 [ 286.501893] ? __mutex_lock+0x6d0/0x1700 [ 286.505981] ? graph_lock+0x170/0x170 [ 286.509812] ? __kasan_slab_free+0x11a/0x170 [ 286.514257] ? find_held_lock+0x36/0x1c0 [ 286.518346] ? __lock_is_held+0xb5/0x140 [ 286.522446] ? check_same_owner+0x340/0x340 [ 286.527287] ? rcu_note_context_switch+0x680/0x680 [ 286.532256] __should_failslab+0x124/0x180 [ 286.536543] should_failslab+0x9/0x14 19:24:03 executing program 3: [ 286.536565] kmem_cache_alloc_trace+0x2b5/0x730 [ 286.536585] ? lock_downgrade+0x8f0/0x8f0 [ 286.536614] proc_pid_stack+0xaa/0x390 [ 286.536637] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 286.558255] proc_single_show+0x101/0x190 [ 286.562435] seq_read+0x4af/0x1150 [ 286.566007] do_iter_read+0x49e/0x650 [ 286.569839] vfs_readv+0x175/0x1c0 [ 286.573396] ? compat_rw_copy_check_uvector+0x440/0x440 [ 286.578792] ? fget_raw+0x20/0x20 [ 286.582278] ? __sb_end_write+0xac/0xe0 [ 286.586285] do_preadv+0x1cc/0x280 [ 286.589844] ? do_readv+0x310/0x310 [ 286.593483] ? __ia32_sys_read+0xb0/0xb0 [ 286.597650] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.601720] FAULT_INJECTION: forcing a failure. [ 286.601720] name failslab, interval 1, probability 0, space 0, times 0 [ 286.603019] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 286.603039] __x64_sys_preadv+0x9a/0xf0 [ 286.603066] do_syscall_64+0x1b9/0x820 [ 286.627214] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 286.632601] ? syscall_return_slowpath+0x5e0/0x5e0 [ 286.637549] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 286.642583] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 286.647612] ? recalc_sigpending_tsk+0x180/0x180 [ 286.652380] ? kasan_check_write+0x14/0x20 [ 286.656629] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.661498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.666695] RIP: 0033:0x457099 [ 286.669898] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.688816] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 286.696541] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 286.703816] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 286.711090] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 286.718363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 286.725637] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000005 [ 286.732936] CPU: 0 PID: 11277 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 286.741445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.750802] Call Trace: [ 286.753406] dump_stack+0x1c9/0x2b4 [ 286.757046] ? dump_stack_print_info.cold.2+0x52/0x52 [ 286.762258] ? lock_acquire+0x1e4/0x4f0 [ 286.766256] ? seq_read+0x71/0x1150 [ 286.769905] should_fail.cold.4+0xa/0x11 [ 286.773984] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.779105] ? kasan_check_write+0x14/0x20 [ 286.781740] EXT4-fs: 28 callbacks suppressed [ 286.781752] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 286.783356] ? __mutex_lock+0x6d0/0x1700 [ 286.783373] ? graph_lock+0x170/0x170 [ 286.783389] ? __kasan_slab_free+0x11a/0x170 [ 286.783408] ? find_held_lock+0x36/0x1c0 [ 286.783428] ? __lock_is_held+0xb5/0x140 [ 286.783457] ? check_same_owner+0x340/0x340 [ 286.783477] ? rcu_note_context_switch+0x680/0x680 [ 286.783504] __should_failslab+0x124/0x180 [ 286.789072] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 286.796749] should_failslab+0x9/0x14 [ 286.796765] kmem_cache_alloc_trace+0x2b5/0x730 [ 286.796782] ? lock_downgrade+0x8f0/0x8f0 [ 286.796807] proc_pid_stack+0xaa/0x390 [ 286.796827] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 286.796851] proc_single_show+0x101/0x190 [ 286.796872] seq_read+0x4af/0x1150 [ 286.796900] do_iter_read+0x49e/0x650 [ 286.796926] vfs_readv+0x175/0x1c0 [ 286.876255] ? compat_rw_copy_check_uvector+0x440/0x440 [ 286.881641] ? fget_raw+0x20/0x20 [ 286.885118] ? __sb_end_write+0xac/0xe0 [ 286.889112] do_preadv+0x1cc/0x280 [ 286.892667] ? do_readv+0x310/0x310 [ 286.896309] ? __ia32_sys_read+0xb0/0xb0 [ 286.900384] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.905760] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 286.910882] __x64_sys_preadv+0x9a/0xf0 [ 286.914874] do_syscall_64+0x1b9/0x820 [ 286.918774] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 286.924152] ? syscall_return_slowpath+0x5e0/0x5e0 [ 286.929098] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 286.934136] ? prepare_exit_to_usermode+0x3b0/0x3b0 19:24:03 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f00000000c0)) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pwrite64(r0, &(0x7f00000002c0)="65baffc4a4de561efa9c58bc9b7dfc5d8968c52f199ab38a6052c8e8df69c9ea2f95c65480212244a044431bc7f02ef53ad5e790b134eeeb3e7a95bdc5de5c68582c9aed921351d3d279ec2b93aa10f56f96179710df1ba4fed7aa63b26734ca3c8916263a48e02478d555851e0a8aa0e8d35ffc9e2bdfb7209f81eafa3680b4023add806cba9fc25156638bb399d10bb4a7a258d4be40738281dbebe80ff37927bf4446ce758b0379db616e0147b114429f16d4ecf685a01ede8f56a1a8e3a2ebeb83669b5cb84cf03d81f83fc99c6cbc68319abb7ce8ea3252b61e3399430658ac", 0xe2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:03 executing program 3: 19:24:03 executing program 7 (fault-call:5 fault-nth:6): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 286.939175] ? recalc_sigpending_tsk+0x180/0x180 [ 286.943973] ? kasan_check_write+0x14/0x20 [ 286.948243] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.953115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.958314] RIP: 0033:0x457099 [ 286.961518] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.980424] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 19:24:03 executing program 3: [ 286.988150] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 286.995433] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 287.002709] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 287.006732] FAULT_INJECTION: forcing a failure. [ 287.006732] name failslab, interval 1, probability 0, space 0, times 0 [ 287.009993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 287.010003] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000006 [ 287.036040] CPU: 1 PID: 11312 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 287.044543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.053908] Call Trace: [ 287.056520] dump_stack+0x1c9/0x2b4 [ 287.060168] ? dump_stack_print_info.cold.2+0x52/0x52 [ 287.065383] ? lock_acquire+0x1e4/0x4f0 [ 287.069411] ? seq_read+0x71/0x1150 [ 287.073073] should_fail.cold.4+0xa/0x11 [ 287.077171] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.082321] ? seq_read+0x71/0x1150 [ 287.085976] ? kasan_check_write+0x14/0x20 [ 287.090240] ? __mutex_lock+0x6d0/0x1700 [ 287.094318] ? graph_lock+0x170/0x170 [ 287.098137] ? __kasan_slab_free+0x11a/0x170 [ 287.102561] ? find_held_lock+0x36/0x1c0 [ 287.106652] ? __lock_is_held+0xb5/0x140 [ 287.110746] ? check_same_owner+0x340/0x340 [ 287.115088] ? rcu_note_context_switch+0x680/0x680 [ 287.120038] __should_failslab+0x124/0x180 [ 287.124284] should_failslab+0x9/0x14 [ 287.128100] kmem_cache_alloc_trace+0x2b5/0x730 [ 287.132897] ? lock_downgrade+0x8f0/0x8f0 [ 287.137069] proc_pid_stack+0xaa/0x390 [ 287.140976] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 287.146099] proc_single_show+0x101/0x190 [ 287.150266] seq_read+0x4af/0x1150 [ 287.153836] do_iter_read+0x49e/0x650 [ 287.157662] vfs_readv+0x175/0x1c0 [ 287.161233] ? compat_rw_copy_check_uvector+0x440/0x440 [ 287.166620] ? fget_raw+0x20/0x20 [ 287.170099] ? __sb_end_write+0xac/0xe0 [ 287.174092] do_preadv+0x1cc/0x280 [ 287.177651] ? do_readv+0x310/0x310 [ 287.181294] ? __ia32_sys_read+0xb0/0xb0 [ 287.185375] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.190762] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 287.195878] __x64_sys_preadv+0x9a/0xf0 [ 287.199870] do_syscall_64+0x1b9/0x820 [ 287.203776] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.209152] ? syscall_return_slowpath+0x5e0/0x5e0 [ 287.214096] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 287.219125] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 287.224157] ? recalc_sigpending_tsk+0x180/0x180 [ 287.228925] ? kasan_check_write+0x14/0x20 [ 287.233178] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.238052] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.243253] RIP: 0033:0x457099 [ 287.246459] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.250056] FAULT_INJECTION: forcing a failure. [ 287.250056] name failslab, interval 1, probability 0, space 0, times 0 [ 287.265369] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 287.265387] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 19:24:03 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180)={0x40000000}, 0x8) 19:24:03 executing program 1 (fault-call:4 fault-nth:7): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 287.265397] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 287.265406] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 287.265416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 287.265425] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000006 [ 287.321363] CPU: 0 PID: 11328 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 287.329853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.339224] Call Trace: [ 287.341830] dump_stack+0x1c9/0x2b4 [ 287.345910] ? dump_stack_print_info.cold.2+0x52/0x52 [ 287.351111] ? lock_acquire+0x1e4/0x4f0 [ 287.355120] ? seq_read+0x71/0x1150 [ 287.358770] should_fail.cold.4+0xa/0x11 [ 287.362852] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.367978] ? kasan_check_write+0x14/0x20 [ 287.372242] ? __mutex_lock+0x6d0/0x1700 [ 287.376322] ? graph_lock+0x170/0x170 [ 287.380133] ? __kasan_slab_free+0x11a/0x170 [ 287.384553] ? find_held_lock+0x36/0x1c0 [ 287.388639] ? __lock_is_held+0xb5/0x140 [ 287.392698] ? check_same_owner+0x340/0x340 [ 287.397024] ? rcu_note_context_switch+0x680/0x680 [ 287.401959] __should_failslab+0x124/0x180 [ 287.406194] should_failslab+0x9/0x14 [ 287.410011] kmem_cache_alloc_trace+0x2b5/0x730 [ 287.414667] ? lock_downgrade+0x8f0/0x8f0 [ 287.418806] proc_pid_stack+0xaa/0x390 [ 287.422695] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 287.427806] proc_single_show+0x101/0x190 [ 287.431964] seq_read+0x4af/0x1150 [ 287.435577] do_iter_read+0x49e/0x650 [ 287.439399] vfs_readv+0x175/0x1c0 [ 287.442936] ? compat_rw_copy_check_uvector+0x440/0x440 [ 287.448299] ? fget_raw+0x20/0x20 [ 287.451761] ? __sb_end_write+0xac/0xe0 [ 287.455730] do_preadv+0x1cc/0x280 [ 287.459360] ? do_readv+0x310/0x310 [ 287.462979] ? __ia32_sys_read+0xb0/0xb0 [ 287.467050] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.472413] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 287.477529] __x64_sys_preadv+0x9a/0xf0 [ 287.481510] do_syscall_64+0x1b9/0x820 [ 287.485431] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.490808] ? syscall_return_slowpath+0x5e0/0x5e0 [ 287.495742] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 287.500747] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 287.505759] ? recalc_sigpending_tsk+0x180/0x180 [ 287.510507] ? kasan_check_write+0x14/0x20 [ 287.514744] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.519615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.524813] RIP: 0033:0x457099 19:24:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:04 executing program 3: 19:24:04 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={r2, r3+30000000}, &(0x7f0000000200)={0x11fa0204}, 0x8) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) [ 287.528017] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.546922] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 287.554618] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 287.561879] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 287.569152] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 287.576406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 287.583665] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000007 19:24:04 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext\n\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:04 executing program 7 (fault-call:5 fault-nth:7): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ed", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 287.708496] FAULT_INJECTION: forcing a failure. [ 287.708496] name failslab, interval 1, probability 0, space 0, times 0 [ 287.719866] CPU: 0 PID: 11341 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 287.719879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.719886] Call Trace: [ 287.719908] dump_stack+0x1c9/0x2b4 [ 287.719929] ? dump_stack_print_info.cold.2+0x52/0x52 [ 287.719946] ? lock_acquire+0x1e4/0x4f0 [ 287.719965] ? seq_read+0x71/0x1150 [ 287.719994] should_fail.cold.4+0xa/0x11 [ 287.760912] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.766052] ? seq_read+0x71/0x1150 [ 287.769671] ? kasan_check_write+0x14/0x20 [ 287.773901] ? __mutex_lock+0x6d0/0x1700 [ 287.777952] ? graph_lock+0x170/0x170 [ 287.781744] ? __kasan_slab_free+0x11a/0x170 [ 287.786159] ? find_held_lock+0x36/0x1c0 [ 287.790248] ? __lock_is_held+0xb5/0x140 [ 287.794334] ? check_same_owner+0x340/0x340 [ 287.798686] ? rcu_note_context_switch+0x680/0x680 [ 287.803640] __should_failslab+0x124/0x180 [ 287.807954] should_failslab+0x9/0x14 [ 287.811750] kmem_cache_alloc_trace+0x2b5/0x730 [ 287.816439] ? lock_downgrade+0x8f0/0x8f0 [ 287.820595] proc_pid_stack+0xaa/0x390 [ 287.824471] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 287.829580] proc_single_show+0x101/0x190 [ 287.833737] seq_read+0x4af/0x1150 [ 287.837286] do_iter_read+0x49e/0x650 [ 287.841091] vfs_readv+0x175/0x1c0 [ 287.844623] ? compat_rw_copy_check_uvector+0x440/0x440 [ 287.849991] ? fget_raw+0x20/0x20 [ 287.853438] ? __sb_end_write+0xac/0xe0 [ 287.857420] do_preadv+0x1cc/0x280 [ 287.860980] ? do_readv+0x310/0x310 [ 287.864624] ? __ia32_sys_read+0xb0/0xb0 [ 287.868678] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.874040] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 287.879162] __x64_sys_preadv+0x9a/0xf0 [ 287.883129] do_syscall_64+0x1b9/0x820 [ 287.887018] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.892386] ? syscall_return_slowpath+0x5e0/0x5e0 [ 287.897329] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 287.902349] ? prepare_exit_to_usermode+0x3b0/0x3b0 19:24:04 executing program 1 (fault-call:4 fault-nth:8): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 287.907362] ? recalc_sigpending_tsk+0x180/0x180 [ 287.912121] ? kasan_check_write+0x14/0x20 [ 287.916347] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.921239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.926419] RIP: 0033:0x457099 [ 287.929600] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.948505] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 19:24:04 executing program 3: [ 287.956240] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 287.963533] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 287.970814] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 287.978095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 287.985371] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000007 [ 287.993329] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 288.036406] FAULT_INJECTION: forcing a failure. [ 288.036406] name failslab, interval 1, probability 0, space 0, times 0 [ 288.047760] CPU: 0 PID: 11354 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 288.056265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.065628] Call Trace: [ 288.068253] dump_stack+0x1c9/0x2b4 [ 288.071898] ? dump_stack_print_info.cold.2+0x52/0x52 [ 288.077101] ? lock_acquire+0x1e4/0x4f0 [ 288.081090] ? seq_read+0x71/0x1150 [ 288.084743] should_fail.cold.4+0xa/0x11 [ 288.088827] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.093958] ? kasan_check_write+0x14/0x20 [ 288.098236] ? __mutex_lock+0x6d0/0x1700 [ 288.102321] ? graph_lock+0x170/0x170 [ 288.106142] ? __kasan_slab_free+0x11a/0x170 [ 288.110572] ? find_held_lock+0x36/0x1c0 [ 288.114652] ? __lock_is_held+0xb5/0x140 [ 288.118782] ? check_same_owner+0x340/0x340 [ 288.123128] ? rcu_note_context_switch+0x680/0x680 [ 288.128088] __should_failslab+0x124/0x180 [ 288.132341] should_failslab+0x9/0x14 [ 288.136170] kmem_cache_alloc_trace+0x2b5/0x730 [ 288.140877] ? lock_downgrade+0x8f0/0x8f0 [ 288.145055] proc_pid_stack+0xaa/0x390 [ 288.148973] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 288.154105] proc_single_show+0x101/0x190 [ 288.158308] seq_read+0x4af/0x1150 [ 288.161884] do_iter_read+0x49e/0x650 [ 288.165717] vfs_readv+0x175/0x1c0 [ 288.169287] ? compat_rw_copy_check_uvector+0x440/0x440 [ 288.174682] ? fget_raw+0x20/0x20 [ 288.178169] ? __sb_end_write+0xac/0xe0 [ 288.182180] do_preadv+0x1cc/0x280 19:24:04 executing program 7 (fault-call:5 fault-nth:8): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:04 executing program 3: [ 288.185765] ? do_readv+0x310/0x310 [ 288.189405] ? __ia32_sys_read+0xb0/0xb0 [ 288.193484] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.198865] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 288.203985] __x64_sys_preadv+0x9a/0xf0 [ 288.207978] do_syscall_64+0x1b9/0x820 [ 288.211880] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 288.212383] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 288.217268] ? syscall_return_slowpath+0x5e0/0x5e0 [ 288.217285] ? trace_hardirqs_on_caller+0x2b0/0x2b0 19:24:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 288.217302] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 288.217319] ? recalc_sigpending_tsk+0x180/0x180 [ 288.217340] ? kasan_check_write+0x14/0x20 [ 288.250084] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.254949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.260150] RIP: 0033:0x457099 [ 288.263355] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:24:04 executing program 1 (fault-call:4 fault-nth:9): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 288.265666] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 288.282267] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 288.282285] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 288.282294] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 288.282303] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 288.282312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 288.282322] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000008 [ 288.326838] FAULT_INJECTION: forcing a failure. [ 288.326838] name failslab, interval 1, probability 0, space 0, times 0 [ 288.347342] CPU: 0 PID: 11367 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 288.355847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.365226] Call Trace: [ 288.367834] dump_stack+0x1c9/0x2b4 [ 288.371479] ? dump_stack_print_info.cold.2+0x52/0x52 [ 288.376700] ? lock_acquire+0x1e4/0x4f0 [ 288.380694] ? seq_read+0x71/0x1150 [ 288.381984] FAULT_INJECTION: forcing a failure. [ 288.381984] name failslab, interval 1, probability 0, space 0, times 0 [ 288.384351] should_fail.cold.4+0xa/0x11 [ 288.384377] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.384406] ? kasan_check_write+0x14/0x20 [ 288.384435] ? __mutex_lock+0x6d0/0x1700 [ 288.413286] ? graph_lock+0x170/0x170 [ 288.417125] ? __kasan_slab_free+0x11a/0x170 [ 288.421566] ? find_held_lock+0x36/0x1c0 [ 288.425640] ? __lock_is_held+0xb5/0x140 [ 288.429722] ? check_same_owner+0x340/0x340 [ 288.434053] ? rcu_note_context_switch+0x680/0x680 [ 288.438994] __should_failslab+0x124/0x180 [ 288.443261] should_failslab+0x9/0x14 [ 288.447070] kmem_cache_alloc_trace+0x2b5/0x730 [ 288.451832] ? lock_downgrade+0x8f0/0x8f0 [ 288.455995] proc_pid_stack+0xaa/0x390 [ 288.459894] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 288.465015] proc_single_show+0x101/0x190 [ 288.469172] seq_read+0x4af/0x1150 [ 288.472734] do_iter_read+0x49e/0x650 [ 288.476555] vfs_readv+0x175/0x1c0 [ 288.480108] ? compat_rw_copy_check_uvector+0x440/0x440 [ 288.485491] ? fget_raw+0x20/0x20 [ 288.489049] ? __sb_end_write+0xac/0xe0 [ 288.493125] do_preadv+0x1cc/0x280 [ 288.496672] ? do_readv+0x310/0x310 [ 288.500303] ? __ia32_sys_read+0xb0/0xb0 [ 288.504372] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.509741] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 288.514855] __x64_sys_preadv+0x9a/0xf0 [ 288.518840] do_syscall_64+0x1b9/0x820 [ 288.522737] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 288.528343] ? syscall_return_slowpath+0x5e0/0x5e0 [ 288.533280] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 288.538301] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 288.543321] ? recalc_sigpending_tsk+0x180/0x180 [ 288.548084] ? kasan_check_write+0x14/0x20 [ 288.552329] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.557184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.562391] RIP: 0033:0x457099 [ 288.565590] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:24:05 executing program 3: [ 288.584495] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 288.592224] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 288.599498] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 288.606770] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 288.614040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 288.621310] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000008 [ 288.628604] CPU: 1 PID: 11372 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 19:24:05 executing program 7 (fault-call:5 fault-nth:9): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 288.637113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.646475] Call Trace: [ 288.649083] dump_stack+0x1c9/0x2b4 [ 288.652738] ? dump_stack_print_info.cold.2+0x52/0x52 [ 288.657942] ? lock_acquire+0x1e4/0x4f0 [ 288.661931] ? seq_read+0x71/0x1150 [ 288.665584] should_fail.cold.4+0xa/0x11 [ 288.669673] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.674787] ? seq_read+0x71/0x1150 [ 288.678434] ? kasan_check_write+0x14/0x20 [ 288.682704] ? __mutex_lock+0x6d0/0x1700 [ 288.686794] ? graph_lock+0x170/0x170 [ 288.690610] ? __kasan_slab_free+0x11a/0x170 [ 288.695034] ? find_held_lock+0x36/0x1c0 [ 288.699119] ? __lock_is_held+0xb5/0x140 [ 288.703227] ? check_same_owner+0x340/0x340 [ 288.707570] ? rcu_note_context_switch+0x680/0x680 [ 288.712522] __should_failslab+0x124/0x180 [ 288.716774] should_failslab+0x9/0x14 [ 288.720586] kmem_cache_alloc_trace+0x2b5/0x730 [ 288.725270] ? lock_downgrade+0x8f0/0x8f0 [ 288.729438] proc_pid_stack+0xaa/0x390 [ 288.733343] ? dname_to_vma_addr.isra.19+0x410/0x410 19:24:05 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x82000, 0x0) r3 = accept$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) syncfs(r3) [ 288.738465] proc_single_show+0x101/0x190 [ 288.742624] seq_read+0x4af/0x1150 [ 288.746197] do_iter_read+0x49e/0x650 [ 288.750029] vfs_readv+0x175/0x1c0 [ 288.753587] ? compat_rw_copy_check_uvector+0x440/0x440 [ 288.758975] ? fget_raw+0x20/0x20 [ 288.762449] ? __sb_end_write+0xac/0xe0 [ 288.766442] do_preadv+0x1cc/0x280 [ 288.770004] ? do_readv+0x310/0x310 [ 288.773745] ? __ia32_sys_read+0xb0/0xb0 [ 288.777822] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.783202] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 288.788334] __x64_sys_preadv+0x9a/0xf0 [ 288.792323] do_syscall_64+0x1b9/0x820 [ 288.796236] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 288.801620] ? syscall_return_slowpath+0x5e0/0x5e0 [ 288.806560] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 288.811589] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 288.816618] ? recalc_sigpending_tsk+0x180/0x180 [ 288.821385] ? kasan_check_write+0x14/0x20 [ 288.825636] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.830497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.835699] RIP: 0033:0x457099 [ 288.838910] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.840075] FAULT_INJECTION: forcing a failure. [ 288.840075] name failslab, interval 1, probability 0, space 0, times 0 [ 288.857814] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 288.857831] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 288.857841] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 288.857850] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 288.857859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 288.857869] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000009 [ 288.913900] CPU: 0 PID: 11379 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 288.922400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.931762] Call Trace: [ 288.934365] dump_stack+0x1c9/0x2b4 [ 288.938008] ? dump_stack_print_info.cold.2+0x52/0x52 [ 288.943226] ? lock_acquire+0x1e4/0x4f0 [ 288.947235] ? seq_read+0x71/0x1150 [ 288.950887] should_fail.cold.4+0xa/0x11 [ 288.954970] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.960096] ? kasan_check_write+0x14/0x20 [ 288.964343] ? __mutex_lock+0x6d0/0x1700 [ 288.968416] ? graph_lock+0x170/0x170 [ 288.972248] ? __kasan_slab_free+0x11a/0x170 [ 288.976668] ? find_held_lock+0x36/0x1c0 [ 288.980749] ? __lock_is_held+0xb5/0x140 [ 288.984835] ? check_same_owner+0x340/0x340 [ 288.989172] ? rcu_note_context_switch+0x680/0x680 [ 288.994166] __should_failslab+0x124/0x180 [ 288.998418] should_failslab+0x9/0x14 [ 289.002241] kmem_cache_alloc_trace+0x2b5/0x730 [ 289.007005] ? lock_downgrade+0x8f0/0x8f0 [ 289.011174] proc_pid_stack+0xaa/0x390 [ 289.015093] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 289.020245] proc_single_show+0x101/0x190 [ 289.024416] seq_read+0x4af/0x1150 [ 289.027987] do_iter_read+0x49e/0x650 [ 289.031797] vfs_readv+0x175/0x1c0 [ 289.035329] ? compat_rw_copy_check_uvector+0x440/0x440 [ 289.040687] ? fget_raw+0x20/0x20 [ 289.044134] ? __sb_end_write+0xac/0xe0 [ 289.048101] do_preadv+0x1cc/0x280 [ 289.051653] ? do_readv+0x310/0x310 [ 289.055303] ? __ia32_sys_read+0xb0/0xb0 [ 289.059360] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.064740] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 289.069876] __x64_sys_preadv+0x9a/0xf0 [ 289.073861] do_syscall_64+0x1b9/0x820 [ 289.077752] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.083103] ? syscall_return_slowpath+0x5e0/0x5e0 [ 289.088033] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 289.093040] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 289.098044] ? recalc_sigpending_tsk+0x180/0x180 [ 289.102800] ? kasan_check_write+0x14/0x20 [ 289.107043] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.111892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.117083] RIP: 0033:0x457099 [ 289.120263] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:24:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc8070031") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:05 executing program 1 (fault-call:4 fault-nth:10): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:05 executing program 3: 19:24:05 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext%\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:05 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_setaffinity(r1, 0x8, &(0x7f0000000080)=0x2) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f00000002c0)) [ 289.139159] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 289.146861] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 289.154138] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 289.161410] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 289.168665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 289.175932] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000009 19:24:05 executing program 7 (fault-call:5 fault-nth:10): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743405", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 289.256024] FAULT_INJECTION: forcing a failure. [ 289.256024] name failslab, interval 1, probability 0, space 0, times 0 [ 289.267341] CPU: 1 PID: 11395 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 289.275842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.285203] Call Trace: [ 289.287858] dump_stack+0x1c9/0x2b4 [ 289.291508] ? dump_stack_print_info.cold.2+0x52/0x52 [ 289.296730] ? lock_acquire+0x1e4/0x4f0 [ 289.300758] ? seq_read+0x71/0x1150 [ 289.300790] should_fail.cold.4+0xa/0x11 19:24:06 executing program 3: 19:24:06 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='veth1_to_team\x00') r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x480, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f00000000c0)=0x8) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) r3 = msgget(0x3, 0x18) r4 = semget$private(0x0, 0x1, 0x10) semctl$GETVAL(r4, 0x2, 0xc, &(0x7f0000000200)=""/117) msgctl$IPC_INFO(r3, 0x3, &(0x7f00000001c0)=""/27) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4H', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 289.300814] ? fault_create_debugfs_attr+0x1f0/0x1f0 19:24:06 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext\a\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 289.300841] ? kasan_check_write+0x14/0x20 19:24:06 executing program 7 (fault-call:5 fault-nth:11): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 289.300857] ? __mutex_lock+0x6d0/0x1700 [ 289.300875] ? graph_lock+0x170/0x170 19:24:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 289.300895] ? __kasan_slab_free+0x11a/0x170 19:24:06 executing program 3: [ 289.300915] ? find_held_lock+0x36/0x1c0 19:24:06 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd2f30a6070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) r2 = epoll_create1(0x80000) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x5, 0x44811, r2, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0xffffffffffffffff}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000080), 0x8) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x12}) 19:24:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 289.300937] ? __lock_is_held+0xb5/0x140 [ 289.300968] ? check_same_owner+0x340/0x340 [ 289.300988] ? rcu_note_context_switch+0x680/0x680 [ 289.301014] __should_failslab+0x124/0x180 [ 289.301036] should_failslab+0x9/0x14 [ 289.301053] kmem_cache_alloc_trace+0x2b5/0x730 [ 289.301071] ? lock_downgrade+0x8f0/0x8f0 [ 289.301100] proc_pid_stack+0xaa/0x390 [ 289.301124] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 289.301154] proc_single_show+0x101/0x190 [ 289.301175] seq_read+0x4af/0x1150 [ 289.301226] do_iter_read+0x49e/0x650 [ 289.301260] vfs_readv+0x175/0x1c0 [ 289.301284] ? compat_rw_copy_check_uvector+0x440/0x440 [ 289.301316] ? fget_raw+0x20/0x20 [ 289.301349] ? __sb_end_write+0xac/0xe0 [ 289.301377] do_preadv+0x1cc/0x280 [ 289.301400] ? do_readv+0x310/0x310 [ 289.301420] ? __ia32_sys_read+0xb0/0xb0 [ 289.301441] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.301461] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 289.301482] __x64_sys_preadv+0x9a/0xf0 [ 289.301504] do_syscall_64+0x1b9/0x820 [ 289.301524] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.301543] ? syscall_return_slowpath+0x5e0/0x5e0 [ 289.301563] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 289.301584] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 289.301601] ? recalc_sigpending_tsk+0x180/0x180 [ 289.301619] ? kasan_check_write+0x14/0x20 [ 289.301645] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.301672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.301686] RIP: 0033:0x457099 [ 289.301706] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.301717] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 289.301748] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 289.301759] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 289.301770] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 289.301780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 289.301791] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 000000000000000a [ 289.314287] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 289.346675] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 289.357132] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 289.369450] FAULT_INJECTION: forcing a failure. [ 289.369450] name failslab, interval 1, probability 0, space 0, times 0 [ 289.369474] CPU: 1 PID: 11417 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 289.369486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.369494] Call Trace: [ 289.369516] dump_stack+0x1c9/0x2b4 [ 289.369540] ? dump_stack_print_info.cold.2+0x52/0x52 [ 289.369558] ? lock_acquire+0x1e4/0x4f0 [ 289.369576] ? seq_read+0x71/0x1150 [ 289.369607] should_fail.cold.4+0xa/0x11 [ 289.369633] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.369659] ? kasan_check_write+0x14/0x20 [ 289.369676] ? __mutex_lock+0x6d0/0x1700 [ 289.369693] ? graph_lock+0x170/0x170 [ 289.369712] ? __kasan_slab_free+0x11a/0x170 [ 289.369746] ? find_held_lock+0x36/0x1c0 [ 289.369769] ? __lock_is_held+0xb5/0x140 [ 289.369803] ? check_same_owner+0x340/0x340 [ 289.369827] ? rcu_note_context_switch+0x680/0x680 [ 289.369862] __should_failslab+0x124/0x180 [ 289.369883] should_failslab+0x9/0x14 [ 289.369904] kmem_cache_alloc_trace+0x2b5/0x730 [ 289.369923] ? lock_downgrade+0x8f0/0x8f0 [ 289.369949] proc_pid_stack+0xaa/0x390 [ 289.369972] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 289.370000] proc_single_show+0x101/0x190 [ 289.370021] seq_read+0x4af/0x1150 [ 289.370058] do_iter_read+0x49e/0x650 [ 289.370088] vfs_readv+0x175/0x1c0 [ 289.370113] ? compat_rw_copy_check_uvector+0x440/0x440 [ 289.370141] ? fget_raw+0x20/0x20 [ 289.370171] ? __sb_end_write+0xac/0xe0 [ 289.370200] do_preadv+0x1cc/0x280 [ 289.370238] ? do_readv+0x310/0x310 [ 289.370256] ? __ia32_sys_read+0xb0/0xb0 [ 289.370275] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.370295] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 289.370315] __x64_sys_preadv+0x9a/0xf0 [ 289.370337] do_syscall_64+0x1b9/0x820 [ 289.370357] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.370379] ? syscall_return_slowpath+0x5e0/0x5e0 [ 289.370397] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 289.370416] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 289.370434] ? recalc_sigpending_tsk+0x180/0x180 [ 289.370452] ? kasan_check_write+0x14/0x20 [ 289.370476] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.370502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.370515] RIP: 0033:0x457099 [ 289.370534] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.370543] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 289.370563] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 289.370573] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 289.370585] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 289.370597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 289.370607] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 000000000000000a [ 289.374575] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 289.442252] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 289.661182] FAULT_INJECTION: forcing a failure. [ 289.661182] name failslab, interval 1, probability 0, space 0, times 0 [ 289.661205] CPU: 0 PID: 11451 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 289.661235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.661241] Call Trace: [ 289.661262] dump_stack+0x1c9/0x2b4 [ 289.661283] ? dump_stack_print_info.cold.2+0x52/0x52 [ 289.661298] ? lock_acquire+0x1e4/0x4f0 [ 289.661316] ? seq_read+0x71/0x1150 [ 289.661345] should_fail.cold.4+0xa/0x11 [ 289.661369] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.661396] ? kasan_check_write+0x14/0x20 [ 289.661411] ? __mutex_lock+0x6d0/0x1700 [ 289.661426] ? graph_lock+0x170/0x170 [ 289.661443] ? __kasan_slab_free+0x11a/0x170 [ 289.661462] ? find_held_lock+0x36/0x1c0 [ 289.661481] ? __lock_is_held+0xb5/0x140 [ 289.661510] ? check_same_owner+0x340/0x340 [ 289.661529] ? rcu_note_context_switch+0x680/0x680 [ 289.661551] __should_failslab+0x124/0x180 [ 289.661569] should_failslab+0x9/0x14 [ 289.661585] kmem_cache_alloc_trace+0x2b5/0x730 [ 289.661600] ? lock_downgrade+0x8f0/0x8f0 [ 289.661624] proc_pid_stack+0xaa/0x390 [ 289.661644] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 289.661670] proc_single_show+0x101/0x190 [ 289.661689] seq_read+0x4af/0x1150 [ 289.661721] do_iter_read+0x49e/0x650 [ 289.661754] vfs_readv+0x175/0x1c0 [ 289.661777] ? compat_rw_copy_check_uvector+0x440/0x440 [ 289.661805] ? fget_raw+0x20/0x20 [ 289.661833] ? __sb_end_write+0xac/0xe0 [ 289.661868] do_preadv+0x1cc/0x280 [ 289.661891] ? do_readv+0x310/0x310 [ 289.661910] ? __ia32_sys_read+0xb0/0xb0 [ 289.661929] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.661947] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 289.661968] __x64_sys_preadv+0x9a/0xf0 [ 289.661988] do_syscall_64+0x1b9/0x820 [ 289.662007] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.662029] ? syscall_return_slowpath+0x5e0/0x5e0 [ 289.662048] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 289.662067] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 289.662083] ? recalc_sigpending_tsk+0x180/0x180 [ 289.662101] ? kasan_check_write+0x14/0x20 [ 289.662125] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.662153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.662165] RIP: 0033:0x457099 19:24:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f8571") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:07 executing program 1 (fault-call:4 fault-nth:11): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:07 executing program 7 (fault-call:5 fault-nth:12): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:07 executing program 3: [ 289.662184] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.662193] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 289.662247] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 289.662259] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 289.662269] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 289.662279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 289.662289] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 000000000000000b 19:24:07 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578741100", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:07 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434f6", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='e\nt4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 290.814865] FAULT_INJECTION: forcing a failure. [ 290.814865] name failslab, interval 1, probability 0, space 0, times 0 [ 290.826273] CPU: 1 PID: 11502 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 290.834784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.844150] Call Trace: [ 290.846766] dump_stack+0x1c9/0x2b4 [ 290.850418] ? dump_stack_print_info.cold.2+0x52/0x52 [ 290.855626] ? lock_acquire+0x1e4/0x4f0 [ 290.859621] ? seq_read+0x71/0x1150 [ 290.863279] should_fail.cold.4+0xa/0x11 [ 290.867368] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 290.872493] ? kasan_check_write+0x14/0x20 [ 290.876752] ? __mutex_lock+0x6d0/0x1700 [ 290.880832] ? graph_lock+0x170/0x170 [ 290.884661] ? __kasan_slab_free+0x11a/0x170 [ 290.889100] ? find_held_lock+0x36/0x1c0 [ 290.893192] ? __lock_is_held+0xb5/0x140 [ 290.897393] ? atkbd_set_leds+0x308/0x510 [ 290.901575] ? check_same_owner+0x340/0x340 [ 290.905941] ? rcu_note_context_switch+0x680/0x680 [ 290.905971] __should_failslab+0x124/0x180 19:24:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 290.905993] should_failslab+0x9/0x14 [ 290.906013] kmem_cache_alloc_trace+0x2b5/0x730 [ 290.906032] ? lock_downgrade+0x8f0/0x8f0 [ 290.906057] proc_pid_stack+0xaa/0x390 [ 290.930448] FAULT_INJECTION: forcing a failure. [ 290.930448] name failslab, interval 1, probability 0, space 0, times 0 [ 290.931694] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 290.931728] proc_single_show+0x101/0x190 [ 290.931751] seq_read+0x4af/0x1150 [ 290.931784] do_iter_read+0x49e/0x650 [ 290.931812] vfs_readv+0x175/0x1c0 [ 290.963079] ? compat_rw_copy_check_uvector+0x440/0x440 [ 290.968460] ? fget_raw+0x20/0x20 [ 290.971930] ? __sb_end_write+0xac/0xe0 [ 290.975927] do_preadv+0x1cc/0x280 [ 290.979475] ? do_readv+0x310/0x310 [ 290.983106] ? __ia32_sys_read+0xb0/0xb0 [ 290.987173] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.992541] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 290.997648] __x64_sys_preadv+0x9a/0xf0 [ 291.001634] do_syscall_64+0x1b9/0x820 [ 291.005530] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 291.010902] ? syscall_return_slowpath+0x5e0/0x5e0 [ 291.015842] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.020691] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 291.025726] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 291.030757] ? prepare_exit_to_usermode+0x291/0x3b0 [ 291.035782] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.040647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.045835] RIP: 0033:0x457099 [ 291.049031] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.068017] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 291.075737] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 291.083010] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 291.090279] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 291.097549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 291.104836] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 000000000000000b [ 291.112235] CPU: 0 PID: 11498 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 291.120734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.130100] Call Trace: [ 291.132710] dump_stack+0x1c9/0x2b4 [ 291.136353] ? dump_stack_print_info.cold.2+0x52/0x52 [ 291.141552] ? lock_acquire+0x1e4/0x4f0 [ 291.145536] ? seq_read+0x71/0x1150 [ 291.149187] should_fail.cold.4+0xa/0x11 [ 291.153282] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 291.158408] ? kasan_check_write+0x14/0x20 [ 291.162651] ? __mutex_lock+0x6d0/0x1700 [ 291.166723] ? graph_lock+0x170/0x170 [ 291.170539] ? __kasan_slab_free+0x11a/0x170 [ 291.174964] ? find_held_lock+0x36/0x1c0 [ 291.179038] ? __lock_is_held+0xb5/0x140 [ 291.183168] ? hci_connect_le+0x1048/0x1530 [ 291.187532] ? check_same_owner+0x340/0x340 [ 291.191870] ? rcu_note_context_switch+0x680/0x680 [ 291.196816] __should_failslab+0x124/0x180 [ 291.201162] should_failslab+0x9/0x14 [ 291.204974] kmem_cache_alloc_trace+0x2b5/0x730 [ 291.209657] ? lock_downgrade+0x8f0/0x8f0 19:24:07 executing program 1 (fault-call:4 fault-nth:12): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:07 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) fstat(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@multicast1, @in6=@mcast1, 0x4e20, 0x0, 0x4e23, 0x4, 0xa, 0xa0, 0x20, 0xff, r2, r3}, {0x10000, 0x8, 0x1, 0x1, 0x3, 0x100000000, 0x1, 0x3}, {0x9, 0x81, 0x5, 0xe0}, 0x44223c8d, 0x6e6bb3, 0x2, 0x0, 0x1, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x1b}, 0x4d4, 0x2b}, 0xa, @in, 0x3506, 0x7, 0x0, 0xfffffffffffffff8, 0x4, 0xdcf8, 0x8000}}, 0xe8) ioctl$TIOCNOTTY(r1, 0x5422) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, &(0x7f0000000140)={r4, r5+10000000}, &(0x7f0000000180)={0xfffffffffffffffd}, 0xfe2c) memfd_create(&(0x7f00000000c0)="90657468302e6370757365742300", 0x3) [ 291.213828] proc_pid_stack+0xaa/0x390 [ 291.217728] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 291.222850] proc_single_show+0x101/0x190 [ 291.227019] seq_read+0x4af/0x1150 [ 291.230589] do_iter_read+0x49e/0x650 [ 291.234417] vfs_readv+0x175/0x1c0 [ 291.237977] ? compat_rw_copy_check_uvector+0x440/0x440 [ 291.243366] ? fget_raw+0x20/0x20 [ 291.246832] ? schedule+0xfb/0x450 [ 291.250383] ? __schedule+0x1df0/0x1df0 [ 291.254374] ? exit_to_usermode_loop+0x8c/0x380 [ 291.259055] ? exit_to_usermode_loop+0x8c/0x380 [ 291.263747] ? trace_hardirqs_off+0xb8/0x2b0 [ 291.268172] ? __sb_end_write+0xac/0xe0 [ 291.272171] ? do_syscall_64+0x6be/0x820 [ 291.276347] do_preadv+0x1cc/0x280 [ 291.279911] ? do_readv+0x310/0x310 [ 291.283554] ? exit_to_usermode_loop+0x1f4/0x380 [ 291.288335] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.293710] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 291.298830] __x64_sys_preadv+0x9a/0xf0 [ 291.302816] do_syscall_64+0x1b9/0x820 [ 291.306717] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 291.312091] ? syscall_return_slowpath+0x5e0/0x5e0 19:24:08 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='extc\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 291.317030] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 291.322059] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 291.327086] ? recalc_sigpending_tsk+0x180/0x180 [ 291.331855] ? kasan_check_write+0x14/0x20 [ 291.336112] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.340978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.346179] RIP: 0033:0x457099 19:24:08 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000800)={0x9, 0x0, [{0x107000, 0x9d, &(0x7f00000001c0)=""/157}, {0x0, 0xf8, &(0x7f00000002c0)=""/248}, {0x0, 0xc9, &(0x7f00000003c0)=""/201}, {0xf000, 0x16, &(0x7f0000000000)=""/22}, {0x12002, 0x93, &(0x7f00000004c0)=""/147}, {0x2000, 0x8, &(0x7f0000000080)=""/8}, {0x3000, 0xa3, &(0x7f0000000580)=""/163}, {0x3000, 0xb5, &(0x7f0000000640)=""/181}, {0x11d004, 0xd0, &(0x7f0000000700)=""/208}]}) [ 291.349399] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.368313] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 291.376033] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 291.383312] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 291.390584] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 291.398357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 291.405637] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 000000000000000c [ 291.420075] FAULT_INJECTION: forcing a failure. [ 291.420075] name failslab, interval 1, probability 0, space 0, times 0 [ 291.431440] CPU: 0 PID: 11529 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 291.439941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.449304] Call Trace: [ 291.451912] dump_stack+0x1c9/0x2b4 [ 291.455554] ? dump_stack_print_info.cold.2+0x52/0x52 [ 291.460758] ? lock_acquire+0x1e4/0x4f0 [ 291.464748] ? seq_read+0x71/0x1150 19:24:08 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x80001, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000000480)=""/7, &(0x7f00000004c0)=0x7) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240)={0x3000, 0x2, 0x0, 0xffff}, &(0x7f0000000280)=0x10) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x201, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xaf2}) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r0, &(0x7f0000000400), 0xfffffffffffffff9) r5 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0xffffffffffffffff) stat(&(0x7f0000000200)='./bus\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$random(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0x1, 0x0) quotactl(0x0, &(0x7f0000000180)='./bus\x00', r6, &(0x7f00000003c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r5, 0x0) read(r3, &(0x7f0000000080)=""/19, 0xffffff5c) creat(&(0x7f00000001c0)='./bus\x00', 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000740)) r7 = socket(0x0, 0x0, 0x0) lseek(r2, 0x0, 0x0) gettid() syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') sendfile(r7, 0xffffffffffffffff, &(0x7f0000000040), 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000580)={0xfff}, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000600)={'vcan0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x104000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20004800}, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='ifb0\x00', 0x3}) [ 291.468404] should_fail.cold.4+0xa/0x11 [ 291.472491] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 291.477638] ? kasan_check_write+0x14/0x20 [ 291.481895] ? __mutex_lock+0x6d0/0x1700 [ 291.485975] ? graph_lock+0x170/0x170 [ 291.489787] ? __kasan_slab_free+0x11a/0x170 [ 291.494233] ? find_held_lock+0x36/0x1c0 [ 291.498319] ? __lock_is_held+0xb5/0x140 [ 291.502414] ? check_same_owner+0x340/0x340 [ 291.506766] ? rcu_note_context_switch+0x680/0x680 [ 291.511721] __should_failslab+0x124/0x180 [ 291.515979] should_failslab+0x9/0x14 19:24:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 291.519794] kmem_cache_alloc_trace+0x2b5/0x730 [ 291.524480] ? lock_downgrade+0x8f0/0x8f0 [ 291.528651] proc_pid_stack+0xaa/0x390 [ 291.532559] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 291.537693] proc_single_show+0x101/0x190 [ 291.541861] seq_read+0x4af/0x1150 [ 291.545436] do_iter_read+0x49e/0x650 [ 291.549272] vfs_readv+0x175/0x1c0 [ 291.552833] ? compat_rw_copy_check_uvector+0x440/0x440 [ 291.558246] ? fget_raw+0x20/0x20 [ 291.561734] ? __sb_end_write+0xac/0xe0 [ 291.565741] do_preadv+0x1cc/0x280 [ 291.569305] ? do_readv+0x310/0x310 [ 291.572950] ? __ia32_sys_read+0xb0/0xb0 [ 291.577028] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.582408] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 291.587525] __x64_sys_preadv+0x9a/0xf0 [ 291.591519] do_syscall_64+0x1b9/0x820 [ 291.595422] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 291.600827] ? syscall_return_slowpath+0x5e0/0x5e0 [ 291.605772] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 291.610800] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 291.615914] ? recalc_sigpending_tsk+0x180/0x180 [ 291.620683] ? kasan_check_write+0x14/0x20 [ 291.624940] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.629800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.635000] RIP: 0033:0x457099 [ 291.638206] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.657250] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 291.664971] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 291.672252] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 291.679525] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 291.686795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 291.694068] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 000000000000000c [ 291.809924] EXT4-fs: 12 callbacks suppressed [ 291.809939] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 291.828449] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 291.839316] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 291.903051] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 291.914948] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 291.927696] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f857140") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:08 executing program 7 (fault-call:5 fault-nth:13): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:08 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) write$P9_RSTAT(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="6f0000007d020000006800ff0f0200000042000000000000000000000000041f001e001f00000000000100000000000f002f6465762f06007175656e6365720008002b73656c696e75780f002f6465762f73657175656e636572000f002f6465762f73657175656e63657200000000000000"], 0x6f) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000000)={0x0, 0x989680}, &(0x7f0000000180), 0xfeb5) 19:24:08 executing program 1 (fault-call:4 fault-nth:13): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:08 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 292.223596] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 292.228462] FAULT_INJECTION: forcing a failure. [ 292.228462] name failslab, interval 1, probability 0, space 0, times 0 [ 292.243816] CPU: 1 PID: 11595 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 292.252322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.254202] FAULT_INJECTION: forcing a failure. [ 292.254202] name failslab, interval 1, probability 0, space 0, times 0 [ 292.261680] Call Trace: [ 292.261704] dump_stack+0x1c9/0x2b4 [ 292.261736] ? dump_stack_print_info.cold.2+0x52/0x52 [ 292.261762] ? lock_acquire+0x1e4/0x4f0 [ 292.288267] ? seq_read+0x71/0x1150 [ 292.291909] should_fail.cold.4+0xa/0x11 [ 292.295980] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.301095] ? kasan_check_write+0x14/0x20 [ 292.305333] ? __mutex_lock+0x6d0/0x1700 [ 292.309400] ? graph_lock+0x170/0x170 [ 292.313207] ? __kasan_slab_free+0x11a/0x170 [ 292.317634] ? find_held_lock+0x36/0x1c0 [ 292.321703] ? __lock_is_held+0xb5/0x140 [ 292.325786] ? check_same_owner+0x340/0x340 [ 292.330114] ? rcu_note_context_switch+0x680/0x680 [ 292.335057] __should_failslab+0x124/0x180 [ 292.339302] should_failslab+0x9/0x14 [ 292.343108] kmem_cache_alloc_trace+0x2b5/0x730 [ 292.347867] ? lock_downgrade+0x8f0/0x8f0 [ 292.352034] proc_pid_stack+0xaa/0x390 [ 292.355929] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 292.361050] proc_single_show+0x101/0x190 [ 292.365205] seq_read+0x4af/0x1150 [ 292.368781] do_iter_read+0x49e/0x650 [ 292.372596] vfs_readv+0x175/0x1c0 [ 292.376150] ? compat_rw_copy_check_uvector+0x440/0x440 [ 292.381529] ? fget_raw+0x20/0x20 [ 292.384997] ? __sb_end_write+0xac/0xe0 [ 292.388987] do_preadv+0x1cc/0x280 [ 292.392537] ? do_readv+0x310/0x310 [ 292.396459] ? __ia32_sys_read+0xb0/0xb0 [ 292.400531] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.405898] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 292.411007] __x64_sys_preadv+0x9a/0xf0 [ 292.414990] do_syscall_64+0x1b9/0x820 [ 292.418883] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.424255] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.429188] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.434044] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 292.439067] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 292.444088] ? prepare_exit_to_usermode+0x291/0x3b0 [ 292.449113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.453970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.459162] RIP: 0033:0x457099 [ 292.462360] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.481264] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 292.488980] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 292.496255] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 292.503528] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 292.510798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 292.518067] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 000000000000000d [ 292.525796] CPU: 0 PID: 11592 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 292.534087] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 292.534294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.534306] Call Trace: [ 292.555073] dump_stack+0x1c9/0x2b4 [ 292.558721] ? dump_stack_print_info.cold.2+0x52/0x52 [ 292.563924] ? lock_acquire+0x1e4/0x4f0 [ 292.567912] ? seq_read+0x71/0x1150 19:24:09 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @rand_addr}, 0x3, 0x4, 0x4, 0x3}}, 0x2e) ppoll(&(0x7f0000000040)=[{}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) dup3(r0, r0, 0x80000) socket$rds(0x15, 0x5, 0x0) [ 292.571559] should_fail.cold.4+0xa/0x11 [ 292.575638] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.580766] ? kasan_check_write+0x14/0x20 [ 292.585020] ? __mutex_lock+0x6d0/0x1700 [ 292.589094] ? graph_lock+0x170/0x170 [ 292.592911] ? __kasan_slab_free+0x11a/0x170 [ 292.597332] ? find_held_lock+0x36/0x1c0 [ 292.601414] ? __lock_is_held+0xb5/0x140 [ 292.605505] ? check_same_owner+0x340/0x340 [ 292.609842] ? rcu_note_context_switch+0x680/0x680 [ 292.614790] __should_failslab+0x124/0x180 [ 292.619043] should_failslab+0x9/0x14 19:24:09 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) r2 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000000000000b0700c0ff0f00000700000005000000645100000200000000000800000d6e0079a51b7f05e5f8b965a76630f038445e385d0f7590a030b6bbc77bc3475b1fdddc9068df61931f00408943cacfcaaf6519b6205a704de276b0245bbb6a"]) [ 292.622887] kmem_cache_alloc_trace+0x2b5/0x730 19:24:09 executing program 1 (fault-call:4 fault-nth:14): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 292.622905] ? lock_downgrade+0x8f0/0x8f0 19:24:09 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 292.622928] proc_pid_stack+0xaa/0x390 19:24:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743405", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 292.622947] ? dname_to_vma_addr.isra.19+0x410/0x410 19:24:09 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40000) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x768) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:24:09 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) socket$alg(0x26, 0x5, 0x0) 19:24:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 292.622972] proc_single_show+0x101/0x190 [ 292.622991] seq_read+0x4af/0x1150 [ 292.623024] do_iter_read+0x49e/0x650 [ 292.623051] vfs_readv+0x175/0x1c0 19:24:09 executing program 1 (fault-call:4 fault-nth:15): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 292.623073] ? compat_rw_copy_check_uvector+0x440/0x440 [ 292.623101] ? fget_raw+0x20/0x20 [ 292.623129] ? __sb_end_write+0xac/0xe0 [ 292.623154] do_preadv+0x1cc/0x280 [ 292.623172] ? do_readv+0x310/0x310 [ 292.623187] ? __ia32_sys_read+0xb0/0xb0 [ 292.623205] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.623240] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 292.623259] __x64_sys_preadv+0x9a/0xf0 [ 292.623279] do_syscall_64+0x1b9/0x820 [ 292.623295] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.623313] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.623329] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 292.623346] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 292.623361] ? recalc_sigpending_tsk+0x180/0x180 [ 292.623376] ? kasan_check_write+0x14/0x20 [ 292.623396] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.623419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.623432] RIP: 0033:0x457099 [ 292.623448] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.623457] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 292.623474] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 292.623484] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 292.623493] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 292.623502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 292.623511] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 000000000000000d [ 292.628826] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 292.648667] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 292.841162] FAULT_INJECTION: forcing a failure. [ 292.841162] name failslab, interval 1, probability 0, space 0, times 0 [ 292.841186] CPU: 0 PID: 11632 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 292.841196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.841203] Call Trace: [ 292.841242] dump_stack+0x1c9/0x2b4 [ 292.841265] ? dump_stack_print_info.cold.2+0x52/0x52 [ 292.841283] ? lock_acquire+0x1e4/0x4f0 [ 292.841301] ? seq_read+0x71/0x1150 [ 292.841332] should_fail.cold.4+0xa/0x11 [ 292.841354] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.841380] ? kasan_check_write+0x14/0x20 [ 292.841396] ? __mutex_lock+0x6d0/0x1700 [ 292.841416] ? graph_lock+0x170/0x170 [ 292.841436] ? __kasan_slab_free+0x11a/0x170 [ 292.841459] ? find_held_lock+0x36/0x1c0 [ 292.841482] ? __lock_is_held+0xb5/0x140 [ 292.841516] ? check_same_owner+0x340/0x340 [ 292.841539] ? rcu_note_context_switch+0x680/0x680 [ 292.841565] __should_failslab+0x124/0x180 [ 292.841587] should_failslab+0x9/0x14 [ 292.841605] kmem_cache_alloc_trace+0x2b5/0x730 [ 292.841622] ? lock_downgrade+0x8f0/0x8f0 [ 292.841650] proc_pid_stack+0xaa/0x390 [ 292.841673] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 292.841700] proc_single_show+0x101/0x190 [ 292.841720] seq_read+0x4af/0x1150 [ 292.841760] do_iter_read+0x49e/0x650 [ 292.841791] vfs_readv+0x175/0x1c0 [ 292.841816] ? compat_rw_copy_check_uvector+0x440/0x440 [ 292.841857] ? fget_raw+0x20/0x20 [ 292.841891] ? __sb_end_write+0xac/0xe0 [ 292.841921] do_preadv+0x1cc/0x280 [ 292.841943] ? do_readv+0x310/0x310 [ 292.841964] ? __ia32_sys_read+0xb0/0xb0 [ 292.841984] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.842002] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 292.842022] __x64_sys_preadv+0x9a/0xf0 [ 292.842043] do_syscall_64+0x1b9/0x820 [ 292.842062] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.842082] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.842102] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 292.842122] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 292.842139] ? recalc_sigpending_tsk+0x180/0x180 [ 292.842157] ? kasan_check_write+0x14/0x20 [ 292.842178] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.842204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.842236] RIP: 0033:0x457099 [ 292.842255] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.842265] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 292.842284] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 292.842295] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 292.842305] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 292.842314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 292.842324] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 000000000000000e [ 293.031143] FAULT_INJECTION: forcing a failure. [ 293.031143] name failslab, interval 1, probability 0, space 0, times 0 [ 293.031166] CPU: 0 PID: 11666 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 293.031176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.031182] Call Trace: [ 293.031200] dump_stack+0x1c9/0x2b4 [ 293.031239] ? dump_stack_print_info.cold.2+0x52/0x52 [ 293.031256] ? lock_acquire+0x1e4/0x4f0 [ 293.031274] ? seq_read+0x71/0x1150 [ 293.031300] should_fail.cold.4+0xa/0x11 [ 293.031321] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 293.031347] ? kasan_check_write+0x14/0x20 [ 293.031362] ? __mutex_lock+0x6d0/0x1700 [ 293.031377] ? graph_lock+0x170/0x170 [ 293.031393] ? __kasan_slab_free+0x11a/0x170 [ 293.031411] ? find_held_lock+0x36/0x1c0 [ 293.031431] ? __lock_is_held+0xb5/0x140 [ 293.031511] ? help+0x3c8/0x4d3 [ 293.031546] ? check_same_owner+0x340/0x340 [ 293.031568] ? rcu_note_context_switch+0x680/0x680 [ 293.031593] __should_failslab+0x124/0x180 [ 293.031613] should_failslab+0x9/0x14 [ 293.031629] kmem_cache_alloc_trace+0x2b5/0x730 [ 293.031651] ? lock_downgrade+0x8f0/0x8f0 [ 293.031677] proc_pid_stack+0xaa/0x390 [ 293.031699] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 293.031724] proc_single_show+0x101/0x190 [ 293.031749] seq_read+0x4af/0x1150 [ 293.031786] do_iter_read+0x49e/0x650 [ 293.031816] vfs_readv+0x175/0x1c0 [ 293.031840] ? compat_rw_copy_check_uvector+0x440/0x440 [ 293.031873] ? fget_raw+0x20/0x20 [ 293.031905] ? __sb_end_write+0xac/0xe0 [ 293.031931] do_preadv+0x1cc/0x280 [ 293.031952] ? do_readv+0x310/0x310 [ 293.031967] ? __ia32_sys_read+0xb0/0xb0 [ 293.031984] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.032000] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 293.032019] __x64_sys_preadv+0x9a/0xf0 [ 293.032038] do_syscall_64+0x1b9/0x820 [ 293.032054] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 293.032072] ? syscall_return_slowpath+0x5e0/0x5e0 [ 293.032088] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 293.032105] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 293.032120] ? recalc_sigpending_tsk+0x180/0x180 [ 293.032135] ? kasan_check_write+0x14/0x20 [ 293.032156] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.032180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.032191] RIP: 0033:0x457099 [ 293.032227] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.032239] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 293.032258] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 293.032271] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 293.032283] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 19:24:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x0) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:10 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/route\x00') setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000), 0x4) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 19:24:10 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f00000002c0)=@ethtool_drvinfo={0x3, "777ec9f98f0bc6c1f336e50951b37109bbe5a5cad2dcbb8ff11b68b22033511b", "75975059f877b48762c236310751cd44290b694d77f92025e92efa145f1a1f7f", "684038b4a38d2bea311e902e1fb195daaa8bad57afda9111480b666da1d6dbf5", "67799a10859d43d73a7a1560d993e47c0da1978f4fa473eae006209f6c976db1", "76c24accc55b7952475967626759de2b0eca575cfd405cfb0d0d5f8a0ae3e771", "6fef2d3d9da0191b072797c6", 0x7, 0x5, 0xffffffff, 0x0, 0x8e32}}) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000000)={0x0, 0xf05, 0x8}, 0xc) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0x20, 0x2) 19:24:10 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext48', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:10 executing program 1 (fault-call:4 fault-nth:16): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:10 executing program 7 (fault-call:5 fault-nth:14): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 293.032294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 293.032305] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 000000000000000f [ 293.952692] FAULT_INJECTION: forcing a failure. [ 293.952692] name failslab, interval 1, probability 0, space 0, times 0 [ 293.964234] CPU: 0 PID: 11688 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 293.972076] FAULT_INJECTION: forcing a failure. [ 293.972076] name failslab, interval 1, probability 0, space 0, times 0 [ 293.972734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.972742] Call Trace: [ 293.972764] dump_stack+0x1c9/0x2b4 [ 293.972788] ? dump_stack_print_info.cold.2+0x52/0x52 [ 293.972816] ? lock_acquire+0x1e4/0x4f0 [ 294.008676] ? seq_read+0x71/0x1150 [ 294.012323] should_fail.cold.4+0xa/0x11 [ 294.016403] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 294.021521] ? kasan_check_write+0x14/0x20 [ 294.025779] ? __mutex_lock+0x6d0/0x1700 [ 294.029857] ? graph_lock+0x170/0x170 [ 294.033667] ? __kasan_slab_free+0x11a/0x170 [ 294.038081] ? find_held_lock+0x36/0x1c0 [ 294.042152] ? __lock_is_held+0xb5/0x140 [ 294.046581] ? check_same_owner+0x340/0x340 [ 294.050910] ? rcu_note_context_switch+0x680/0x680 [ 294.055849] __should_failslab+0x124/0x180 [ 294.060096] should_failslab+0x9/0x14 [ 294.063904] kmem_cache_alloc_trace+0x2b5/0x730 [ 294.068580] ? lock_downgrade+0x8f0/0x8f0 [ 294.072741] proc_pid_stack+0xaa/0x390 [ 294.076642] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 294.081758] proc_single_show+0x101/0x190 [ 294.085917] seq_read+0x4af/0x1150 [ 294.089478] do_iter_read+0x49e/0x650 [ 294.093305] vfs_readv+0x175/0x1c0 [ 294.096857] ? compat_rw_copy_check_uvector+0x440/0x440 [ 294.102253] ? fget_raw+0x20/0x20 [ 294.105729] ? __sb_end_write+0xac/0xe0 [ 294.109718] do_preadv+0x1cc/0x280 [ 294.113269] ? do_readv+0x310/0x310 [ 294.116902] ? __ia32_sys_read+0xb0/0xb0 [ 294.120970] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.126339] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 294.131453] __x64_sys_preadv+0x9a/0xf0 [ 294.135439] do_syscall_64+0x1b9/0x820 [ 294.139334] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 294.144723] ? syscall_return_slowpath+0x5e0/0x5e0 [ 294.149662] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 294.154770] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 294.159800] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.164658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.169849] RIP: 0033:0x457099 [ 294.173057] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.191959] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 294.199679] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 294.206950] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 294.214251] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 294.221523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 294.228795] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000010 [ 294.236098] CPU: 1 PID: 11709 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 294.244604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 19:24:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:10 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 294.253982] Call Trace: [ 294.254005] dump_stack+0x1c9/0x2b4 [ 294.254025] ? dump_stack_print_info.cold.2+0x52/0x52 [ 294.265425] ? lock_acquire+0x1e4/0x4f0 [ 294.269412] ? seq_read+0x71/0x1150 [ 294.273062] should_fail.cold.4+0xa/0x11 [ 294.277146] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 294.282272] ? kasan_check_write+0x14/0x20 [ 294.286540] ? __mutex_lock+0x6d0/0x1700 [ 294.290651] ? graph_lock+0x170/0x170 [ 294.294467] ? __kasan_slab_free+0x11a/0x170 [ 294.298894] ? find_held_lock+0x36/0x1c0 19:24:10 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x40, 0x220200) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000002c0)={r0, 0x1, 0xffff, "34db6e3344537b35ac708b19f8a26170b529a13c45843bf6d644f39b3564c1244bbda317ad5984abd41fd9d09f8be08ec4b3ef9248a5fa32c1740ef40bf7d3a9ba9c565a1d16d8b90cb42fdfed43776ce8f4164bbb6fbe32a0dfe7cd1c0af9c9ce194a4e21fd3dc63cf1600232813c86fa573dec047b5e123d5045efb5c82223cf5877a92a87080f691da94ce4dedfa07516d16b7fb228fca52dc585297c2ba9ec6a56b952595fae72d331760b7fe835212d91abf12e5a580ed9347e0025dba4a04a8063838a6d0c7c39a45c6a41a9646b96808d"}) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) [ 294.302984] ? __lock_is_held+0xb5/0x140 [ 294.307143] ? __irqentry_text_end+0x172bf8/0x1f9f00 [ 294.312278] ? check_same_owner+0x340/0x340 [ 294.316623] ? rcu_note_context_switch+0x680/0x680 [ 294.321573] __should_failslab+0x124/0x180 [ 294.325824] should_failslab+0x9/0x14 [ 294.329638] kmem_cache_alloc_trace+0x2b5/0x730 [ 294.334332] ? lock_downgrade+0x8f0/0x8f0 [ 294.338502] proc_pid_stack+0xaa/0x390 [ 294.342505] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 294.347630] proc_single_show+0x101/0x190 [ 294.351798] seq_read+0x4af/0x1150 [ 294.355374] do_iter_read+0x49e/0x650 [ 294.359202] vfs_readv+0x175/0x1c0 [ 294.362784] ? compat_rw_copy_check_uvector+0x440/0x440 [ 294.368173] ? fget_raw+0x20/0x20 [ 294.371662] ? __sb_end_write+0xac/0xe0 [ 294.375658] do_preadv+0x1cc/0x280 [ 294.379228] ? do_readv+0x310/0x310 [ 294.382870] ? __ia32_sys_read+0xb0/0xb0 [ 294.386956] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.392333] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 294.397768] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 294.403322] __x64_sys_preadv+0x9a/0xf0 [ 294.407666] do_syscall_64+0x1b9/0x820 [ 294.411570] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 294.416950] ? syscall_return_slowpath+0x5e0/0x5e0 [ 294.421899] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 294.426934] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 294.431963] ? recalc_sigpending_tsk+0x180/0x180 [ 294.436746] ? kasan_check_write+0x14/0x20 [ 294.441024] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.445888] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.451087] RIP: 0033:0x457099 [ 294.454292] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.473203] RSP: 002b:00007f9849366c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 294.481055] RAX: ffffffffffffffda RBX: 00007f98493676d4 RCX: 0000000000457099 [ 294.488331] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000003 [ 294.495606] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 294.502883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 294.510157] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 000000000000000e 19:24:11 executing program 1 (fault-call:4 fault-nth:17): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ed", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:11 executing program 7 (fault-call:5 fault-nth:15): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:11 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ftruncate(r0, 0xffff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x2000, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000001c0)=0x3, 0x4) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x9, 0x40) ftruncate(r0, 0x46) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f00000000c0)=@req3={0xffffffffffffff98, 0x5, 0xfffffffffffffffc, 0x0, 0x0, 0x3}, 0x1c) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xfffffffffffffffe, 0x0) ppoll(&(0x7f0000000040)=[{r3}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 19:24:11 executing program 3: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000380)={0x2, 0x0, @dev}, 0x10) r3 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, r1) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000180)="c6a34e987940ea478d9bd365b9e4621e334652733324b7773a3df8a7504d9e18e2e4a839fcd9030000000000000028945d12a9caae603ff81c4dc32ed3d70fb5d4c5b866305249060000005277822d0e0616a2e5b74c48e38b9936f298c6feec95ad327c724ec507bd34b94e99623f014bf81ea54900ac54a99aa04e1a7f000000e8d3bfa2f3abce9736aac3e0b19d5a697bc438cd49bc1cf3af72c2180bbee78e9a7237c02e10ac77e3a4fd8a6e2bdca6a9a1d7da1a3e559fdafb6703c73b3c4c10865302fb324f16327996273625d9f0a54ef16bdb08f22ed11fd80b74eb861aebe51b0912c0f79486c25c49524ffe4f00", 0xf2, r3) request_key(&(0x7f0000000940)="646e735f7265736f6c7665720005083f7605beb89ebb55f56950196fd8b8a6ebddf637ee27ef0fabbbad752edacb0ab4baaf14787b652566f6eaf50a9d4cff3e30f2d07fd0118cf06573e05f283ef26ec0cc75cf93fe4c95c7185cb70df302c4c08871883fc063c014d46b8b27fd88a01e760bee664a475d69d12e2fc7e3dc680e3bb87b71d301fbf92cadf5537bc8774141ee7d7152d16c9ee5ef389b527a9b31679b1560e4680fcfd95743ed5305a984645fb4371e5e363f7df35cb72f6d9c953cd2ea3167c037567f7f99399e92ba02db513f40a4d44e072bf5ea9495287934a503a032610a0235c3530cfc99e27a1e10e28ed49beb223bbe910fd417a48e64dbdf97edb9363e6b5853e1323d6f78d0fb80969de2f5fec97acbb11c1ae97f54b74e3ef9d50e1fbc43cc27e537d18452001232814ac3970ee2938175a91f4e0ca28b803a350dbea3b68d6a71bc65b011a81834b809f86919e4499a53ff8a35993b333b9b2761a44bb4a888a90c078d0b923e28cdbf76aa3fb68394de930dddf27c48926ab9c66951b70ebd4063b510ae453059ff71853bcf5942b5140a111d4a2afbaf612c6415aceb9578cb0d1decc8001f6dfc9d6829dbed2a8dbbc4bc939196131bb3fb451d52778143fb3c2f4d17df3c295117e13889037aff061ff283cac330aa03e7d189f01bfd03e68532d5594ef0e4bf1d584c7eacfd53a7ae8ccecc1901c89f4db4a3f1925610f22dac4570169b7f9f4cbf3fa1376f0ce4ab31605a16aff95c1bda1b96b9ded911a38594c3d9b42e7712ac377f377cd30eda00efd15d718e20dba3e76c4850966353c04a178e3b857719f9d81dc0ef8776c46c47d38aad73498289bc0240", &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3, 0x29138c2e}, &(0x7f0000000300)="af2019dcc2380b4623dc8c7a581973a96d57452035fca47b18e7992f4c82e608a92c436783ee4e3264245238b946a4a11d39b7873e5f3296185625d49ae13974d13940d0c01a5029b35aec2234860f6525f00000000000000000", 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) ioctl$void(r2, 0x5451) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xffffffffffffffff, 0x0) 19:24:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x0, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:11 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 294.810751] FAULT_INJECTION: forcing a failure. [ 294.810751] name failslab, interval 1, probability 0, space 0, times 0 [ 294.822061] CPU: 1 PID: 11763 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 294.830566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.839931] Call Trace: [ 294.842542] dump_stack+0x1c9/0x2b4 [ 294.846192] ? dump_stack_print_info.cold.2+0x52/0x52 [ 294.851407] ? lock_acquire+0x1e4/0x4f0 [ 294.855397] ? seq_read+0x71/0x1150 19:24:11 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) accept$alg(r1, 0x0, 0x0) [ 294.859052] should_fail.cold.4+0xa/0x11 [ 294.863133] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 294.868273] ? kasan_check_write+0x14/0x20 [ 294.872526] ? __mutex_lock+0x6d0/0x1700 [ 294.876606] ? graph_lock+0x170/0x170 [ 294.880423] ? __kasan_slab_free+0x11a/0x170 [ 294.884848] ? find_held_lock+0x36/0x1c0 [ 294.888935] ? __lock_is_held+0xb5/0x140 [ 294.893033] ? check_same_owner+0x340/0x340 [ 294.897380] ? rcu_note_context_switch+0x680/0x680 [ 294.902332] __should_failslab+0x124/0x180 [ 294.906591] should_failslab+0x9/0x14 [ 294.910419] kmem_cache_alloc_trace+0x2b5/0x730 [ 294.915108] ? lock_downgrade+0x8f0/0x8f0 [ 294.919287] proc_pid_stack+0xaa/0x390 [ 294.922746] FAULT_INJECTION: forcing a failure. [ 294.922746] name failslab, interval 1, probability 0, space 0, times 0 [ 294.923196] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 294.923247] proc_single_show+0x101/0x190 [ 294.943671] seq_read+0x4af/0x1150 [ 294.947243] do_iter_read+0x49e/0x650 [ 294.951066] vfs_readv+0x175/0x1c0 [ 294.954619] ? compat_rw_copy_check_uvector+0x440/0x440 [ 294.959999] ? fget_raw+0x20/0x20 [ 294.963471] ? __sb_end_write+0xac/0xe0 [ 294.967457] do_preadv+0x1cc/0x280 [ 294.971012] ? do_readv+0x310/0x310 [ 294.974645] ? __ia32_sys_read+0xb0/0xb0 [ 294.978713] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.984102] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 294.989245] __x64_sys_preadv+0x9a/0xf0 [ 294.993241] do_syscall_64+0x1b9/0x820 [ 294.997135] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 295.002533] ? syscall_return_slowpath+0x5e0/0x5e0 [ 295.007468] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 295.012492] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 295.017515] ? recalc_sigpending_tsk+0x180/0x180 [ 295.022280] ? kasan_check_write+0x14/0x20 [ 295.026525] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.031384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.036574] RIP: 0033:0x457099 [ 295.039772] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.058679] RSP: 002b:00007fe5af433c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 295.066401] RAX: ffffffffffffffda RBX: 00007fe5af4346d4 RCX: 0000000000457099 [ 295.073676] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000003 [ 295.080948] RBP: 00000000009301e0 R08: 0000000000000000 R09: 0000000000000000 [ 295.088234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 295.095508] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000011 [ 295.102803] CPU: 0 PID: 11749 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 295.111306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.120757] Call Trace: [ 295.123357] dump_stack+0x1c9/0x2b4 [ 295.126996] ? dump_stack_print_info.cold.2+0x52/0x52 [ 295.132196] ? lock_acquire+0x1e4/0x4f0 [ 295.136204] ? seq_read+0x71/0x1150 [ 295.139868] should_fail.cold.4+0xa/0x11 [ 295.143948] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.149077] ? kasan_check_write+0x14/0x20 [ 295.153340] ? __mutex_lock+0x6d0/0x1700 [ 295.157421] ? graph_lock+0x170/0x170 19:24:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\b', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 295.161255] ? __kasan_slab_free+0x11a/0x170 [ 295.165681] ? find_held_lock+0x36/0x1c0 [ 295.169759] ? __lock_is_held+0xb5/0x140 [ 295.173854] ? check_same_owner+0x340/0x340 [ 295.178194] ? rcu_note_context_switch+0x680/0x680 [ 295.183158] __should_failslab+0x124/0x180 [ 295.187407] should_failslab+0x9/0x14 [ 295.191237] kmem_cache_alloc_trace+0x2b5/0x730 [ 295.195932] ? lock_downgrade+0x8f0/0x8f0 [ 295.200128] proc_pid_stack+0xaa/0x390 [ 295.204034] ? dname_to_vma_addr.isra.19+0x410/0x410 19:24:11 executing program 1 (fault-call:4 fault-nth:18): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 295.209153] proc_single_show+0x101/0x190 [ 295.213320] seq_read+0x4af/0x1150 [ 295.216892] do_iter_read+0x49e/0x650 [ 295.220715] vfs_readv+0x175/0x1c0 [ 295.224274] ? compat_rw_copy_check_uvector+0x440/0x440 [ 295.229654] ? fget_raw+0x20/0x20 [ 295.233131] ? __sb_end_write+0xac/0xe0 [ 295.237126] do_preadv+0x1cc/0x280 [ 295.240683] ? do_readv+0x310/0x310 [ 295.244332] ? __ia32_sys_read+0xb0/0xb0 [ 295.248408] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.253788] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 295.258905] __x64_sys_preadv+0x9a/0xf0 [ 295.262897] do_syscall_64+0x1b9/0x820 [ 295.266845] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 295.266865] ? syscall_return_slowpath+0x5e0/0x5e0 [ 295.266881] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 295.266899] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 295.266919] ? recalc_sigpending_tsk+0x180/0x180 [ 295.292008] ? kasan_check_write+0x14/0x20 [ 295.296267] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.301128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.306330] RIP: 0033:0x457099 [ 295.306710] FAULT_INJECTION: forcing a failure. [ 295.306710] name failslab, interval 1, probability 0, space 0, times 0 [ 295.309527] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.309537] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 295.309555] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 295.309564] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000003 19:24:12 executing program 7 (fault-call:5 fault-nth:16): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 295.309574] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 295.309583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 295.309593] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 000000000000000f [ 295.384357] CPU: 1 PID: 11786 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 295.392856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.402225] Call Trace: [ 295.404834] dump_stack+0x1c9/0x2b4 [ 295.408480] ? dump_stack_print_info.cold.2+0x52/0x52 [ 295.413679] ? lock_acquire+0x1e4/0x4f0 [ 295.417668] ? seq_read+0x71/0x1150 [ 295.421318] should_fail.cold.4+0xa/0x11 [ 295.425405] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.430533] ? kasan_check_write+0x14/0x20 [ 295.434784] ? __mutex_lock+0x6d0/0x1700 [ 295.438860] ? graph_lock+0x170/0x170 [ 295.442674] ? __kasan_slab_free+0x11a/0x170 [ 295.446594] FAULT_INJECTION: forcing a failure. [ 295.446594] name failslab, interval 1, probability 0, space 0, times 0 [ 295.447096] ? find_held_lock+0x36/0x1c0 [ 295.447117] ? __lock_is_held+0xb5/0x140 [ 295.447147] ? check_same_owner+0x340/0x340 [ 295.447167] ? rcu_note_context_switch+0x680/0x680 [ 295.447189] __should_failslab+0x124/0x180 [ 295.447229] should_failslab+0x9/0x14 [ 295.483868] kmem_cache_alloc_trace+0x2b5/0x730 [ 295.488557] ? lock_downgrade+0x8f0/0x8f0 [ 295.492733] proc_pid_stack+0xaa/0x390 [ 295.496632] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 295.501757] proc_single_show+0x101/0x190 [ 295.505916] seq_read+0x4af/0x1150 [ 295.509483] do_iter_read+0x49e/0x650 [ 295.513305] vfs_readv+0x175/0x1c0 [ 295.516855] ? compat_rw_copy_check_uvector+0x440/0x440 [ 295.522247] ? fget_raw+0x20/0x20 [ 295.525729] ? __sb_end_write+0xac/0xe0 [ 295.529721] do_preadv+0x1cc/0x280 [ 295.533277] ? do_readv+0x310/0x310 [ 295.536909] ? __ia32_sys_read+0xb0/0xb0 [ 295.540976] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.546342] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 295.551456] __x64_sys_preadv+0x9a/0xf0 [ 295.555438] do_syscall_64+0x1b9/0x820 [ 295.559330] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 295.564703] ? syscall_return_slowpath+0x5e0/0x5e0 [ 295.569645] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 295.574665] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 295.579685] ? recalc_sigpending_tsk+0x180/0x180 [ 295.584444] ? kasan_check_write+0x14/0x20 [ 295.588692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.593570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.598763] RIP: 0033:0x457099 [ 295.601961] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.620860] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 295.628579] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 295.635847] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 295.643121] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 295.650424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 295.657695] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000012 [ 295.665000] CPU: 0 PID: 11798 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 295.673509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.682868] Call Trace: [ 295.685470] dump_stack+0x1c9/0x2b4 [ 295.689114] ? dump_stack_print_info.cold.2+0x52/0x52 [ 295.694312] ? lock_acquire+0x1e4/0x4f0 [ 295.698299] ? seq_read+0x71/0x1150 [ 295.701948] should_fail.cold.4+0xa/0x11 [ 295.706036] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.711156] ? kasan_check_write+0x14/0x20 [ 295.715393] ? __mutex_lock+0x6d0/0x1700 [ 295.719460] ? graph_lock+0x170/0x170 [ 295.723269] ? __kasan_slab_free+0x11a/0x170 [ 295.727771] ? find_held_lock+0x36/0x1c0 [ 295.731840] ? __lock_is_held+0xb5/0x140 [ 295.735922] ? check_same_owner+0x340/0x340 [ 295.740258] ? rcu_note_context_switch+0x680/0x680 [ 295.745195] __should_failslab+0x124/0x180 [ 295.749451] should_failslab+0x9/0x14 [ 295.753260] kmem_cache_alloc_trace+0x2b5/0x730 [ 295.757934] ? lock_downgrade+0x8f0/0x8f0 [ 295.762091] proc_pid_stack+0xaa/0x390 [ 295.765989] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 295.771112] proc_single_show+0x101/0x190 [ 295.775276] seq_read+0x4af/0x1150 [ 295.778835] do_iter_read+0x49e/0x650 [ 295.782650] vfs_readv+0x175/0x1c0 [ 295.786198] ? compat_rw_copy_check_uvector+0x440/0x440 [ 295.791590] ? fget_raw+0x20/0x20 [ 295.795056] ? __sb_end_write+0xac/0xe0 [ 295.799041] do_preadv+0x1cc/0x280 [ 295.802589] ? do_readv+0x310/0x310 [ 295.806231] ? __ia32_sys_read+0xb0/0xb0 [ 295.810298] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.815665] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 295.820771] __x64_sys_preadv+0x9a/0xf0 [ 295.824752] do_syscall_64+0x1b9/0x820 [ 295.828648] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 295.834014] ? syscall_return_slowpath+0x5e0/0x5e0 [ 295.838947] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 295.843967] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 295.848985] ? recalc_sigpending_tsk+0x180/0x180 [ 295.853744] ? kasan_check_write+0x14/0x20 [ 295.857990] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.862848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.868044] RIP: 0033:0x457099 [ 295.871252] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.890253] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 295.897968] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 295.905271] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 19:24:12 executing program 1 (fault-call:4 fault-nth:19): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 295.912553] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 295.919821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 295.927090] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000010 19:24:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434fc", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 296.011319] FAULT_INJECTION: forcing a failure. [ 296.011319] name failslab, interval 1, probability 0, space 0, times 0 [ 296.022745] CPU: 0 PID: 11808 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 296.031256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.040613] Call Trace: [ 296.043243] dump_stack+0x1c9/0x2b4 [ 296.046897] ? dump_stack_print_info.cold.2+0x52/0x52 [ 296.052108] ? lock_acquire+0x1e4/0x4f0 [ 296.056093] ? seq_read+0x71/0x1150 [ 296.059748] should_fail.cold.4+0xa/0x11 [ 296.063833] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 296.068963] ? kasan_check_write+0x14/0x20 [ 296.073235] ? __mutex_lock+0x6d0/0x1700 [ 296.077321] ? graph_lock+0x170/0x170 [ 296.081146] ? __kasan_slab_free+0x11a/0x170 [ 296.085571] ? find_held_lock+0x36/0x1c0 [ 296.089653] ? __lock_is_held+0xb5/0x140 [ 296.093748] ? check_same_owner+0x340/0x340 [ 296.098096] ? rcu_note_context_switch+0x680/0x680 [ 296.103051] __should_failslab+0x124/0x180 [ 296.107313] should_failslab+0x9/0x14 [ 296.111241] kmem_cache_alloc_trace+0x2b5/0x730 [ 296.115928] ? lock_downgrade+0x8f0/0x8f0 [ 296.120103] proc_pid_stack+0xaa/0x390 [ 296.124017] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 296.129145] proc_single_show+0x101/0x190 [ 296.133317] seq_read+0x4af/0x1150 [ 296.136895] do_iter_read+0x49e/0x650 [ 296.140726] vfs_readv+0x175/0x1c0 [ 296.144300] ? compat_rw_copy_check_uvector+0x440/0x440 [ 296.149690] ? fget_raw+0x20/0x20 [ 296.153180] ? __sb_end_write+0xac/0xe0 [ 296.157197] do_preadv+0x1cc/0x280 [ 296.160772] ? do_readv+0x310/0x310 [ 296.164410] ? __ia32_sys_read+0xb0/0xb0 [ 296.168487] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.173859] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 296.178977] __x64_sys_preadv+0x9a/0xf0 [ 296.183000] do_syscall_64+0x1b9/0x820 [ 296.186899] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 296.192279] ? syscall_return_slowpath+0x5e0/0x5e0 [ 296.197238] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 296.202269] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 296.207305] ? recalc_sigpending_tsk+0x180/0x180 [ 296.212073] ? kasan_check_write+0x14/0x20 [ 296.216335] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.221196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.226401] RIP: 0033:0x457099 [ 296.229601] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.248506] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 19:24:12 executing program 7 (fault-call:5 fault-nth:17): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:12 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)={0x10}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000000)) 19:24:12 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="657874347f", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:12 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x92, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140), 0x117, 0xa}}, 0x20) r2 = getpid() r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40, 0x0) write$cgroup_int(r3, &(0x7f0000000080)=0x9, 0x12) sched_setscheduler(r2, 0x7, &(0x7f0000000000)=0x3) setsockopt$inet6_buf(r0, 0x29, 0x80000000000013, &(0x7f0000000200), 0x0) [ 296.256308] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 296.260001] FAULT_INJECTION: forcing a failure. [ 296.260001] name failslab, interval 1, probability 0, space 0, times 0 [ 296.263664] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 296.263674] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 296.263683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 296.263693] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000013 [ 296.304345] CPU: 1 PID: 11820 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 296.312933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.322288] Call Trace: [ 296.324888] dump_stack+0x1c9/0x2b4 [ 296.328531] ? dump_stack_print_info.cold.2+0x52/0x52 [ 296.333733] ? lock_acquire+0x1e4/0x4f0 [ 296.337715] ? seq_read+0x71/0x1150 [ 296.341367] should_fail.cold.4+0xa/0x11 [ 296.345460] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 296.350575] ? seq_read+0x71/0x1150 [ 296.354211] ? kasan_check_write+0x14/0x20 [ 296.358465] ? __mutex_lock+0x6d0/0x1700 [ 296.362543] ? graph_lock+0x170/0x170 [ 296.366382] ? __kasan_slab_free+0x11a/0x170 [ 296.370806] ? find_held_lock+0x36/0x1c0 [ 296.374877] ? __lock_is_held+0xb5/0x140 [ 296.378962] ? check_same_owner+0x340/0x340 [ 296.383294] ? rcu_note_context_switch+0x680/0x680 [ 296.388243] __should_failslab+0x124/0x180 [ 296.392498] should_failslab+0x9/0x14 [ 296.396555] kmem_cache_alloc_trace+0x2b5/0x730 [ 296.401250] ? lock_downgrade+0x8f0/0x8f0 [ 296.405416] proc_pid_stack+0xaa/0x390 [ 296.409320] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 296.414534] proc_single_show+0x101/0x190 [ 296.418703] seq_read+0x4af/0x1150 [ 296.422274] do_iter_read+0x49e/0x650 [ 296.426094] vfs_readv+0x175/0x1c0 [ 296.429646] ? compat_rw_copy_check_uvector+0x440/0x440 [ 296.435032] ? fget_raw+0x20/0x20 [ 296.438505] ? __sb_end_write+0xac/0xe0 [ 296.442495] do_preadv+0x1cc/0x280 [ 296.446045] ? do_readv+0x310/0x310 [ 296.449680] ? __ia32_sys_read+0xb0/0xb0 [ 296.453776] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.459154] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 296.464276] __x64_sys_preadv+0x9a/0xf0 [ 296.468260] do_syscall_64+0x1b9/0x820 [ 296.472163] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 296.477535] ? syscall_return_slowpath+0x5e0/0x5e0 [ 296.482473] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 296.487497] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 296.492520] ? recalc_sigpending_tsk+0x180/0x180 [ 296.497288] ? kasan_check_write+0x14/0x20 [ 296.501541] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.506409] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.511605] RIP: 0033:0x457099 [ 296.514804] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.534207] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 296.541948] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 296.549349] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 296.556628] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 19:24:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743411", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:13 executing program 1 (fault-call:4 fault-nth:20): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040), 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00), &(0x7f00000004c0)="eb", 0x1, r2) r4 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x10c, r1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x1f4, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) 19:24:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:13 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl(r0, 0x1ff, &(0x7f0000000000)="3e0e918fe9cd7fc85fff7ec9c0d8498358cfbae3ba634b8207258f6e3cfbef9e29d9f2ea05e2c440b617d134df39b5f2fcee29309c22") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) close(r0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) connect$packet(r1, &(0x7f00000000c0)={0x11, 0x3, r2, 0x1, 0xffff, 0x6, @local}, 0x14) [ 296.563904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 296.571182] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000011 [ 296.690295] FAULT_INJECTION: forcing a failure. [ 296.690295] name failslab, interval 1, probability 0, space 0, times 0 [ 296.701607] CPU: 1 PID: 11845 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 296.710111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.719579] Call Trace: [ 296.722187] dump_stack+0x1c9/0x2b4 [ 296.725844] ? dump_stack_print_info.cold.2+0x52/0x52 [ 296.731164] ? lock_acquire+0x1e4/0x4f0 [ 296.731183] ? seq_read+0x71/0x1150 19:24:13 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743497", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:13 executing program 7 (fault-call:5 fault-nth:18): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:13 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x7, 0x0, [], [{0x3, 0xfffffffffffffffc, 0xfffffffffffffffd, 0x10001, 0x3, 0x7fff}, {0x7, 0xbc0c, 0x16d39cfe, 0x62, 0x5}], [[], [], [], [], [], [], []]}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000580)=0xfffffffffffffc78, 0x4) fdatasync(r1) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000080)=[@in6={0xa, 0x4e20, 0x800, @local}, @in6={0xa, 0x4e21, 0x9, @mcast1, 0x1}, @in={0x2, 0x4e24, @loopback}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r2, 0x2}, &(0x7f0000000240)=0x8) creat(&(0x7f00000005c0)='./file0\x00', 0x10) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) [ 296.731211] should_fail.cold.4+0xa/0x11 [ 296.731249] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 296.731275] ? kasan_check_write+0x14/0x20 [ 296.731291] ? __mutex_lock+0x6d0/0x1700 [ 296.731307] ? graph_lock+0x170/0x170 [ 296.731324] ? __kasan_slab_free+0x11a/0x170 [ 296.731343] ? find_held_lock+0x36/0x1c0 [ 296.731364] ? __lock_is_held+0xb5/0x140 [ 296.731456] ? br_forward+0x4c8/0x720 [ 296.731488] ? check_same_owner+0x340/0x340 [ 296.731509] ? rcu_note_context_switch+0x680/0x680 [ 296.731533] __should_failslab+0x124/0x180 19:24:13 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./file0\x00', 0x240, 0x100) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000180)={{0x6, 0x8}, 'port0\x00', 0x50, 0x1800, 0x1, 0x5, 0x7, 0x80000000, 0x0, 0x0, 0x4, 0x8}) r2 = getpid() sched_setscheduler(r2, 0x7, &(0x7f00000000c0)) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000280)=r2) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0x7, &(0x7f0000000080), 0x1) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000100)=""/128, 0x80}, &(0x7f0000000040), 0x6f}, 0x20) [ 296.731551] should_failslab+0x9/0x14 [ 296.731566] kmem_cache_alloc_trace+0x2b5/0x730 [ 296.731582] ? lock_downgrade+0x8f0/0x8f0 [ 296.731605] proc_pid_stack+0xaa/0x390 [ 296.731626] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 296.731651] proc_single_show+0x101/0x190 [ 296.731670] seq_read+0x4af/0x1150 [ 296.731708] do_iter_read+0x49e/0x650 [ 296.823366] vfs_readv+0x175/0x1c0 [ 296.826933] ? compat_rw_copy_check_uvector+0x440/0x440 [ 296.832321] ? fget_raw+0x20/0x20 [ 296.835795] ? __sb_end_write+0xac/0xe0 [ 296.839783] do_preadv+0x1cc/0x280 [ 296.843333] ? do_readv+0x310/0x310 [ 296.846962] ? __ia32_sys_read+0xb0/0xb0 [ 296.851026] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.856389] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 296.861482] __x64_sys_preadv+0x9a/0xf0 [ 296.865448] do_syscall_64+0x1b9/0x820 [ 296.869331] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 296.874688] ? syscall_return_slowpath+0x5e0/0x5e0 [ 296.879627] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 296.884805] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 296.889835] ? recalc_sigpending_tsk+0x180/0x180 [ 296.894586] ? kasan_check_write+0x14/0x20 [ 296.898819] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.903672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.908880] RIP: 0033:0x457099 [ 296.912066] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.930960] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 296.938667] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 296.945948] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 296.953203] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 296.960469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 296.967721] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000014 [ 297.048280] EXT4-fs: 26 callbacks suppressed [ 297.048294] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 297.108249] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 297.114480] FAULT_INJECTION: forcing a failure. [ 297.114480] name failslab, interval 1, probability 0, space 0, times 0 [ 297.128496] CPU: 1 PID: 11868 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 297.136995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.146353] Call Trace: [ 297.148957] dump_stack+0x1c9/0x2b4 [ 297.152607] ? dump_stack_print_info.cold.2+0x52/0x52 [ 297.157817] ? lock_acquire+0x1e4/0x4f0 [ 297.161810] ? seq_read+0x71/0x1150 [ 297.165468] should_fail.cold.4+0xa/0x11 [ 297.169554] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 297.174677] ? kasan_check_write+0x14/0x20 [ 297.178921] ? __mutex_lock+0x6d0/0x1700 [ 297.182999] ? graph_lock+0x170/0x170 [ 297.186811] ? __kasan_slab_free+0x11a/0x170 [ 297.191245] ? find_held_lock+0x36/0x1c0 [ 297.195323] ? __lock_is_held+0xb5/0x140 [ 297.199499] ? check_same_owner+0x340/0x340 [ 297.203838] ? rcu_note_context_switch+0x680/0x680 [ 297.208790] __should_failslab+0x124/0x180 [ 297.213131] should_failslab+0x9/0x14 [ 297.216946] kmem_cache_alloc_trace+0x2b5/0x730 [ 297.221627] ? lock_downgrade+0x8f0/0x8f0 [ 297.225797] proc_pid_stack+0xaa/0x390 [ 297.229704] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 297.234840] proc_single_show+0x101/0x190 [ 297.239004] seq_read+0x4af/0x1150 [ 297.242576] do_iter_read+0x49e/0x650 [ 297.246407] vfs_readv+0x175/0x1c0 [ 297.249962] ? compat_rw_copy_check_uvector+0x440/0x440 [ 297.251512] 9pnet_virtio: no channels available for device 127.0.0.1 [ 297.255354] ? fget_raw+0x20/0x20 [ 297.255383] ? __sb_end_write+0xac/0xe0 [ 297.255409] do_preadv+0x1cc/0x280 [ 297.255429] ? do_readv+0x310/0x310 [ 297.255444] ? __ia32_sys_read+0xb0/0xb0 [ 297.255463] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.255480] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 297.255499] __x64_sys_preadv+0x9a/0xf0 [ 297.291516] 9pnet_virtio: no channels available for device 127.0.0.1 [ 297.295013] do_syscall_64+0x1b9/0x820 [ 297.295033] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 297.295052] ? syscall_return_slowpath+0x5e0/0x5e0 [ 297.295070] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 297.295087] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 297.295108] ? recalc_sigpending_tsk+0x180/0x180 [ 297.330512] ? kasan_check_write+0x14/0x20 [ 297.334772] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.339640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.344837] RIP: 0033:0x457099 [ 297.348044] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.366956] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 297.374675] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 297.381954] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 297.389237] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 297.396518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 19:24:13 executing program 3: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x806, 0x5) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="0801001bc2010000d702000001000000ff0100000900000000000000000000006bc2191d76b637766b2bbe74ea2e857cb0ee21cd84d32ba3667c0719df1d464ed428c208daccd1c270ac6ee72c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x84d) mount$9p_rdma(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000300)='./bus\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='./bus\x00') ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000001200)=0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001240)={{{@in6=@local, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000001340)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004480)={0x0, 0x0, 0x0}, &(0x7f00000013c0)=0xc) r7 = gettid() getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001400)={{{@in6=@mcast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000001500)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) fcntl$getownex(r2, 0x10, &(0x7f00000015c0)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001600)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4}}, &(0x7f0000001700)=0xe8) r12 = getegid() r13 = getpid() r14 = geteuid() getgroups(0x1, &(0x7f0000003d00)=[0x0]) r16 = getpgrp(0x0) lstat(&(0x7f0000003d40)='./file0\x00', &(0x7f0000003d80)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000003e00)='./file0/file0\x00', &(0x7f0000003e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003ec0)={0x0}, &(0x7f0000003f00)=0xc) fstat(r3, &(0x7f0000003f40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000003fc0)={0x0, 0x0, 0x0}, &(0x7f0000004000)=0xc) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000004040)=0x0) r23 = getuid() lstat(&(0x7f0000004080)='./bus\x00', &(0x7f00000040c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000004140)=0x0) getresuid(&(0x7f0000004180), &(0x7f00000041c0), &(0x7f0000004200)=0x0) getgroups(0x4, &(0x7f0000004240)=[0xffffffffffffffff, 0x0, 0xee01, 0xee00]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004280)={0x0}, &(0x7f00000042c0)=0xc) fstat(r1, &(0x7f0000004300)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000004380), &(0x7f00000043c0)=0x0, &(0x7f0000004400)) r31 = getpid() r32 = getuid() lstat(&(0x7f0000005880)='./bus\x00', &(0x7f00000058c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r34 = getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000005940)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000005a40)=0xe8) fstat(r0, &(0x7f0000005a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r37 = openat$kvm(0xffffffffffffff9c, &(0x7f00000060c0)='/dev/kvm\x00', 0x2000, 0x0) r38 = getpid() getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000006100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000006200)=0xe8) r40 = getegid() sendmmsg$unix(r3, &(0x7f0000006300)=[{&(0x7f0000000200)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000bc0)="e45191d96fba5fac0c68e97ad7f5a374845cff24568d1a63b11ccbffc074f537ec5a5e055f78baa35499d24566400da6638e2a790d4d8f9517aaf8b8d9099e5e429e11ca250be0de260066dceb368915016e33c9e014ee4fdbfed0bdc83433316c40cb97d09e9b4237bcdd498959291b2ac78c5dfb3ade2bb17bb9af9bbe93415791a0954b7d2d2575dc2f", 0x8b}, {&(0x7f0000000c80)="f3e5a4005131b13d1e20499e48d172da38ffb4ac93daf8507d7011fdbfad58319c09c8e6b62462a2b8cae4293019f6fa6ad33b6cd9b9f40df2816e0f52783e1cd5b73db5dd87b813ad033f44255c0b56f9c74bd11448068602e3b27bf4d552505e7f7ec882207cb640fbe74940d06507a2751083e4b81b7fc8af1b2f97a72e70e80879398814c95aa3b935dbdec6f022378fbc5d47db02ba7cc3d07d44d3f8f5a6b6c4f041a25e49fd48beb6d35529cba9c2f3f47af9467284496f3e469de7a64f7335a7e62b2967", 0xc8}, {&(0x7f0000000d80)="926c7b2636e23cc38c2ba1058560fdca03e4843f5693567075722a90c5e8cdce6b79ca1cafe40876c675c15051ef3d5e8aa02b617ce15c9e9a8a7832be476b6a9dd0ce5c15ff6a0501f24f23a72075f770402558142150a8491e5852e1f0dae9263be797e947190f1b51914886fa4cf1b77b07bd2751a3bcc15aca", 0x7b}, {&(0x7f00000002c0)="55da944bf2f5a26c2b4cbdbc43b567fd422f805d02b9bd82053a52624d5d343394a7fc559b6fc2608c", 0x29}, {&(0x7f0000000e00)="a09733eeb6671207b5bb948d1f26ffa4b23ceeaa6b169837b0864cb737dda2fc91ef962c662ae249c5f37da311338f385798cfecc22d8d3613981e375efcdde700a2bb088ef2e18db5e5638ac2dca297174ce791895501e1919cb23234c4c68156e688133318640c4471caaa6699c3b1822e20e911199603a4f9358d80b0cf7bd2a24a693c66a1b1e00b29554897a03f830edfe707e757427935ffdb24faaf64af84129d6d6bd179bb05e62a01d838cad36412f7fc73c82d095a8b458e9073e1eef6ed242897c76fc540c10572e19b794dcb26b1abc8aa6616c65169a8355c56a548", 0xe2}, {&(0x7f0000000f00)="310a6292bbe987102b9def6e80d48747e17851d0dcf2bc36b1cd2c5b9edba4459167aaadcc0bcb2872a065454350fed2e0972cfdaf2667c88b00b998c02f70197a681075cd5c03f4edbb29b4a59c9a6cab4f3f551cec44eee348d83edd9ab39e3e22638864f79db6267ffe64b6e3b7f0d732b2f2bd88d99a46c05bb3961496acb8eca90f0285bbac6e4dda4bb18942490ef62bfc67a95967c4e09eb33caa", 0x9e}, {&(0x7f0000000fc0)="5d69fb9a9fec5271f171da1ba09227f33af7daabb4ec483c119985f6932857452ef52920857310cbe1da8e17abc11800d84da0f2e722ee8e04dad059c40fc1ff574c6d5feee1b604039d71b3dfbaf29311918c7425c97b38565cc99ebb63103568d6c893a7ad0743c0d588638ff1fd3c02d9bfa7bb548c121eed1316a1497fb7229eaae4fe426580d0257f3d8eb6", 0x8e}, {&(0x7f0000001080)="4e41971424da43c431aecb3e9cef8a5b9fea2500c92389e5cb1205e9844aaec65a06173a874fb2a9ffdf1ba3dfc9ec0851f8139ff27e4046963672112e5b9b93bdd24ac48387f709209597a49a1e03dfe86d874aa7009aea7398a24180ad44f09d2f5bbabd994e6adfcae2ddf06c2b58bc1f7a0aba8df7fd373683296d1147c471021ad2fee93058f11495242f850880efdd3e3677c8ebd429e66c871d7e5826bf91dc53ba38d74d38c0172bded97d0c1dbf6b9d4ebbb13f8608f042d5285802fc45a3ed6e92857fd540bb1c1c", 0xcd}], 0x8, &(0x7f0000001740)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x28, 0x1, 0x1, [r0, r1, r0, r2, r3, r1]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x20, 0x1, 0x1, [r1, r3, r3, r1]}], 0xa8, 0x4000000}, {&(0x7f0000001800)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000003c40)=[{&(0x7f0000001880)="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", 0x1000}, {&(0x7f0000002880)="6cc76778c63bd95074657a004e7dddbf3badce978ff442fe44ce7c1172241e6cd3a1", 0x22}, {&(0x7f00000028c0)="415c1186f0db31eb9ed3f1a280fd9ca84344960c060f030ab3afebffdb41f120d0f9ed17c6651c42037a72f0943c0ee1e123d863158afcf9802f63181bbe5b754d3e1029ff30d7313a4623ff9696bb134a0fe2218e863bc272e7c3a5e3323c3b0d80f9071de8b945015b3f8ca241c3480d7375daeb9a4ab348e25f4079e99de4df271337f0614d5c870802ce3a4af33237f3701ca697245c3402690d6c746aaf", 0xa0}, {&(0x7f0000002980)="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", 0x1000}, {&(0x7f0000003980)="a78a0831f1710ca0b3bc09f57f2f20edcf4f7e333445c37ca2d0ad26961d3d476bcd", 0x22}, {&(0x7f00000039c0)="9ffce1b01b308ed61907b42f3453390f82ef5248a71268f4b1c82cb71bd96d6ef04224876ae97c69c97552c283ca4d8b9e67acca6f8620e6b5b04898f91eb9e604d8d7271f5ec1292f3591b33c13c5c5e5a022d1841b59a8eeb245828cad1a8bc5197ede40eee7985fa138225eb1cc694aec03dc746e", 0x76}, {&(0x7f0000003a40)="744277e2c7f6b6", 0x7}, {&(0x7f0000003a80)="b1eedf979ec5d84c4629c11448ea4415da9dd95f9a76ff9f9a9133fdf692d0f2f5b95bdd3feedbf004719badb4cf196e8629bd3754a0925ca26e6044a67b515d22a75f6144128d6f1b80313e", 0x4c}, {&(0x7f0000003b00)="2bcb381a3d29ae09a66c6bcffc50be01fd3788542b7f3d2b0110b5aff655608585a6", 0x22}, {&(0x7f0000003b40)="8f4d6693082f1f077726267728aeaf00688f9464fa2408706fa5c9340ee76c1d6189cfd951be771fec7e8d8545d1ff4d920c896b225570e73742dc341e4cb52d637f9772fb0d368ea77ba0f9e91a3c2916d634ff8bb2aaab8c63e1629aa386947c2c3abdfd81f434aeb60ee6f622b7bc9631c88bc242ea1875826f161d6144e837691b530e41671a9be6a8edab17325eee01bb1e8fb2d63f3b7e2edf11237c4f7069012d08f85c1a3a1f43843097af49c88d8e24e550f04df8aee404697afc37b3e8c7906e089c40066952d1bb65e5330e4350b7d60bf612cff03eaf8f34ee70c90ef2c60e3c673a535823a8fb72", 0xee}], 0xa, &(0x7f0000006400)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r18, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r19, @ANYRES32=r20, @ANYRES32=r21, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r22, @ANYRES32=r23, @ANYRES32=r24, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r25, @ANYRES32=r26, @ANYRES32=r27, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r3, @ANYBLOB="000000002000004000fdffff0000000002000000ceb65b92f1ad4052027a4404064e527ce02d973b2a3986ef49693f904082175e26f95f064448bf11b952623a0005ed6c297d79aae0c9a73442a9950724b4d63894c5f99746c85fd46f13bc9ad48e184f52ae9724347e77eef38f7d0600b326110397bbaad078d9beb94c24be9faabc9937c1b65185f4c13120482e9f019c3384b449216a3f22395d4a549ba2a1678e6d3e35", @ANYRES32=r28, @ANYRES32=r29, @ANYRES32=r30, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1], 0x120, 0x20000000}, {&(0x7f0000004580)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000005800)=[{&(0x7f0000004600)="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", 0x1000}, {&(0x7f0000005600)="a0d4605c360fff85a29c4a6be285ee5860b5b9cf1de03c2c87f3fa4778abe1fccb7bb302152be6621a51b4a72d67ba74fda6881c160c6fda", 0x38}, {&(0x7f0000005640)="f072ae31eeb98bc66dbd4439b4800545b8a587a208356551bba748b8be62168df6d388024db7d8d9c3cad12b0d75e64030115ad30c3bc9c940d1f082194edae34abf7239deac9bd62f71f710a63b1c76eda09f2ca31f54c9c58bfe3bfaeabee5f3fc500a0cf47afbd0f45cb9f8e2c8b9c3", 0x71}, {&(0x7f00000056c0)="e76487f0954640e16bb4af21ad476599628322f7f58aac1e4ebea1fbeeb794d10d7071d754a0a2c4b7070697a34fcb2b49834d9efb481079bdf337c83dad6547e3cf78bf60007f667277be69261286286877f0c9991eeece07a69161dac4d3f1b64c566f5fda6e2345cde1f4ee54c1b56c7eb974b502d879f15dd4d65bd533a2d8b099c99e96413c8d38a58d7f608134efc1ab67b4c78a46506f6b33663548b3ca0b8c959e3e7bd1f26d8b7048193f3aee746cfbc9e4a27829c53d0a11e4ab2cabddc68a4b6304020c748dc02bd1dbe82ee84b44284592ad60b779fbfb951182a4e84322b0534a8b89cbdbbd59a1ed6412", 0xf1}, {&(0x7f00000057c0)="23b65e097b8e6247bcc3374253d7ed0c82f5662d1afb7a7df42163621ad4f4729afa7c154380857f1099f5043c257725d581c10ff2a8", 0x36}], 0x5, &(0x7f0000005b00)=[@rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r31, r32, r33}, @rights={0x38, 0x1, 0x1, [r3, r1, r3, r3, r0, r0, r0, r1, r0, r0]}, @rights={0x20, 0x1, 0x1, [r1, r0, r3, r3]}, @cred={0x20, 0x1, 0x2, r34, r35, r36}], 0xb0, 0x4000}, {&(0x7f0000005bc0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000006040)=[{&(0x7f0000005c40)="8fb7f753cd08979aa42e3b18aa20ce001cbf8583bcc5a7f82790c99f764a671c5d2934ee928c50e6d471675b35b46cc4f929696ea9c7003c2fafb0e0f48dfe0c8e119463e143f59a78f7d1dd6b6e1c6b921c591b44c584fa2bb1b0d7532073a3013cab8f4ef56f9ee49e34448b7c95641d64cf3f", 0x74}, {&(0x7f0000005cc0)="b1d8fca797cc91684a0f1e1a8f58cf56bfff7ff0e23556a04adb9455347daaa7e47bfdf5c3ed6aca9d19c547eb72febebb77e5f360b93e0ea92a652266c019af5f0ae59a49b4736a940c5661d104b5ee381c9b84e87b547fedc2694555a84e2e92689adf157ff304471ab68dfe4fb03c7b54ce5a98f26a2cd1dcbeb9eb851232593e06c72606ae885630e9a2be227817cdaa0eccc33ad283cf5583a64b158374165319e33df124112cd4f31b5ab65f9e5891f12f5fe1b2d79fc2eaa89570c77b11913b252ee57c04db2f2c8f9fb65d920cc9c5", 0xd3}, {&(0x7f0000005dc0)="c67f6c97ff5aaea21b326a0674c1b57fe498e2a89d2d3dc6707162c1b6fc14dc562de830c2677c6a372358e928c77ad639dd4ddd195f65500677bcf5faacfae2581a3426cd78bb7cbde1fcd435a2a6403ed22fad2350186bc0fe7fd2", 0x5c}, {&(0x7f0000005e40)="291b85c51796ba694fd51993afea80eedccf828f2eaa76bb5cc556d4d730bb1c0ac36513c0fb0f0384a360a46274d29f8edc712e4ffa96e5f0984f30b6372b8fe63a4310cbccb89ad5a6a031d96e47b73ce6e57046fb19393862fb20fefd0e1b43dc19e3c94a5987a0ea23dbfdf2e75c8b208e55715b60c930249e70f920885d844507ff7c25dc84b3623aad512963331a3ad12d329bea935f5116b93f995405af941a8ca32a7b16ff37b13178b291fc2d5e3a0e248e5327b63ab6d798428c6cd54de4b5a22e20ea036e6999f38a55735e43728a1265b0f908bb1ef8c95183fc2e43fdd6774787092c5043", 0xeb}, {&(0x7f0000005f40)="dba187e164a945ba3059ff72575af4a6120d155da9644c063e95ddf0bb2a30825fd30c9dbe8601c225095fbf74fd32e42f0b6b72339ff3fde9fa8e30772ed17ec887ae720e7531da8a67d2da635f23525608f62f264cc2a42e148f987dca2eacfb19f9b1d75cd513b72a9993611817cdce01f54a900fd66862d953e7c106069946c28eae7025392a1b5d3c8f22407682db63b10b0d50beb6b108185eb6070ad9360850898d", 0xa5}, {&(0x7f0000006000)}], 0x6, &(0x7f0000006240)=[@rights={0x10}, @rights={0x38, 0x1, 0x1, [r0, r3, r2, r2, r1, r37, r2, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r2, r3, r1, r3, r1]}, @cred={0x20, 0x1, 0x2, r38, r39, r40}], 0x90, 0x40080}], 0x4, 0x880) 19:24:13 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) ioctl(r0, 0x28912, &(0x7f0000000000)="bbd04e705a69d748764070") r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:13 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0xffffffffffffff14, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0xfffffffffffffce0) 19:24:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) r2 = memfd_create(&(0x7f00000001c0)='filter\x00', 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x34, 0x20}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000280)={r3, 0x100, 0x1f}, 0x8) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000030707031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 19:24:14 executing program 1 (fault-call:4 fault-nth:21): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 297.403795] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000012 [ 297.427032] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 297.436201] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 297.445705] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:14 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4480, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) [ 297.486034] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 297.498012] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. 19:24:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) [ 297.581601] FAULT_INJECTION: forcing a failure. [ 297.581601] name failslab, interval 1, probability 0, space 0, times 0 [ 297.592990] CPU: 0 PID: 11915 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 297.595811] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. [ 297.601510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.601518] Call Trace: [ 297.601542] dump_stack+0x1c9/0x2b4 [ 297.601566] ? dump_stack_print_info.cold.2+0x52/0x52 19:24:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:14 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/dev_snmp6\x00') accept4$bt_l2cap(r0, &(0x7f0000000180), &(0x7f00000001c0)=0xe, 0x80000) sysfs$1(0x1, &(0x7f0000000100)='/dev/ppp\x00') ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) mmap(&(0x7f000035d000/0x1000)=nil, 0x1000, 0x1000004, 0x32, 0xffffffffffffffff, 0x200000) r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40, 0x0) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x0, @dev={[], 0x10}, 'veth1_to_team\x00'}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc10c5541, &(0x7f000035dffc)) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f00000000c0)=0x7) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000200)={0x800}, 0x4) 19:24:14 executing program 7 (fault-call:5 fault-nth:19): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 297.601588] ? lock_acquire+0x1e4/0x4f0 [ 297.634749] ? seq_read+0x71/0x1150 [ 297.638397] should_fail.cold.4+0xa/0x11 [ 297.642474] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 297.647592] ? kasan_check_write+0x14/0x20 [ 297.652005] ? __mutex_lock+0x6d0/0x1700 [ 297.656081] ? graph_lock+0x170/0x170 [ 297.659896] ? __kasan_slab_free+0x11a/0x170 [ 297.664316] ? find_held_lock+0x36/0x1c0 [ 297.668395] ? __lock_is_held+0xb5/0x140 [ 297.672481] ? check_same_owner+0x340/0x340 [ 297.676815] ? rcu_note_context_switch+0x680/0x680 19:24:14 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:14 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair(0xb, 0x0, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f00000001c0)={[0xf000, 0x5000, 0x102000, 0xd000], 0x3, 0x1, 0x6}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0xa40e}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000002c0)={r2, 0x3, 0x1000, "c8c01dece4daddef417fdfa5c86c5e9e48fe19b0c53a315877dc436acaf5eeb32b21991d506e5c1bb081b9fcf23b8e0fa07719ba7c13d2093d727de5978fdcaf8ab6753afc1bd344db85dfdd5d3aaa57da07221c2805159ca2f00d4ad7db336787d64b574c6b769078173d3c532c8ae2f9fac3f30c6f827f28f0651df6a500ccae90cc05ee3e3b89ddeaac53579fbee471f9fe78ef866f4dd16569a032ede532393b5164f2d1cd5da95ecddddef7e586f555720d84bf5ee2a860c7bc5e22489371c71bfa589efdc2f3312567f215c81e0de2bff5d76da009e2cdc52378089fe5f6ded538c8dccba7ec763f2aa18cc1f811c4bc4fa2ef1d07d615b01e23db8931e5192af66162366bb4a58267ca1c42093274392f69d04a75353aad2d1c28afa9b72744f2a7db9148fbd9481ac71392993188757b9a666b275f3766bccbbb587722b4abb8528643313a9b6b8846eee1ff292cf333fbdc10956023e5ab5253598b39d0fb8b72d4f1cafa4ca8cb4e33f4bec13fbc166dce68322175e2e7c2de7e804caeb54b6217117100a23d9aabd64715db83cb08efcfde14cd26400c93386cc6b5833187975f208884e4fe36420a8aeefec828bd5db9890c5163592baddd367dfe675abc0095ab5358272e94ca3fccf79a36ff4264ad9cafb9548cd6fca7e99f65d2e25e75e9d1996b6752912b899f57201c5c4a26de3f044970617860e4313eb2d728be1466278a3802924f94532862a6d99f55b039704785e34d050206cfbba9350d5763ec3c7737d2c6823be12a7708571422c4660f5ac2308a52f92106f8f44f5d0559ec8504c7b0b85bec2539c0b9fd00289ef21ee5455799b68eadc9aac04619d80dd8cb52143fc9ad17b1f1a18a5280c1c5a32d68a73eb772c13de71fe05a5c0d85cae918b4db71d52250ee1ef86569325e35214fe47e87d52a8885d1cb51bec824c213b99aac049e463d8f47ced89f5a8cadfbc379922ed611757111c44a207529d44a01248fa0ac5838c02f77c15b662c8215d344be452539cb0c7b87673bed80a0377a9966a8e375bb8c5b98644bd1e4e536a2fed507847e11bcd89272814e1cf43ce863174e3f70466a269424e4ac7e7348cfeb00bef072dde69a29c1d4f7f4aefb6478ab4a401bca24dc9e682be5c503f51e45fcf53e8adac62156de90dcfe900dfbd0025b2bdeba1918bcb19e00f477f35b1a78cfdc3675561fd9e3f4618bd45ed28bc8be64d3d0b6fb1ef97682a9574d018dc16ce5d6c75aa9c8cf45279d56ec2942f0587f8553d718a855d6f774f1f249501a973d907ac811d2a41dbcb8a2665bea4f06cdc40b88affebf84baa4345874dd7f5757f19fc9c917ca63112e7d78f510215e7d090534325081618e4392076b760676628ad6b90cde2d0dbd7e3df416758259f0fb80e0e7fe53702abd5fb504a0da723b1be28241decaebe330046dbb87fd0b4a8e0800baa1ba2fde07a5018d4cbc42fb1da6c3698eeee0e44229c6a1f7199489303ed481d0290439a5905db4b8058247e7056a8aaf80c6a1ce969d6185978d21c82a31e73eb228b7bb3d95566c317abb0f10f8cbefe56fb3671c022c5eacc8632f5fd8fcf97839a59afb1be3b5d9cec16aa38c60302c51d96ee5cf85d35444a8c6013f6301dcf10a8eacb1ae59cc4352a18c4bcb67065b2fe3f9f5baf908768362ca3b820ed3cdbcaed788acb28306957b8db548f61798919370876db3a62d6f08e341531b988b29b55ce62034c8941fbbf025148cad8fe6582cabbb46e8db99b379f4b172475f6bf2a08dd894fd5783798151ac38bd1c94edd0184fb1a578b878ab2a51197d2477902bc8e64eb5d31dc0001ac405c22f59b351a6251dec689a34ded63a2ae9550d6757fc0b5f3c3fcd543cb95ce80c1685d9dd0bf71a61e8f703736002eefa52ab8605389c368d1c0b338403c459bf0044acf726f86eba71eb017a378df0d392ed26afebee2c1d9d3a4116fa02bece702d539660948f0019ea8b8f802ac95c1116dc64041481c993ce828d22954191b9f09a9ba882b0b4f7210cbaa4087c060650a7d7550f32c8e4adf9b9ea1465033558900ca9137471e8d9663288d4416c9a41e8e172142f208b0336628c092261c02980a18528108c471a729208cd6a62a403d74b75fbd5de256b137b8bc7559003180e58fb78279bca1b8e01304f6bbc77c0c94644f5cf08fc6a584174421b7d8f53f50921d808ac33dc23f4336a46665072ecbabd1d2b944ff370edeab56837a7d44b5b6e728db82d3a4d3524b8b05836d4e48ee1acd18d9c04da85b53ecdd9dd83b0f4c1bf9942d8ab14333fa47e899e08eaad8573b4b0b68f91c4e3c57bd1b7d417ed51e308c0a7ce791697ca2bc20716beb14a1999114801eff6192fab8ffde0ac7ac58aac0eeb5bf9b47460486a49742e30f215b42b700632058693edecb96d6caa03b4bcfa2c140cd1b6e48c9fa8cf54acf05fec4332527df392b90092450927b866466873c8510476c68ee6146b4ed5324fdef453dfe9a6be5e70d3c59288fccd056f044b6288364efd999a224cb2ef9604aefb2e3046a9434a2767034e0a3150b3f89bfc78044d999590daa7a644afdc2955a09ccceecd4809bf17d54ca99f97750305072d026c659e5cfcc8a39974d833026fe53ba7bc9fe15c75cced24a4fcde92514a4515b005d6cebcf1516eaf78db0f756c5f98ac2ef84466aee3515990d2a3601d4bea6d68ff0eaed1de1f2c14f8b020478efb0b337280d64247e0f3c9a9657a82094b7550f90829fd3b83e6e516fc17c91a1edffc78ce2049aff56c552860cf26167181699276677fdae01d58982fd15a356d2a06d374b2fdcdfc66b4417f60062dbee2fd1e5b1512a9226d2bcce70ffb424bdf270b081fa00506ea7eb50093eb75eba34bc6da77da153a5f51dc3837e9f95c412063639ccf7addbf99a97920e408977831188c93024537eba365e2192700af67daa2b8f19ad027e5350439e2e8b63e81d6167322bcd824f415934be22b73417df72cf3ec00e1b1f270505b9e3a01c9a9ecef4c19ec8db66ae9f2ad9b4db49d562447f24c4b454777d150e3bca949828ddf993faab721cf0b16adfe37af10bcd7581d684555a5297a9a8686684e82db312feb22d90d162b6fd5757af21686e3d12a8fc6e20781eb77a7a5af3ef0742f521ea0f757be5199a2f1c8dd1186b5a836642e0d471f54f1cd6e3ba0f07929ae83c1d1ff37b9138badb0cddb90a8071db4fb2cc9eb12f3569c33b579f6fb573b005388547269153336dc93692b03f2a7f02adeb4c7314782e46205993264fd062df704ef03459fce89aff896bc5336858a0aea181fd90b6cef51eace56e27905252e6889cc5de9a6593514f98dc2d15dfddf46e939b544d5f1fa84989744b3a9907b91c71639b2d048f71e4c89cf80aa0df313574f68f7bf061de28eaa14520237ebb5219af290f523a027f07f889816cb969fb114f760c067811ab30565b17d2276b41a31e9ef1902ae9cf66ca4f53e7b128c61efc631bb284e68c7c4382b36e8a7f94cb83375306352b71b1b9e88215d4a6207a53b10aa2a759428fa5d7023103672dcdf263e8006c61e5be77e7534e2f642a8417f9a06555616475d99f47d6dad0456c72796d93bb32fcd42111a36377822a89d225e81895e3d638f4275741082a04534a21164da7c92d7f467d2270d016cb6edd0410583ca2e599ce9121882a866002bc8fb7898bc39f9ca982e582c31368829d263d3250e35a7e502ad75a8c4babec44eefa426ce32bc8190a0f5c9f3df2e9791167169f1713f309166f9dc267fa759959fe3636c00fcb6aac3baddd9a4a7bc6b1a762a27da0ad836c719ece10ac16ded1b54d6fbccfcde79a62f754e69a11a129be28952093a316d6e9e2b6a5ea64e7c7c9ba41bfc041478d6825b2f9a4598fd7aed01b43674c564211600f7890dbfc60a1cc1d773ccd80b19487b2d9fb832844fb91a8c4d87a9695aa664ce191bb557aa0adccbd1095ee37dc5a7fd74e65e48120d81e1626ebdb7406c54d86f7967eebb0173513b4fe945eaacd93f90e8648894ded2151c82501d1655e9de00a370005ceeb651a6bf02a406c614af7252131e1e98ac4e352ff521d32eacb485a9f23e0699b0b97861aad8a99e9f867881ef0bd0d3062c6765217e96ceedcee3e27336609f2162882d926716f104c73e9f8064018f344d3a56de2fafe8e846637004a51173ab3f2167ccaa93c4f933cb4377b2c20c4f5b936341912236ab071680dacde2e3d9a89f9309b2187c923fc1ae0f463b83b987aaa618677b0d6e1151343828f39d8e28a5b5fc5e7becac9fa89e051f87729ddb8a793189883bbe3047d0a2229e5267b783b92c9fa8d5b8f13008e1e712d358449295418a1a666da1492c1ad478766039fd7e0d46d89eb6b7e015b47798e577087a36ac5a69fae24b1c700ea2089aa5f1710401c552f94c2b8742220a07b245cd980359f621747419053979a9f85a4bdc1b78400f570aa6ce5c22cb51bf8ff8ed1c08a31f4cba2040ccad230170ab5098035bcdf3a6a3d05985d0b3b43ce36a50bc2517a47f999a6bc769677cdd9a4b6d4705ee0c88dc191ecf8c4368793782e1e60669791f3b89b3f18f926756e9db811815f3e287ec2a8a36ad11f03f4cd54ae7d02470abf4a212e61b44ae299eefba836050db2158e712b80e9f529e1ec568327eecc47767cdb661168b21745d6d69d768f3d7b9fe8a28d262e23d0427a571f1b4279a3ed34017977e845e83b7ef5448a70e170d759607e6e12a95c1792a96adc2e32e5cd99540c59fdbbf9359bdebd45241c5a3e42882044ef45e5c2327f2791a6e5b6cb6c865473d99cd14e37d17d6f7e7d6bcc972e8ff64818cb7793bae4ad930817bace21648c311865333e0343c064d8dcb25f9b1283135b8df43c06d1b5379e3498f82d1fdf5d10fa3f3341010bec91e6b94480cbdda88851589e8819d3c26c23a34909fc8c1cb490229f0fa4291de1317bec20135e09b633a5d1542e6399389b174bb0d6daae4729060af5d7879373b62afbbe1b1677f453d5deb2a11629000c3099e4a83bdb4b1c64a5de6d0ff288089719a99f9d8c94e2ec3b901cd19fa150e6505a0a9ad2fc520ddd04404fb664017d01202c6a6c4bfe13d3e99fa600f8a257b86e83c1f0a1d3250a2cf4ca9205e1a09783edecabe63313135476505dcca0162157052a67092b0c3daaaaca5ba163124a7f86d2924aca16d2810ac1882013d296abb151a38f90217b2382c5720091f3264c32bfd3ba96cca3b5b6ae961b788ae71152137d43e52853431711c19cbdd95bb091320ffd8c1e9c0cd1469b4eb93e0ad4e46378480e0616604f9de4b7ecde103edc193128bd8fa170d02e5b02bce38fe8faf58e10b0e8bf6189eb32c392d81cd40dd205f2155fbb16b82901eb7d4fc1b834a18e45ce089cb322fff6e18dcdc286ed7c6252de8482b43ed3a7847bc12248b288b3f20370945d116c0fb810238f03c4ebb9d6f11f528b714296c1234b9e3f91d0a55ed5ed1f7c2f94b3b30e20c8e3ff6db72a93bf8b9d54d386d98c5e8c0d9556aeb32c19f9b0db058dd96c88b8be7d235e374ba5634cb5fd340f8e9713c3f76f287a86390c170b8bb309076d331519d3faffa732dae5ffb10867ce2b5722a6207bccf0329b50faeabae049bb1317564169530617977ad4cdf788582a5fb0346aded14bc3f0097c5fb4071b405c8adb2c7c33bf91b10b0de2a5fc72bb0f84bb1d31a65beb92f541350737c50c8ea27c0e5"}, 0x1008) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r3}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) [ 297.681760] __should_failslab+0x124/0x180 [ 297.686010] should_failslab+0x9/0x14 [ 297.689825] kmem_cache_alloc_trace+0x2b5/0x730 [ 297.694509] ? lock_downgrade+0x8f0/0x8f0 [ 297.698675] proc_pid_stack+0xaa/0x390 [ 297.702578] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 297.707703] proc_single_show+0x101/0x190 [ 297.711871] seq_read+0x4af/0x1150 [ 297.715439] do_iter_read+0x49e/0x650 [ 297.719294] vfs_readv+0x175/0x1c0 [ 297.722857] ? compat_rw_copy_check_uvector+0x440/0x440 [ 297.728263] ? fget_raw+0x20/0x20 [ 297.731724] ? __sb_end_write+0xac/0xe0 [ 297.735713] do_preadv+0x1cc/0x280 [ 297.739252] ? do_readv+0x310/0x310 [ 297.742877] ? __ia32_sys_read+0xb0/0xb0 [ 297.746951] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.752311] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 297.757403] __x64_sys_preadv+0x9a/0xf0 [ 297.761367] do_syscall_64+0x1b9/0x820 [ 297.765249] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 297.770611] ? syscall_return_slowpath+0x5e0/0x5e0 [ 297.775534] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 297.780537] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 297.785541] ? recalc_sigpending_tsk+0x180/0x180 [ 297.790285] ? kasan_check_write+0x14/0x20 [ 297.794509] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.799343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.804518] RIP: 0033:0x457099 [ 297.807701] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.826599] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 297.834298] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 297.841559] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 297.848827] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 297.856084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 297.863337] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000015 [ 297.976456] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 297.986524] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 297.996467] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 298.005856] FAULT_INJECTION: forcing a failure. [ 298.005856] name failslab, interval 1, probability 0, space 0, times 0 [ 298.017267] CPU: 1 PID: 11936 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 298.025765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.035128] Call Trace: [ 298.037720] dump_stack+0x1c9/0x2b4 [ 298.041371] ? dump_stack_print_info.cold.2+0x52/0x52 [ 298.046582] ? lock_acquire+0x1e4/0x4f0 [ 298.050577] ? seq_read+0x71/0x1150 [ 298.054247] should_fail.cold.4+0xa/0x11 [ 298.058339] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.063474] ? kasan_check_write+0x14/0x20 [ 298.067731] ? __mutex_lock+0x6d0/0x1700 [ 298.071816] ? graph_lock+0x170/0x170 [ 298.075634] ? __kasan_slab_free+0x11a/0x170 [ 298.080066] ? find_held_lock+0x36/0x1c0 [ 298.084152] ? __lock_is_held+0xb5/0x140 [ 298.088267] ? check_same_owner+0x340/0x340 [ 298.092610] ? rcu_note_context_switch+0x680/0x680 [ 298.097565] __should_failslab+0x124/0x180 [ 298.101822] should_failslab+0x9/0x14 [ 298.105646] kmem_cache_alloc_trace+0x2b5/0x730 [ 298.110323] ? lock_downgrade+0x8f0/0x8f0 [ 298.114479] proc_pid_stack+0xaa/0x390 [ 298.118452] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 298.123571] proc_single_show+0x101/0x190 [ 298.127714] seq_read+0x4af/0x1150 [ 298.131282] do_iter_read+0x49e/0x650 [ 298.135102] vfs_readv+0x175/0x1c0 [ 298.138656] ? compat_rw_copy_check_uvector+0x440/0x440 [ 298.144113] ? fget_raw+0x20/0x20 [ 298.147584] ? __sb_end_write+0xac/0xe0 [ 298.151561] do_preadv+0x1cc/0x280 [ 298.155101] ? do_readv+0x310/0x310 [ 298.158735] ? __ia32_sys_read+0xb0/0xb0 [ 298.162785] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.168135] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 298.173247] __x64_sys_preadv+0x9a/0xf0 [ 298.177234] do_syscall_64+0x1b9/0x820 [ 298.181128] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 298.186486] ? syscall_return_slowpath+0x5e0/0x5e0 [ 298.191411] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 298.196430] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 298.201441] ? recalc_sigpending_tsk+0x180/0x180 [ 298.206199] ? kasan_check_write+0x14/0x20 [ 298.210451] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.215288] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.220471] RIP: 0033:0x457099 [ 298.223667] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.242562] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 298.250284] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 298.257555] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 298.264829] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 19:24:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0xf0ffffff}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0xffffff9e, 0xf0ffffff}, [@NDA_LLADDR={0xa, 0x2, @empty=[0xf0ffffff]}]}, 0x28}}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000180)=""/152) r3 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x83, 0x1) getpeername$packet(r3, &(0x7f0000000040), &(0x7f0000000080)=0x14) open(&(0x7f0000000100)='./file0\x00', 0x2880, 0x2) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x6, &(0x7f0000000240)=[{0x8, 0x5, 0x100000000, 0x5}, {0x8, 0x8, 0x101, 0xffffffffffff7fff}, {0x6, 0x0, 0xf84c, 0x7fffffff}, {0xc5b, 0x1, 0x6, 0x1000}, {0xfffffffffffffff8, 0x1, 0xce4, 0x7}, {0x0, 0x40, 0xffffffff, 0x10001}]}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000340)=[@in6={0xa, 0x4e24, 0x3, @loopback, 0x2}, @in={0x2, 0x4e23, @rand_addr=0x9}, @in6={0xa, 0x4e22, 0x4, @ipv4={[], [], @local}, 0x1}, @in={0x2, 0x4e24, @loopback}], 0x58) 19:24:14 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x4, &(0x7f0000013ff4)={@local, @rand_addr, @multicast2}, 0xc) getsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000000), &(0x7f0000000140)=0x2) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000040), 0x4) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 19:24:14 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, &(0x7f0000000340), 0x38f, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000040)={0x0, 0xf0f9, 0x30, 0x9, 0x8}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x7fff, 0x8206, 0x9, 0x800, r4}, &(0x7f00000001c0)=0x10) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000000)=""/25) r5 = open(&(0x7f00000008c0)='./file0\x00', 0x200, 0x0) ftruncate(r5, 0x280080) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff}]}, 0x10) sendfile(r1, r5, &(0x7f0000d83ff8), 0x200800900000002) [ 298.272107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 298.279387] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000013 [ 298.316064] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:15 executing program 7 (fault-call:5 fault-nth:20): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:15 executing program 1 (fault-call:4 fault-nth:22): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:15 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:15 executing program 4: socket$l2tp(0x18, 0x1, 0x1) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x200800, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl(r0, 0x8915, &(0x7f0000000280)="153f6234488dd25d766070") r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000080)=0x1, 0x2) 19:24:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) [ 298.539558] FAULT_INJECTION: forcing a failure. [ 298.539558] name failslab, interval 1, probability 0, space 0, times 0 [ 298.550918] CPU: 1 PID: 11983 Comm: syz-executor7 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 298.559420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.568783] Call Trace: [ 298.571384] dump_stack+0x1c9/0x2b4 [ 298.575081] ? dump_stack_print_info.cold.2+0x52/0x52 [ 298.580289] ? lock_acquire+0x1e4/0x4f0 [ 298.584297] ? seq_read+0x71/0x1150 [ 298.587956] should_fail.cold.4+0xa/0x11 [ 298.592044] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.597183] ? kasan_check_write+0x14/0x20 [ 298.601448] ? __mutex_lock+0x6d0/0x1700 [ 298.605525] ? graph_lock+0x170/0x170 [ 298.609343] ? __kasan_slab_free+0x11a/0x170 [ 298.613779] ? find_held_lock+0x36/0x1c0 [ 298.617867] ? __lock_is_held+0xb5/0x140 [ 298.622005] ? ovs_flow_cmd_new+0xa28/0x14b0 [ 298.626476] ? check_same_owner+0x340/0x340 [ 298.630819] ? rcu_note_context_switch+0x680/0x680 [ 298.635775] __should_failslab+0x124/0x180 [ 298.640030] should_failslab+0x9/0x14 [ 298.643855] kmem_cache_alloc_trace+0x2b5/0x730 [ 298.648544] ? lock_downgrade+0x8f0/0x8f0 [ 298.652724] proc_pid_stack+0xaa/0x390 [ 298.656645] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 298.661804] proc_single_show+0x101/0x190 [ 298.661829] seq_read+0x4af/0x1150 [ 298.661864] do_iter_read+0x49e/0x650 [ 298.661899] vfs_readv+0x175/0x1c0 [ 298.661925] ? compat_rw_copy_check_uvector+0x440/0x440 [ 298.661957] ? fget_raw+0x20/0x20 [ 298.685768] ? __sb_end_write+0xac/0xe0 [ 298.689778] do_preadv+0x1cc/0x280 [ 298.693333] ? do_readv+0x310/0x310 [ 298.696970] ? __ia32_sys_read+0xb0/0xb0 [ 298.701042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.706422] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 298.711538] __x64_sys_preadv+0x9a/0xf0 [ 298.715535] do_syscall_64+0x1b9/0x820 [ 298.719440] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 298.724820] ? syscall_return_slowpath+0x5e0/0x5e0 [ 298.729755] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 298.734762] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 298.739779] ? recalc_sigpending_tsk+0x180/0x180 [ 298.744548] ? kasan_check_write+0x14/0x20 [ 298.748831] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.753694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.758894] RIP: 0033:0x457099 [ 298.762099] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.781005] RSP: 002b:00007f9849387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 19:24:15 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={'veth0_to_bridge\x00', {0x2, 0x4e22, @multicast1}}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000000)=0x253, 0x4) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000000c0)=0xd60a, 0x4) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:15 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='reno\x00', 0xfffffffffffffc8f) 19:24:15 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x3b, 0x32, 0xd, 0xe, 0xa, 0x20, 0x6, 0x150, 0x1}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x114, r2, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @loopback}}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x81}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80}]}, @IPVS_CMD_ATTR_SERVICE={0x68, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x2}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffffffd}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @multicast2}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x13}}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fffffff}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x4}, 0x4040000) [ 298.788715] RAX: ffffffffffffffda RBX: 00007f98493886d4 RCX: 0000000000457099 [ 298.795974] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 298.803248] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 298.810528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 298.817797] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000014 19:24:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 298.908388] FAULT_INJECTION: forcing a failure. [ 298.908388] name failslab, interval 1, probability 0, space 0, times 0 [ 298.919751] CPU: 1 PID: 11981 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 298.928257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.937618] Call Trace: [ 298.940227] dump_stack+0x1c9/0x2b4 [ 298.943859] ? dump_stack_print_info.cold.2+0x52/0x52 [ 298.949048] ? lock_acquire+0x1e4/0x4f0 [ 298.953009] ? seq_read+0x71/0x1150 [ 298.956632] should_fail.cold.4+0xa/0x11 [ 298.960704] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.965829] ? kasan_check_write+0x14/0x20 [ 298.970055] ? __mutex_lock+0x6d0/0x1700 [ 298.974102] ? graph_lock+0x170/0x170 [ 298.977895] ? __kasan_slab_free+0x11a/0x170 [ 298.982300] ? find_held_lock+0x36/0x1c0 [ 298.986394] ? __lock_is_held+0xb5/0x140 [ 298.990451] ? check_same_owner+0x340/0x340 [ 298.994761] ? rcu_note_context_switch+0x680/0x680 [ 298.999679] __should_failslab+0x124/0x180 [ 299.003906] should_failslab+0x9/0x14 [ 299.007694] kmem_cache_alloc_trace+0x2b5/0x730 [ 299.012350] ? lock_downgrade+0x8f0/0x8f0 [ 299.016511] proc_pid_stack+0xaa/0x390 [ 299.020387] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 299.025493] proc_single_show+0x101/0x190 [ 299.029642] seq_read+0x4af/0x1150 [ 299.033176] do_iter_read+0x49e/0x650 [ 299.036968] vfs_readv+0x175/0x1c0 [ 299.040497] ? compat_rw_copy_check_uvector+0x440/0x440 [ 299.045857] ? fget_raw+0x20/0x20 [ 299.049313] ? __sb_end_write+0xac/0xe0 [ 299.053275] do_preadv+0x1cc/0x280 [ 299.056803] ? do_readv+0x310/0x310 [ 299.060414] ? __ia32_sys_read+0xb0/0xb0 [ 299.064501] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.069853] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 299.074953] __x64_sys_preadv+0x9a/0xf0 [ 299.078915] do_syscall_64+0x1b9/0x820 [ 299.082790] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.088235] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.093152] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.097979] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 299.102981] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 299.107980] ? prepare_exit_to_usermode+0x291/0x3b0 [ 299.112992] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.117823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.122997] RIP: 0033:0x457099 [ 299.126204] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.145098] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 19:24:15 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:15 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x84, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 299.152790] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 299.160044] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 299.167321] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 299.174573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 299.181824] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000016 19:24:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4`', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:15 executing program 7 (fault-call:5 fault-nth:21): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x73, @multicast1, 0x4e24, 0x1, 'sed\x00', 0x8, 0x4, 0x14}, 0x2c) mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0xc, 0x20000031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084503, &(0x7f0000002ffc)) [ 299.464396] IPVS: set_ctl: invalid protocol: 115 224.0.0.1:20004 19:24:16 executing program 1 (fault-call:4 fault-nth:23): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:16 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ioctl$sock_bt_hci(r1, 0x400448ef, &(0x7f00000002c0)="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") ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180)={0x3}, 0x8) ioctl$sock_bt_hci(r1, 0xc00448f2, &(0x7f00000012c0)="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") 19:24:16 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:16 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket(0x4, 0x80006, 0x7) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0xa4, @dev={0xfe, 0x80, [], 0xf}, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1e}}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e21, 0xff, @ipv4={[], [], @broadcast}, 0x9}, @in6={0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x1c}}], 0x74) getsockopt$inet_int(r0, 0x10d, 0x5, &(0x7f000079bffc), &(0x7f0000000080)=0x4) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1, 0x1) ioctl$TCSBRKP(r2, 0x5425, 0x8001) [ 299.555984] IPVS: set_ctl: invalid protocol: 115 224.0.0.1:20004 19:24:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) [ 299.739658] FAULT_INJECTION: forcing a failure. [ 299.739658] name failslab, interval 1, probability 0, space 0, times 0 [ 299.751162] CPU: 0 PID: 12107 Comm: syz-executor1 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 299.759737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.769095] Call Trace: [ 299.771695] dump_stack+0x1c9/0x2b4 [ 299.775346] ? dump_stack_print_info.cold.2+0x52/0x52 [ 299.780550] ? lock_acquire+0x1e4/0x4f0 [ 299.784544] ? seq_read+0x71/0x1150 19:24:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:16 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:16 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000080)={0x800, 0xffffffffffffffb2, 0x4, {}, 0x80000000, 0x6}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) [ 299.788201] should_fail.cold.4+0xa/0x11 [ 299.792304] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.797438] ? kasan_check_write+0x14/0x20 [ 299.801695] ? __mutex_lock+0x6d0/0x1700 [ 299.805779] ? graph_lock+0x170/0x170 [ 299.809608] ? __kasan_slab_free+0x11a/0x170 [ 299.814037] ? find_held_lock+0x36/0x1c0 [ 299.818123] ? __lock_is_held+0xb5/0x140 [ 299.822243] ? check_same_owner+0x340/0x340 [ 299.826586] ? rcu_note_context_switch+0x680/0x680 [ 299.831551] __should_failslab+0x124/0x180 [ 299.835807] should_failslab+0x9/0x14 [ 299.839630] kmem_cache_alloc_trace+0x2b5/0x730 [ 299.844315] ? lock_downgrade+0x8f0/0x8f0 [ 299.848487] proc_pid_stack+0xaa/0x390 [ 299.852403] ? dname_to_vma_addr.isra.19+0x410/0x410 [ 299.857530] proc_single_show+0x101/0x190 [ 299.861694] seq_read+0x4af/0x1150 [ 299.865281] do_iter_read+0x49e/0x650 [ 299.869106] vfs_readv+0x175/0x1c0 [ 299.872666] ? compat_rw_copy_check_uvector+0x440/0x440 [ 299.878058] ? fget_raw+0x20/0x20 [ 299.881537] ? __sb_end_write+0xac/0xe0 [ 299.885537] do_preadv+0x1cc/0x280 [ 299.889104] ? do_readv+0x310/0x310 [ 299.892741] ? __ia32_sys_read+0xb0/0xb0 [ 299.896812] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.902186] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 299.907319] __x64_sys_preadv+0x9a/0xf0 [ 299.911308] do_syscall_64+0x1b9/0x820 [ 299.915208] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.920614] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.925554] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.930409] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 299.935442] ? prepare_exit_to_usermode+0x291/0x3b0 19:24:16 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8914, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000180), 0x8) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000080)={r1, 0x4, 0x785, r2}) [ 299.940481] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.945345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.950566] RIP: 0033:0x457099 [ 299.953771] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.972683] RSP: 002b:00007fe5af475c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 299.980410] RAX: ffffffffffffffda RBX: 00007fe5af4766d4 RCX: 0000000000457099 [ 299.987689] RDX: 1000000000000120 RSI: 0000000020000480 RDI: 0000000000000004 [ 299.994981] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 300.002261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 300.009535] R13: 00000000004d3f30 R14: 00000000004c8916 R15: 0000000000000017 19:24:16 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101000, 0x100) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0xba, 0x4) r1 = dup(0xffffffffffffffff) ioctl$SG_GET_PACK_ID(r1, 0x80dc5521, &(0x7f0000000000)) 19:24:16 executing program 1 (fault-call:4 fault-nth:24): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:16 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000080)={0x7, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}]}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) fcntl$getown(r0, 0x9) 19:24:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000004, 0x0) 19:24:16 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="657874340f", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000400)=0x4) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) r3 = fcntl$getown(r0, 0x9) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x10001, 0x4, 0x4, 0x5a00000000000000, 0x3, 0x6, 0x82d6, {0x0, @in6={{0xa, 0x4e22, 0x6, @empty, 0x1}}, 0x0, 0x817b, 0x8, 0x8, 0x1}}, &(0x7f0000000240)=0xb0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000280)={r4, @in6={{0xa, 0x4e23, 0xd5, @local, 0x98f}}}, 0x84) ptrace$getregset(0x4204, r3, 0x1, &(0x7f0000000100)={&(0x7f00000000c0)=""/41, 0x29}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x18) ioctl$TCFLSH(r1, 0x541b, 0x930000) ioctl(r0, 0x12d6, &(0x7f0000000000)="58734c43031673a5b43f5c62df7af9669798aa27073863196cc5fae2b83307be0724714f70d543e152de995fc58a327ec6c2b3dbc8be9c115783742a2bb7ce4c38") setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000340)={0x5, {{0x2, 0x4e20, @multicast1}}}, 0x88) 19:24:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000dc, 0x0) 19:24:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:17 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x2d, 0x4, 0xfffffffffffffff9, 0x401}) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) ppoll(&(0x7f0000000040)=[{r3}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r3, 0x81785501, &(0x7f00000001c0)=""/66) 19:24:17 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000038, 0x0) 19:24:17 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80300) r2 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000002c0)={0x28, 0x0, 0x2710, @host}, 0x10, 0x80800) splice(0xffffffffffffffff, &(0x7f0000000280), r2, &(0x7f0000000300), 0x1, 0x8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)=""/202, &(0x7f0000000240)=0xca) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000023c0)={"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"}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000b80)='veth0_to_bond\x00') getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000780)=@assoc_value={0x0, 0x4}, &(0x7f00000007c0)=0x8) fstat(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f0000000680)=0xc) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x0, 0x4, 0x0, 0x5, 0x0, 0x8, 0x80000, 0xc, 0x6, 0xffffffffffffff00, 0x1c00000000000000, 0xc69, 0x5, 0x401, 0x0, 0x1, 0x11b0, 0x0, 0x8, 0x4, 0x2, 0x10000, 0xfffffffffffffffe, 0x0, 0x5, 0xffffffffffffffc8, 0x0, 0x6, 0xe00000000000, 0x1, 0xd26, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x0, 0x7, 0x5, 0x3f, 0x0, 0x9}, r5, 0xe, r0, 0x3) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000a00)=[0xee01, 0xee01, 0xee01, 0xee00, 0x0]) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000a40)={0x0}, &(0x7f0000000a80)=0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000b00)={{0x0, r4, 0x0, r7, 0x0, 0x40, 0x3}, 0xb000000000000000, 0x400, 0x0, 0x8, r8}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in=@remote, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}, 0x4e24, 0x5, 0x4e20, 0x5, 0x0, 0xa0, 0xa0, 0x5c, r9, r6}, {0x5, 0x4, 0xd477, 0xa6be, 0x100, 0x7f}, {0x2, 0x0, 0x6, 0xcf07}, 0x2a9, 0x6e6bb9, 0x2, 0x1, 0x2, 0x2}, {{@in=@rand_addr=0x7ff, 0x4d4, 0x33}, 0x2, @in=@dev, 0x3503, 0x3, 0x1, 0x7, 0x498}}, 0xe8) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000440), &(0x7f0000000480)=0xb) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000005c0)={r3, 0x1, 0x0, 0x800, 0x3, 0x400}, &(0x7f0000000640)=0x14) syz_read_part_table(0x74000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000006c00000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ioctl$sock_netdev_private(r1, 0x89f4, &(0x7f0000000740)="7c9b2e60f31b7284c53a671ab0eb39") ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f00000006c0)) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) futimesat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000400)={{}, {0x0, r10/1000+10000}}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:24:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000120, 0x0) 19:24:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000011b, 0x0) 19:24:17 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x100000000003, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4L', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:17 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 300.957849] loop3: p1 p2 p3 p4 < > 19:24:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267a") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:18 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x401, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:18 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743497", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ae, 0x0) 19:24:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000060, 0x0) 19:24:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000011, 0x0) 19:24:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743404", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:18 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x440, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x881, 0x0, 0x8, 0xffffffffffffff8a, 0x0, 0x1b, 0x10000, 0x8, 0x483, 0x3ff, 0x401, 0x80, 0xfffffffffffffffe, 0xc4, 0xfffffffffffffff9, 0x332, 0x4, 0xfe, 0x8, 0x8, 0x1f, 0x2fa4875b, 0x6, 0x2, 0xffffffff, 0x100, 0x8, 0x1, 0xe6bf, 0x3, 0x0, 0xd9, 0x8, 0x9, 0x8, 0x101, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x22208, 0x475, 0x200, 0x7, 0x12e9, 0x2, 0x7}, r1, 0x6, r2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r3}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000088, 0x0) 19:24:18 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:18 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x9, 0x10000) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000001900)=0xcd2f) chdir(&(0x7f0000000340)='./file0\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000040)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) fanotify_mark(r3, 0x4, 0x8, r3, &(0x7f0000000380)='.\x00') r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioperm(0x0, 0x1ff, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x7000000, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x0) write$P9_RATTACH(r4, &(0x7f0000000540)={0x14}, 0x14) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000300)={0xfff, 0x1ff, 0xfff, 0x3ff, 0x3}) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000001400)={0x1, 0x77, &(0x7f00000017c0)="47364ecef6de833b3e234a8afbdb46bf12a4009861b01c9e978138c4993ff32ccf88aa1269b2de62cb61fad9c77cefda86b46292488d945f73b0f84bd7f27adc4b6b2be7be86763ad0b6096742cc3b6f927bbe2f5630f64721157af1eab3b5b66ef401ab9bbc47c798b640f7dc7ba98d3629ff2d7e779d"}) write$P9_RLERROR(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1608"], 0x2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0xffffffffffffffc2}, &(0x7f00000001c0)=0x8) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000, 0x0) preadv(r6, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={r5, 0x10001}, 0x8) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000240)) r7 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) sendmsg$rds(r1, &(0x7f0000001780)={&(0x7f00000003c0)={0x2, 0x4e24}, 0x10, &(0x7f0000001400), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="48000000000000001401000001000000f285000002000000", @ANYPTR=&(0x7f0000001440)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0e00000000000000", @ANYPTR=&(0x7f0000001840)=ANY=[@ANYPTR=&(0x7f0000001480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="16cdae00003875fefbbfb6d770ca9a000000", @ANYPTR=&(0x7f00000014c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="c900000000000000", @ANYPTR=&(0x7f00000015c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="1700000000000000", @ANYPTR=&(0x7f0000001600)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="b200000000000000"], @ANYBLOB="040000000000000019000000000000000300000000000000"], 0x48, 0x40}, 0x80) 19:24:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000be, 0x0) 19:24:18 executing program 4: ioctl(0xffffffffffffffff, 0x208912, &(0x7f0000000000)="153f6234488dd25d766070") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r1) mount$9p_xen(&(0x7f0000000240)='/dev/sequencer\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1080, &(0x7f0000000300)={'trans=xen,', {[{@cache_fscache='cache=fscache'}, {@fscache='fscache'}, {@version_L='version=9p2000.L'}, {@access_client='access=client'}, {@version_u='version=9p2000.u'}, {@cache_none='cache=none'}]}}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000380), &(0x7f00000003c0)) 19:24:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e6") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c7, 0x0) 19:24:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000fc, 0x0) 19:24:19 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8916, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000000)) clock_settime(0x7, &(0x7f0000000080)={0x0, 0x989680}) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:19 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 302.414797] EXT4-fs: 58 callbacks suppressed [ 302.414812] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 302.430550] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 302.446679] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 302.473697] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 302.512333] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:19 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) socket$l2tp(0x18, 0x1, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000080)=0x1e) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000072, 0x0) [ 302.540635] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:19 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="657874347f", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000087, 0x0) 19:24:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ac, 0x0) [ 302.819825] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 302.845138] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 302.862823] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 302.922164] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:19 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80001, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080)=0x2d6, &(0x7f0000000100)=0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) futex(&(0x7f0000004000), 0x400000085, 0x6c000000, &(0x7f0000000000), &(0x7f0000000200), 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0)=0x2, 0x4) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) socket(0x0, 0x0, 0x0) 19:24:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434e5", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:19 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x296, 0x100) r2 = request_key(&(0x7f00000000c0)='trusted\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000200)='vmnet1@^\x00', 0xfffffffffffffff8) r3 = request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)='selinux\x00', 0xfffffffffffffff8) keyctl$negate(0xd, r2, 0x6, r3) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000080)=0x1, 0x4) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r4}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) [ 303.066826] syz-executor3 (12417) used greatest stack depth: 15160 bytes left [ 303.149399] futex_wake_op: syz-executor3 tries to shift op by -1; fix this program [ 303.185164] futex_wake_op: syz-executor3 tries to shift op by -1; fix this program 19:24:20 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000011, 0x0) 19:24:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000096, 0x0) 19:24:20 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/vsock\x00', 0x480, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001780)={r0}) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x145c, 0x3a, 0x102, 0x70bd2c, 0x25dfdbfc, {}, [@nested={0x1244, 0x31, [@generic="7200e7959bb820af9aebbd6f360073b837798254846f9b91a9c24feb0a45e2cb71982a3866ec5685e4dedff4794666d765221fcf5f51525d40c60a64b52b52ed30ea7e0d4d70682b00426bff6be53c95acc56d7775b7b0958b6ecf0d37f4f51488e4daaadb4904e360b1d4a1d4d7", @generic="3141d688cc78216081fc2434a1979d21b64bf4a7f5f7e93d103f2cd620fdc1a7bb08a30f40e5178a5ea167f00b2e6a2d78d7462d1f3b1052473549250459d29f4fd36ea715b9dc7108fed9043a6a24896d5d0d232f21d7c294ef57602ecaa24f64769b6fb215f0137f2b2bc8f4e17e7dafe8850f3680453a3610fd65329eb42535b50c75ab4ed8d906b8080ff3a6b88f95c95e0d4c222e1ca4525852ec08cbba62a73ab879", @typed={0x8, 0x5b, @ipv4=@local}, @generic="bafe8f6382861664fab645b3f188b0e85ff1aa000e0646f687dc09d569a1e47d04814d3104d694a31655cc3bb7827d08b95c91cf22774815ccecb73cdd5eb10c9fd407c738cf4a6a36da1f19e2282b42bb83c21d5a39692791f014b16887332c1b4f3848cf10f594b1fb70c69f00fab29af9202405564b53bf2f776b42fc4c0b03ae3a3c560a0560a821b009a3853f5ab48bc897828c77ca9aa897b0ad52686549c0fcccd4592986f4a5bdfe497fb4f530ff5462ebc9b94590cdcebab5680ad3086d363a659ad83eb654ef5e7063d899031fc30c6cce2b2972e7261803a77876474cd8e82becc54719bcc94172598718a7e8266462a7417fc466a32df8653d363ce4a69779e54030520bbccbf119b78f4ec20506e0c05c2b0e5f0be084b08df5437ad662e6b0c6c01048aa81e2dd5494f3cb5d7e4defd9e50b880401aa2982649d5514b17ebd62058503ec2af414d733602443a359e2919a55402001e553c0567b217018a33f18491b0a377a88cea952fc7ba18ba50fd7fff86726c2b3d0eb79c0e86a884f0599b6522b14b301eec1ba837966ead1e178d56edf15a61d2b691a0490d4cc7be33e4b6b6e8070795283aa3bd18d74ee35da26ab2946549c6b3600e9d8f54c4c29daf97166eecc7b5d23137617ad1b51f0f979a5a65f1dc89ddbafdf313fff1cbf16607397ec7feaa2f64be5ef6292c49cf4c3201df63466fcc6e426ca17473c253c31d624956dcf48cab3d2ab96bb888c646b5b1b009d496ec8a0155df9864c1bf66c297491aa95a9e64201b926243bbfb77fc81f3c513972731df3011780ad69932c3d5d750dcc648c2a9f56ce4c1c86c397837bc4237abf879131f087c52970468c519bf4118a963b204725227f1ee935a02624e0a01c6d4caed349ada66239b2ee55c5a3dd4531d8a5d651b88dff971b66a20967f112b2fb618e8b419fba1c4cafb08ef9f7cf496e259dc6ad2f06e50acf3c801fe8f8ac7f9ffa74195c85e3c98c211befe655961ed0fa09fcfaa3977c9a28e8d130c8c86927c2b05403255751a19b56af02a308f7903aa7c9c28c938ab0090b4899d25307400ce1bb36ecee23e968dd1c40b41af1f7e47a2c0211f56accffa5df4ad5da1bd22008e6fc5660ca1abf4a7970012208ccbfd86a6655774569534f8c94510e202d8fdaa151100007d03b9261afaac18b1a0619667a27efe85793e08b6d730a9bc90e45ed47315db616a33f47b63d324fd65437f66886859c55eb5d7c79c1188b7f9b1e87082fe5aa46e9d0a6c27e70013f7931c8fa953c1ebe765ac64d07c79576faeb03364a629da0698f345c06e9e65c85d22e9a814bb7a2f0d090de4a90a0e9460edf506e1f2e26d973fba8b7a2fe7b1b9b00be6b5ce2c1f348dea3b64110deb964914b003c4ecfc63d9cd21f8982eda0289b26e59e2cbf81b0fdcd2e0d22fb210f7444a5cadff61f897cc1ec55fd43119956a96cc715cf12af32b8acea1bdacfd9c6782bebeedc33ed715aa8f9ee92e9ce2338ec4fda70c01f68420ddcd2e7fdfed786256bd8b8003fcf7737475a061df16d66ee05c328ee32c6c7ab70a6b1e51d60a29f6421bf7c284e5ab63dbd6d75a40176d496c81131a3dd912505d364334dbe43847df1c5ca7d071223a75a8d38c243c2c8e76573662522e035f18ef54091b1766329685c1ceb6793b194f135ccc83720bc0df9201c2eb3ae1b8e7b184c0d98580bc8d8093ee5e11b7586b1e70f698dfe3aa4bf544bba1417150350d2c5c84162f81e4b3886962623d48fe6e63071f190e31ca2f1d82d2faf851aea1178e1c85542314edc4d7aa8cc169d32c0c2ce3e7b2ab0991c763f72746e6bf5f7b82bf6db8d355337eb0295874fcabb15e3cbd46a10a88617c5051e39221220b0423dd1498f3ef176c770220c4a056d0d8fc7c0641ab01be1c448d9a1ca3e8866e7d828595412ef2c050a737ae29c678a2c12207198093120645b732435d20fde755ba157d79fb0885cab13deb32dd2923d9db413bbc9e645145712582043d5ea67da1454c2d0b7a106c7d4cca1c00b940ea70bd9654c80fc3ca759da9d4c5d007aba10687d72239d6063e4f0e16a64cf5043751edda71ec366ba5ea33300064c069672bde3e5eba825f17d92881743ca038dc3d79f17ddc1924de32eeb6a05e0d133a73cf380bc0c800c8a35986b7670e3a77c49a1fad33eacdd59f35cb68679cea11fad9a58d6739072e729166ce71092b8ea61386ff64680caa54cc95fa8747a7517d5a65f774c5461d73dc3a5ffc1d9de64b7e7bcfd7326c43d50196d008e1c030c662ef9a63b6a400ac5f7c88299003e8294206ae102dc38c31f65fd773764f38b4b5d86e5640ed5b61c1d2364f8ac99948ea6b21071a7c4ee21bb8514cf911424d97e9382e784e4cf49a07a49f2dbd440035a86f8a6d3cc8f7f3d4772f0b16f49ab3d860cfd248b020f175bbad2a47b30e5fe468455403ef40af6b4cf981d0e86fa9ccf6ce8406dcc814b8d8d3f0f49593ba4485951ce47d1b284170c845bb50427000773f9adf9e095c2dc9fd2a90854644aeca1d93a34bba6c41484c27d7cff8712790311238ef8ce790d9e96e35c9f5a525aac212ea489fd2d673facd9d41be28083a87ddda6ed79dcaf46d9e56c06fbf14950507a83105d57aeb677a2a133a6e836984beece9154ee4c2dc35d5b7f3616c8161c7addb57831ecbf3ac5f6190fca73a2cd0472c013e920135b03385d9bf4e49eaa692c0fd92e3ed3a7367ee223cc9828d8e1cad138262993a39652783e8a9a75462f5e85998828e031cb042e951649b3feb04647711ca5d29e03d2e1e1b46ea7705998af37e126392f2e46d30885afcee001541ca737c8470c36d12242c38214814052c6ecc52077f519239e1b0b5be95f19a21373738fab1a2b678e69748103b0a106d37ee21fdc1a8cba71d2d76e89023c1f249d1028e4d406f39bdd2e303d69cc82312ccf805aa52c5519823f3d03d113ab3712147031433a9cacbaf95d453acac0d5d9e4e190170d8da8f97cae56d15d04b9a9c9ce1e9a1f1febd5a1bb74452947c1ed0b75c6fc647c081a8eec3ca68f6206cbe518fc52f2af58527fc1ba2297a9be897292948dd01b0d04fa6b31f20c4169d27e2dffad859a35cae0ca0b4e9d1f1aeba627b7afa7a3b8a73830d6e0863a247c610ac2e16f4e994efff84b90367465ac6e94dc36918e1d3f689ad3b5460fb4cd5a451fe5c8c2d47aba962176a5ef76d82d4c98d8215aaba1d6456999650f9c67670e1353ca5927f8a20301bd2ba82250bbe5805d897412ccf0807e283ba316ead99cf28196bda070185cc3ca4030291a52e0c102e28ded37ac9b197dd799037cb95dbf6aef8590bdcb988fd119e55dbb2920f48df83ec4acc26d57f234ab5697b583b33a2061f2f3e61e87910519aa7dbe4d919c161ea7fe4ea4cd98d322163bfbaa0ba95903d65b743b0e6a4b185f333325c4d5270e92d8d6273e97c885239b39b96b7afad716fe4d4bbbab761d9ec18135a4a24eb9411e007815f91d2e730837d3ea150b27d9ce6f4e4d50bd3cb35568214587d7895e63c2a2c55002f6874fcc81efdf6fee29112306453ce255e8e20b2eed5664aae6a012e26e024076289d01c1ef2f2a9a99363c4b8c99f7eba9248f4840df58f8ef3d415601b20473193ef58e83832f6a56c73b98f1d7c0ebdbf81112cb20c769c5251fe73dc51e5dd861e299ecf7d405cfb1bac01c59d09e86c89d3152d88e8da19b19b5f7a8732c58d04bd53a20f587a8382dc61ef8f9082938b7929d40f49133ca617020c3b12ab6bba6a221978fb2fbd52f8c0e991a044ee5bb564f37fe72861698770d2115822b73a46468ff71d3c88c361b6209589d5e077cc9d07808a2d093ada41d18b030c7688fa0d0c3c13a8ee3d975be3f41df1c7e7dfed04f92144167bbacf4dcb3c307986e6474383730dcdd247cc45cfac180fae2610fc0fb7cf2247d54f9527d4c28670f0bdb72f19a74c66b1e310c225b62cec5b97097d2e341d166122b13d31b670b2f5129b02df147ef358de638276a1f88d2d2c414124daabe620e4e37e675b8363e30f893e39ce37fbc415de3b5953506ad7a720d527fa6a5f7245982696d05edd7b1851d32b585449f1b732351957d14b5cc32c494085399b8abee5a9c0ff202d4aa1433fd95014c26253a60f4db44089c67a504247de9a771480ae6321d8108427bc03ebd8f3052ae28492606733e549398f2613d35808bf98d0d97b4ae35148b3003f0dafb95b6b1343523325bad85b6213ce7e26838dd87a70d9161571b172988a72952696fb6a2ca1640f512f73bbd333a9b46c908b20563148de11d5cb9b34ddc0997117b40703900706f1c0daa9cb4ad2a2b33b8753f80184f3a95649aa2b0ce7cbfabb2b120b363e84f8671d02c74d901398b540991fadde82fafb9ec09c2b233033b5fcdc5a74a308dcf57c4642b865c3ec93cf5622b439e5add3236c79da99da7ebb5e2f183bd516d129194351790dd1521f3c79aa1ce77966bd473a23950622febd08e31a983af45770804149fcadc9cc2bb213364ea59bdcc3c27a2885f7909f42ea3688da2da84b8e61e3a95544ecb5f2b4a07a6d1bd535f448a29ceb8e8e8e56ead511886069fdde6eda62970f8820dc5f726d1f7e64de8175428d8b8cc99dd3e676996402896b03dd76d78c0a69cd97f082db0eb2cc320869ba02632ac6f0f553fcd686c6c2b3f25d98284c6e4ac67a428e48d52b1a037859d4a6c786f65ba1692eafdc0592e5614e29873ff609000126e5d159016ac571fdf35a0ac1031156979865556d8aaafaa9b4d1982adb0f660dd22bef9c87cb63767cf409d78f6b38fa713933765fabcacf7f038357b80e9bd1cf51d96916cd51dc1e65ec7becf5c10285481d9f6e1b5f3a745674e62b0d9aa329d7fe16924fdae46340c33ad788042776291479feef3d2e9a11496b1f9b09a25c8c1100b488aa6bdd0c0b2860451a3ca667bc92253d073fa565c924df03c7f26594072221691e0ba97bb5d6d8e8459ec1c6032ebc192f1b3bccddcdd498285afb0737c734617b980522eb77e36cd2b2e3077d6f29f0175193492876fe2ef9a4fccdbff201a6053b1098675a0e0421e555c1ab1840d4ebd3bbe86535ad89d979e39f88f22b1496d3d6b409d52ca00b6b53874558529a492dd126f3cf2da3ac86fdc9ae237f606685de92a2319bf2c37d016232f69e58a60d31b7c6bc9abae28cf282ce371fb5e564fa7beb4f426329bddd05805e518dda54935c060014a2366a123326a09a69aa1fd69f89b519e10a76fd9e8af6f397cc11272bb697177b575a4a2a62fa17d212a9a874bb13e9daf928ba885127d1dda1fdbd5609dc8a8f7183e6c35f25f8d27441633a7bfc239c0cab0d0dcefb79a1f96f45a6197fa3049a58d5007baf0b8fdb9933c1c47e6d17826ed3d524e012c2c36f316a67d83dd611833d401342951e48b9fe8ed7a7055509deb6753e29efe014dfada7a7ff7aea53944275400fe6c24a2e6137752ed38160501347a2025d2ef20dbb62be73a2b4908e46523a018a6af3f3204441bac01307995d748070d771bdfebe2af0fcf8163541c5e68d4cfa16a28ab4094ebd083c14013cde98511c81040eec2a71f45f439a0f8f2606fb23c38bcdbeae2d19217b39dedf77a0b14b85036ef16eba54b48feedc92ed3b02c2570e3905310336025065d8938da0c295d2a181ad2bcc732275acb87a83f177f533a9b053a9d1f6c25b9206dc0462cd31580ce897d810970", @generic="6830b24614b54865cb018d0f0f7a72c0081e97a7a9e38be75ba7d2cd40966c9deeaf4d5e968bd2ea06b4c92d81d4812c7fae9e2487fac5dee2fc7b3a6bacd477f62bda76f930debce5b537e80d7b089156a55940c2905ed85fb4ef549c6fbec6b575b1ee673d8c6f730a6daa1d075777395b3c1640191bc974c48bb4fe9b9c804671d669226ecacde9725750ef129fb9b1360fece21d5ea6e73194eec46e1b5f7a0b5c0b375b364dab2f60f9e945aaefd96d47e69856ce15cf4a27d5abccdf237988d9b2011b21ae201a390564777fcf03ed5d3d96b68644ff0dbed9de0e4ed685b51b4c0887b379c0d986b0ee65c3379ce0", @generic="5cf984d1c59a9f69908b5b44a02a4fd26eb77d388118d3a8804353cc50df218091775bd7866bff86c5f01663af4d3824"]}, @nested={0x134, 0x91, [@generic="c1cb7c70aaaec0675191d578edc098b4a0feb2af3edb1189bb3d742b778448d31b911018c6d316474d3218572195e15d5f4af8c04af1157bfbd6261496ab0408c4b31a947380861987f0877e208a4c3b90666724a5bbb1613ffc094e3887e89953756723bbc5a763f24ffe944ce3e106370e5907", @generic="5e848127da731d93f42c81de267c1104d7169a25334d8f55fd0d5f8d4896011a1366d3d6dc4675fac18fe6291cfa0d90cf290986c8cc9b2e6cc12cde01df318593f98f5da04f61a36f3b2d1418c8a23c67f8cca52705bb2afc4f61616819d46fb3972db61d2d7952beab3e0822a4a7942327641ba66d0d81a0010c47f07508afe8bacb258d22794e3ebb77964fe228f72b6e8b38c5bbb0a1858c411fb70cb0e85e86beb68e995a80dfe17413337ec85993932bd9571edfb5fa"]}, @typed={0x8, 0x96, @fd=r0}, @generic="7904082d83a7a598e7493b6c93b2845a52675a3fed7e7a344f4609c509aa9f39ea5f17602c0287b72c9caaa8dec52fb3c20f4ca545dfa17adf4c00ca0726a2893b47f99fb7df20f8a9b320f1e5a1299245e293bf6a96f01c718233a27caa87eb91134d79a9110ac6a6c7656f735c8ce6d12bb254f4e9e480e720191b26817ed23e58a44a3da7c6631a82bdfd79ffc96dff7a72894a6674d19c60e2115017df2971e3e8b7307ee91f968842f99640a7012b70ac59", @typed={0xc, 0x0, @u64=0x8d0}, @typed={0x8, 0x2f, @uid=r3}]}, 0x145c}, 0x1, 0x0, 0x0, 0x4004080}, 0x4840) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r4}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e687") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:20 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000080)=r1) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000000c0)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x9}, 0xc) [ 303.386560] Unknown ioctl 35298 [ 303.418398] Unknown ioctl 35298 19:24:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e9, 0x0) 19:24:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000f8, 0x0) 19:24:20 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:20 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x100, 0x0) 19:24:20 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) accept$inet(r0, &(0x7f0000000080)={0x2, 0x0, @rand_addr}, &(0x7f00000000c0)=0x10) r2 = dup2(r0, r0) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000000)=""/42) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) 19:24:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\a', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x10000009, 0xffffffffffffffff, 0x40000000000000, r1}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(r3, 0x5606, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @aes128, 0x0, "de9f020b33e8db75"}) creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000000c0)) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000180)=0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4801, 0x0) 19:24:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000018, 0x0) 19:24:20 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:20 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffff9c, 0xc008ae05, &(0x7f00000001c0)=""/133) [ 304.198362] ion_buffer_destroy: buffer still mapped in the kernel 19:24:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4-', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:21 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x240, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x12}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000a9, 0x0) 19:24:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:21 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4t', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000df, 0x0) 19:24:21 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4002, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000040)=0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/uts\x00') 19:24:21 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = dup2(r0, r0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ff0000/0x10000)=nil, 0x10000}) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:21 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000010f, 0x0) 19:24:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000000c, 0x0) 19:24:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e687") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:21 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:22 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x41, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x10) r2 = fcntl$getown(r1, 0x9) write$P9_RGETLOCK(r1, &(0x7f0000000100)={0x27, 0x37, 0x1, {0x2, 0xfffffffffffffffd, 0x9, r2, 0x9, "76626f786e6574309a"}}, 0x27) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) getpgrp(r3) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x393) 19:24:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000009f, 0x0) 19:24:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e8, 0x0) 19:24:22 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="657874340f", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000076, 0x0) 19:24:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000042, 0x0) 19:24:22 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743403", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:22 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000000)={0x0, 0x989680}, &(0x7f0000000180)={0xfffffffffffffffe}, 0x8) 19:24:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x24, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12c4c00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x20000000, 0x2) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x8000000002000001, 0x32, 0xffffffffffffffff, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x80045510, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 19:24:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000069, 0x0) 19:24:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:22 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:22 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000140), &(0x7f0000000180), 0x8) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000380)={r0, r1, 0x0, 0x6, &(0x7f0000000300)="4360a74c341303fdb21d598a240b69c86430bfacdbd2ff6de53cceec455a445979924058641f1e186d2d763cd67c2941fc55d6b510079b5994d995f909f551e931c7f6fbb0d30de04b6012df2eac23b6c0582f", 0x3, 0x81, 0x0, 0x2, 0xb, 0x100000000, 0x4, "6d2edbdda0b61bca3459f6af89b88f5918866a1287da7d5b57eb57f1ac9afc82f9caeec3dc097c230bbdd5137fc76e89b23d1521dfce80d19e5573ae4dff1c3ed8cd9c09b7a945f66af76a7e05"}) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000010}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x84, r2, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x10000}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x21}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x19f13642}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffeffff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfffffffffffffffe}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x68}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xa667}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffffffffffcd}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10001}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x8084) 19:24:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000019, 0x0) 19:24:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0xfffffffffffffd2b) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="002474ab5475f257544db875dec4fb39000315de349720da1ef698864709a36cca9a0c7ca9ee596c99f39d283380ee3ddc525634af54897437f331b69b3b00000000000064404ad2468a30cbcd7890c8e64d11e2663b7198532c06c268e6654b58b997a3921a0f9587f11832a502e83f4f6f8d3eec29cf7bde7e200d635566766700d622ce71102bf6d6fe177d38e344dd1ca0290129a70336ad436f21a3a2a95e74f1ca116b430a4a961fb2f9dbbf1c2de7723095e24ef970e738960f"], 0x39, 0x0) close(r1) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000080)={0x1d}) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000100)={0x10000, 0x0, [0x17, 0xd9, 0xffffffffffff1a5f, 0x5, 0x9, 0xffffffffffffffc0, 0x0, 0x9]}) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040), 0x10) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000480)='trusted.overlay.upper\x00'], &(0x7f0000000140)) 19:24:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000125, 0x0) 19:24:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:23 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000071, 0x0) 19:24:23 executing program 4: pipe2$9p(&(0x7f0000000700), 0x4000) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2, 0x0) r2 = gettid() write$P9_RUNLINKAT(r1, &(0x7f0000000240)={0x7, 0x4d, 0x2}, 0x7) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000580)) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100408}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0x194, 0x13, 0x10, 0x70bd29, 0x25dfdbfc, {0x14}, [@nested={0xd4, 0x26, [@typed={0xc8, 0x10, @binary="648a3e6a5f4e8640f71e9375e93907868b7082a586cc7ca57b520dba98b1071340c6255e8b66531855bc0984f7e9e4184ae828c3ec6ac67a9e5d10315d2f9d807a6a2a8ff67cf6d1cd55df47d82140e93a05145e0d6fd6cf1e64555cac9d751f24210dd768320988fc21ccb950c967ec2afe4a99cbd84e116c119af5ccad2c4618597bc72ab43fffcf297cb5169e82fb876373d776161b53968df5ab6453fdc69d0859a65309c9aea71cbd8858c1b2f2b2a27b06a19cb6c23b0f677a637d864beab64b"}, @typed={0x8, 0x64, @pid=r2}]}, @typed={0x14, 0xe, @ipv6=@dev={0xfe, 0x80, [], 0x20}}, @generic="8e12cb787e3ee7cc3bc6703839c637c87e967309554ec45f6e629ab7365239a20323e866056f4fd91f5cac1ceeaf4ad327b2b700a3fa6575561f435477b6dde9df450ee6d3b72cd8b01f34897d9da188cc63a9ef0acd111f517dbeae43f21d14d59b8d719a0de33e3d7afd935998d7b3ac3c4e01056b0d85f4689a7b25f667923a34c53c9741893146f8f618042715ede6b02b0ee2"]}, 0x194}, 0x1, 0x0, 0x0, 0x1}, 0x80) pread64(r0, &(0x7f00000002c0)=""/205, 0xcd, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r3}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434fd", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000004f, 0x0) 19:24:23 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) fallocate(r0, 0x0, 0x0, 0x8200003) fallocate(r0, 0x8, 0x0, 0x10000) readahead(r1, 0x1, 0x1) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000100)={0x17, 0x94, &(0x7f0000000040)="fc7ef2846afa156329af9e6cadcd9c4585fb9f9f40893e3791c5600387dfb86366b4da6c1701161a7200a0bca4864462fff5b76279bc8211bb1a86cf3b4edf911ca444978966003e1f593e111282a22f2acb63c70832ee7a761570e3edf381d2993e998e93b0783e4fa4d7d33d38f98579e5b1a980b79ffc05b1b9170894aad7ee5fdfb2cd607df77d027929a7a5b767c7410193"}) 19:24:23 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000059, 0x0) 19:24:23 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f0000000080)={@rand_addr, @multicast2, @local}, &(0x7f00000000c0)=0xc) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) clock_gettime(0x0, &(0x7f0000003480)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003380)=[{{&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000700)=[{&(0x7f00000002c0)=""/235, 0xeb}, {&(0x7f00000003c0)=""/235, 0xeb}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/127, 0x7f}, {&(0x7f0000000580)=""/252, 0xfc}, {&(0x7f0000000680)=""/84, 0x54}], 0x6, &(0x7f0000000780)=""/47, 0x2f, 0x9}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000007c0)=""/148, 0x94}, {&(0x7f0000000880)=""/70, 0x46}, {&(0x7f0000000900)=""/243, 0xf3}, {&(0x7f0000000a00)=""/202, 0xca}, {&(0x7f0000000b00)=""/14, 0xe}], 0x5, &(0x7f0000000bc0)=""/4096, 0x1000, 0x200}, 0x58ba}, {{&(0x7f0000001bc0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002d00)=[{&(0x7f0000001c40)=""/66, 0x42}, {&(0x7f0000001cc0)=""/4096, 0x1000}, {&(0x7f0000002cc0)=""/41, 0x29}], 0x3, &(0x7f0000002d40)=""/209, 0xd1, 0x200}, 0x80000001}, {{&(0x7f0000002e40)=@in6, 0x80, &(0x7f0000003240)=[{&(0x7f0000002ec0)=""/162, 0xa2}, {&(0x7f0000002f80)=""/194, 0xc2}, {&(0x7f0000003080)=""/209, 0xd1}, {&(0x7f0000003180)=""/85, 0x55}, {&(0x7f0000003200)=""/1, 0x1}], 0x5, &(0x7f00000032c0)=""/181, 0xb5, 0x2}, 0x5}], 0x4, 0x40, &(0x7f00000034c0)={r3, r4+10000000}) sendto(r0, &(0x7f00000001c0)="102407e4c0bc2d812040ebdea171784de245f4e071d7dd4cf241c59fb34a20bb806ee68f398c70b7001b558f61f888b8e87a58e43593fe2f", 0x38, 0x40, &(0x7f0000003500)=@hci={0x1f, r5, 0x3}, 0x80) 19:24:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 306.828053] Unknown ioctl 1074808211 19:24:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c2, 0x0) 19:24:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000003e, 0x0) 19:24:23 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:23 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0xffff, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180), 0x8) 19:24:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4l', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x0, 0x2, [0x0, 0x0]}, &(0x7f00000002c0)=0xc) syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x1ff, 0x80) r1 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x400001) sendto$unix(r1, &(0x7f0000000440), 0x0, 0x4000, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) socket$l2tp(0x18, 0x1, 0x1) mknod(&(0x7f0000000000)='./file0\x00', 0x20, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000000300)=0x2) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) syz_open_procfs(0x0, &(0x7f0000000040)='net/kcm\x00\b\x00') setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcbf9671a5cf54ab025", 0x24) 19:24:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000008, 0x0) 19:24:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4z', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:24 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1ff, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x12001, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x4400}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f00000000c0)="ad55cdad5fa673afdf249b468d7a5734b35c49c0575ef723c7033dd9e7309480f08dd0c07db4161698385efdf2d0", &(0x7f0000000100)=""/41}, 0x18) write$cgroup_int(r0, &(0x7f0000000080)=0x2000000000000000, 0x297ef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) 19:24:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000d0, 0x0) 19:24:24 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 307.502473] EXT4-fs: 71 callbacks suppressed [ 307.502493] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 307.517344] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000010b, 0x0) 19:24:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000012, 0x0) [ 307.567415] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 307.641575] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 307.652268] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000038, 0x0) [ 307.718466] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 307.863413] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 307.963033] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:24 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e5, 0x0) 19:24:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000d7, 0x0) 19:24:24 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)=0x8000) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0xffffffffffffffd3, 0x5, 0xb00000000000000}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000180), 0xfffffffffffffe41) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000002c0)) dup2(r0, r1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f00000001c0)=0xc) ptrace$getregs(0xc, r2, 0x100000000, &(0x7f0000000200)=""/181) 19:24:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:24 executing program 3: r0 = fanotify_init(0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000280)) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000380), 0x8) r2 = socket(0x8, 0xe, 0xdf) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x13, "f90205c088a979842414a566df0bc49793ae69"}, &(0x7f0000000300)=0x1b) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000340)={r3, 0xe8}, &(0x7f00000003c0)=0x8) setsockopt$inet_dccp_buf(r2, 0x21, 0xd, &(0x7f00000000c0)="cabb1a5f8ee415083de8f11b8e8ee8453841977a60ab78ba1f2c17d5296f5659a74c96de6819e00a5bd0bf59cabcd3923c4ea21bb50d87fe5f72e3817874d1a14e7bd126c4806a0ede401b77a61d507a51551136dae999667bda6ce0aa73efd688eb203d9486255de091056bad8c50e971d5083b9f419f57b6c4454a9d6669ec780d19cae4eda0801a32cf7a384917c6be50125a156d88b1c0b3923078e9d3b05e0e000b159b6db3075cccb441fc2c2052add74996ee116e81f92ffce622779a02a8a533278f24527d1ed6858539b0a7b8550231effe1bdded49c3fa45e35bd89a55851cc9f69e30e665d429fb", 0xed) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000200)=0x68) [ 308.178175] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 308.187423] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000003c, 0x0) 19:24:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000b4, 0x0) 19:24:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) listen(r1, 0x1000) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x4000, @loopback}, 0x1c) 19:24:24 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4L', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000063, 0x0) 19:24:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000f4, 0x0) 19:24:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:25 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4z', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000016, 0x0) 19:24:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x80, 0x80) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000380)) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000440)={0x2, 0x0, &(0x7f0000000100)=""/142, &(0x7f0000000080)=""/9, &(0x7f0000000e80)=""/4096}) r5 = syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0xc2ce, 0x42003) r6 = inotify_add_watch(r5, &(0x7f0000000240)='./file0\x00', 0x0) inotify_rm_watch(0xffffffffffffffff, r6) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5387, &(0x7f0000000280)) read$FUSE(r2, &(0x7f0000002e80), 0xa4c) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x800000000000001e, 0x811, r4, 0x0) r7 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x6, 0x103082) setsockopt$inet6_tcp_buf(r2, 0x6, 0xb, &(0x7f0000000540)="fd", 0x1) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000400)) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') mkdir(&(0x7f00000002c0)='./file0\x00', 0x100) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000a80)={'veth0\x00'}) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) openat$cgroup_ro(r7, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) 19:24:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)=[@assoc={0x18, 0x117, 0x4, 0xbd}], 0x18}], 0x1, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000880)=""/44, 0x2c}, {&(0x7f0000000d80)=""/4096, 0x1000}], 0x2) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000700)=[{&(0x7f0000000180)="7d530c0b6968a90363d64737881e00e520280fed2dde4f1157780ab1536083845af80c0998bd68589b957d5b7e18a4f6e46204d50ef9b5ae12eff74457917b71b368c175b4e582b26ec922cecd54fea0b364b4adcc00f968cef192b44a83b55dc67a93c54a78bf198b52bc3e2fc4974c334ae780cd95b7074ecc68", 0x7b, 0x1}, {&(0x7f0000000200)="6ceec4b558894fa925b47901cf35d3f96c17f1200b4da219a6041ac570b9c2e62e53842572da719514284d07179a4154caf9fdf21578595efdadd4d17cde350494fcee9963afe6c9e1906a0fdee6584bdbc4fb59138dfb9a08", 0x59, 0x5c8}, {&(0x7f0000000280)="fb96edbca266b1e9624e755887f6c746d2cde02e631f7c579d0c0cc5bf070f9e0c2dd7b8cf9bb3441ee8ae22caeaea738249b35e3396a00244f292226fcb2ba33a654e70c95c8b2ac73224d3d6c932cd18277736dbb1f5", 0x57, 0x3}, {&(0x7f0000000300)="f8931b29ec5bd8eecb8052f99e88ff093a0bdf9200cf8d7b59a5e811886df04c0ea0511e9236dc52b0eca2d5d3935ea937183f33bd21367678db5e0a835d42963b1d68c8015f9838c13ed92e5d5a78045f230b90ab76d9f6762def8881d0b6aee0317acf9c48a3ea3c3d0bbb6a8c627b1349c4588f6c9aae87b8bf529757fce9fb0ef266a221f7f2b82c55788b89b0c6e43794954b9d0b8b62abdecef6574b26c8448c37f903142423389a33126cadab", 0xb0, 0x100}, {&(0x7f00000003c0)="feebd88a43e749a328f31461210faf6463d996da1d3eb4ffe14d960fa9f6f88f31e1b1278a7293ed076dc8049a75abc6dc85418ba5df78ee2a3b45402378a3b255fe003b8db7eba509a3a596a4c01ac828e78fdd79d5efcd91359e0808096a4446fea506aaf267b23d6eb6da3857ab7c3fc51121769bce9c20f7ca29438a3dd535469ae2dd2b1c128fb3d4b118a04f1b6fbfc10e596b3b4be93057c046b72ab332f241f0d20e5d871291d5b279432df516e1533d2f9db7a748ff6b615092269f9a04854f2fd6da3b2dd51714ce9b5e46d3ec093a172491a0025dbf", 0xdb, 0x90f5}, {&(0x7f00000004c0)="661e6d873dbb00170c5b977ed73b0d486b3216e7a5ddfe1dd995ddfb806266f0d31d3f7d441f903bfcb7753f3fa38340da5e1b8151120ef6e02c4299dd2bd70bd818aec817779f1306d776892d", 0x4d, 0xe3}, {&(0x7f0000000600)="d00d8009a28acda876fddb0edbe6deacf10cdaf128ae86f702d389b9853707c512fb5d27d4eea696ec17e21da54a043abc4d2753f268c88ff01e74b0669ca24c7a3a9b9e0e6135dc4d19d634ea90c026b46e526ffa081c6414ab434489c58f86a7193bb93bb7fa35490963ce67131cb3983582ab052c91caf0dc496967a592a440f59cd2dd2869c12d7bab57f96792a23ea34313416fd818aed90df37a6092394b441439a4de6f667cae60af09cb5e1e679bbba0f4b7d9095d7ead892afe32b395f68d3a4a2000a8f1bb289dace583ee", 0xd0, 0x69}], 0x20, &(0x7f0000000100)={[{@nobarrier='nobarrier'}, {@rtdev={'rtdev', 0x3d, './file0'}}, {@sysvgroups='sysvgroups'}]}) 19:24:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c4, 0x0) 19:24:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e9, 0x0) 19:24:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000035, 0x0) 19:24:25 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4H', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000097, 0x0) 19:24:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ef, 0x0) 19:24:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000055, 0x0) 19:24:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:26 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ed", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4l', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743410", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:26 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x0, 0x9}, 0x8) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000300)={0xffffffffffffffff, r0}) 19:24:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000008f, 0x0) 19:24:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000071, 0x0) 19:24:26 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80081, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x1) pwritev(r0, &(0x7f0000000b00)=[{&(0x7f0000000a40)="5415b0a7", 0x4}], 0x1, 0x0) 19:24:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x5) r1 = dup(r0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240)=0x4, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netlink\x00') ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f00000002c0)={'nr0\x00', 0xbd1}) sendfile(r2, r2, &(0x7f0000000340), 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000280)) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000380)=@add_del={0x2, &(0x7f0000000300)='bridge_slave_1\x00', 0x8}) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r3, 0x80080) sendfile(r1, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:24:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000084, 0x0) 19:24:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000011d, 0x0) 19:24:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:26 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\b', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/autofs\x00', 0x140, 0x0) fcntl$getflags(r0, 0x40a) sendto$llc(r2, &(0x7f0000000780)="4888df044a17dce2f409d012207717219c2031cf2d200082491663d7a50c0b5d2157fb484e9449b08e47d484ab4384bbe06a75afd9dad79a9bdc82f2a6cf09561c475f3ade60e0777b6dc57b230321af9cd81b6a0f29dc28981c7be5ce899ecf2b662ba6b6aa19b94c87da918e118d7a91688594ed5d6ef045765938dde3db0fee15c922d84166731acf1a8ec02eb15e7b6ac78494", 0x95, 0x0, &(0x7f0000000840)={0x1a, 0x5, 0x1000, 0xfffffffffffffbff, 0xffffffff, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) r3 = dup3(r0, r1, 0x7fffc) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000880)={0x0, 0x1}, &(0x7f00000008c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000900)={0x1, 0xa455, 0xc, 0xffffffff, 0xffffffffffff8001, 0x0, 0x1, 0x10001, r4}, &(0x7f0000000940)=0x20) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x35b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r5, 0x1) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r5, 0x0) pwritev(r6, &(0x7f0000000680)=[{&(0x7f0000000000)="c46b3b59ae30b4dc5934a4905302840b7b1d2ea03dc226", 0x17}, {&(0x7f00000000c0)="50eddbbcc507007030d1e39e5721a86efa43aa1b00504de82f5c3346c1e264a0ca94730b", 0x24}, {&(0x7f0000000140)="04051b25bc0379c8aaab323bbc578e87d71d7fcafcec71dc98ef4adf5cfb18cc4ec390d62c7b797859dc52b544cbeb9da74f12aad99b6084f965edc9d2b7fa49df618ba4d5914eed9235a8ac18bb05bf1bffb1abf6c2eca41b9e5d2f45a863709d1747d481a787f41b25e995e29f1d31f2faabdb4c188496a08102eebb310e3e461050876c6c1b3789309f9eb442bc5d97ea0015cc8f860d308d7f8dcc444465f7d98ffa29be890eb4243803292a40a1650106de069d485c171ba4bd09b9ab9233feaba71fb6efa25add96a0ceadb8c68d82b3f8c2378c53e261317cd9ce2a867e25ff704a4230a202f1f964d897d3e2e74eddc2ef", 0xf5}, {&(0x7f0000000240)="56f4f1467ea4b9d584eff56f2fa3e8b7524761818bee567c3f083fd772e4566c31723a235a3108f5237a6afa04988a803dcdcb97f83230035c0eea44447feb738176406760880f7562", 0x49}, {&(0x7f00000002c0)="c414549b3cf39a36d23686615cfc1423da573c541a2300988861246d64aea3f1a09395c9cd845f8babf1ff5dd830ba8578c5bac963f33e986ff09298918433f7206152297510e77e9c1be01709a52fb722270d10ef633afc1d61cce65bc99e950c5ac9d02e30367149f5e2f14b7bc810e283d62aa81a31fce62d47223873b2c01dc951bf24eeb1432a45a2fc145771b6a8cec4715d7f44723ebebe650ba237362338e9429862e6098e28de5e387a31e4657bfbd4789f2b5086", 0xb9}, {&(0x7f0000000380)="c935197d53d751254a90bed093f555656f1d19ca328e64e8221b0b3622a2b3c1b899b7708c4e3d8b10c1c63da766ad2624c3b72c210510aed02aa8875c0033a0342df2899c65275a6ec5205c67b1d5f7a4bf691c7aa678f565d167a670a92b8a677821d1275320e6ff4c5fbdf017e8fc8ae478a0dd126f2eb91764bb86c3bd4d206806e601f13d14a6b5a982635b8d39", 0x90}, {&(0x7f0000000440)="0d9280e54b8e62daba369665c0799449044971159f45980f52b72320e8e50d759558f8ffe46e8b607b19ad667f0992", 0x2f}, {&(0x7f0000000480)="6a77f15091b0139c035e3a1de44ffed9a25ff24026dc6d743883e90d65dfdd22c4064da2fc1df8b5fb1b55500bb704c5aa4619d018f0b34ed38ed638c8755aa3ef89b0f8b1a3547ac6dbe592d014201b9b336940ee4dc7893e8889641bc539802131bfc6b8bbdae4db6940446c9179a818a120ed423d9f0bd2ed2b4c2433016e51a712a0c98f811f30e31aee11f0e201e5af7e4e600c9e0020875ae79a2f98bf625dcb3dc752f295c6266b93a75093b67dbf51593a6fbaee", 0xb8}, {&(0x7f0000000540)="76f4df7d386792adfc84af5d", 0xc}, {&(0x7f0000000580)="1a5c0bad4a66ed65bf8ae71c0a0a73d0f070be5df322e71c213f2999acf1bdf7c2bd8eb8245b86c62fc3463198b3dc90859689fe1628eec2cd69ce170b6d180a3eafc318c70e7334dbe58e291f042e9cf0be50db705f2bcbd50328a5798855508d8e3c1c02052fd4f5b0dcf93b5a81e2771feea0c35e8e7a744a068939a830c4d95100d957dd791932cb29ae8982c2e91359449131ea6d5b5757f232770d2c3b9de0d5d16e0744928e3e0a2afa99a24174e27ca2b5b2915a3983d34cccc8ea3025a67e09987c6a", 0xc7}], 0xa, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x7fff) 19:24:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x0, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000007a, 0x0) 19:24:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xfffffffffffffe14) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x9c3, 0x0, 0x6}, 0x14) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, &(0x7f0000000100)="22694a04fcc9c7568a0315134c4823b2364ffa853652286cfd679dd8dfa4e1881ac06af04a494da168419d61b32c76d746d9b5f91a664a8ba8c8659847eccbbf", &(0x7f00000014c0)=""/204}, 0x18) r3 = socket$inet6_sctp(0xa, 0x40000000004, 0x84) sendto$inet6(r3, &(0x7f0000000080)='X', 0x1, 0xe4ffffff00000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x3, @loopback}, 0x1c) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000006c0)) r4 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000002c0), 0x4) r5 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x7ff}, &(0x7f0000000680)=0x8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000800)) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000700)={r6, @in={{0x2, 0x4e24, @multicast2}}}, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000001380)={0x0, @in={{0x2, 0x4e22, @multicast2}}, [0x0, 0xffff, 0x4, 0x3ff, 0x0, 0x1, 0xb14a, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0xff]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x401, 0x30}, &(0x7f0000001480)=0xc) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$KVM_XEN_HVM_CONFIG(r5, 0x4038ae7a, &(0x7f0000000640)={0x5, 0x965, &(0x7f00000004c0)="fd10633ec53ad38e0ded66d17767c5096bba890c13ce9de64522b0e374595a984845848e5b67d1dc91fbba47d50765b122c29d1d59fe3ba7850bd401bc3cdcf51aa155d807d2dfc4b9bd33c7df60b463e9f484d3684e3622087ad9c96cf628641faddf1316cb2d8ca8f0adb0e066298a26f1a29cdc91d6dd808cd4ff4c3ab4a4d338bc096d5fb4229232a2da1cd72e76c2a1a9b15d3ade5220c799128dd3a2eb21c0cddf1e2faa46dd4a5a40a96950c5c71b6e598d7fbb2c0a1f10bf7017d347e4f83a0b703b7258b85a6fdf6fb57bb4e11430ab84b711230431e89843dbfda89e54e1405b43b5816ff624c0a906e9dbddb50acfdb5f", &(0x7f00000005c0)="05e5e9ffb80ee85b0d902b6c391cacea5ef3366d1dd12df8283fe679a7eaedd13c6537b9fa2e", 0xf6, 0x26}) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"2e98952e805a1acdbf60867cea48bd81"}, 0x85f, 0xff, 0xc30b}, @in={0x2, 0x4e23, @multicast1}}}, 0x118) 19:24:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x200, &(0x7f0000fbf000), &(0x7f0000000000), &(0x7f0000000100), &(0x7f00000000c0)) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000380), &(0x7f00000001c0)) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) kcmp(r2, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$int_in(r3, 0x5452, &(0x7f0000008ff8)=0x3f) r5 = getpid() execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100), &(0x7f00000002c0)) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)=0x0) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000500)=[0x0, 0x0, 0x0]) r10 = getuid() stat(&(0x7f0000000540)='./bus\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000600)={{{@in=@multicast2, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@remote}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000c40)={0x0, 0x0}, &(0x7f0000000c80)=0xc) getgroups(0x4, &(0x7f0000000cc0)=[0xffffffffffffffff, 0x0, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000004380)='./bus\x00', &(0x7f00000043c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r19 = geteuid() getresgid(&(0x7f0000004640), &(0x7f0000004680), &(0x7f00000046c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004a80)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004b80)=0xe8) fstat(r1, &(0x7f0000004bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000004c40)='./bus\x00', &(0x7f0000004c80)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000004d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004d80)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004e80)=0xe8) stat(&(0x7f0000004ec0)='./bus\x00', &(0x7f0000004f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r4, &(0x7f0000005380)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f00000001c0)="433465b372cbcc91801dc4e5d5e9efac24d60cf41e7292ea6f629544aed7db7082dda0325e8c1c0e868324c293a1a5b7f6a102de9cd912a57d91949d30af1c216072ecf6211c03bf01aca93bae0ab8e30c7b73243df987812e03774d75fc6ab3f5ccad7604198856264d76f1cbb450de4aa4aeef10f24e88f58db50daa512cd1c1a591ae62cfe382e4ef795370fad04b65e74fece75e3009563e50fffc4258818a454f6a7870e2f40c9bbda870775f6c57486f5e03a40d363a587cfe0e5e42b978a0abff7b3a8b73760047b569d62bbe7b4cec58d9da3615974da7d0b65530", 0xdf}, {&(0x7f00000000c0)="cf89c8cd01f41e8c1afe067608bc3669895e9c69699a8012dcee650f9712fa1fff222fa5bddb642cc4071bb795232e2d", 0x30}], 0x2, &(0x7f00000007c0)=[@cred={0x20, 0x1, 0x2, r2, r6, r7}, @cred={0x20, 0x1, 0x2, r5, r8, r9}, @cred={0x20, 0x1, 0x2, r2, r10, r11}, @rights={0x28, 0x1, 0x1, [r4, r1, r0, r4, r4]}, @rights={0x18, 0x1, 0x1, [r4, r4]}, @cred={0x20, 0x1, 0x2, r5, r12, r13}, @rights={0x30, 0x1, 0x1, [r1, r4, r3, r1, r4, r0, r1]}], 0xf0, 0x1}, {&(0x7f00000008c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000940)="a0e67129f150a451ed46ba4a22bea708996c513faa468db4ec5a3bd8aeb8db9b690017b2a26e841aa7c3b11327dd7bb5489225462869e3cac4f170c72a409a3197fbd4bbeb29a12908c9715c7dcbf8eece2cbca47165f357e8e919ed8a1565021fcdd74408f6c9b8ea2a5181635ba7d3bcd38eab6719b23f5e427435e8bf2063374a8cc479f5f428abc919e3bfa8b6ece7cfb1ca4cf7035b99e9e89fb30cd78102ac5a7f95a33ecc0748dcb37cc5ec9c21cc874c6fab4d9fa58ca0d49246a70bc4b26f86b91d47355f4d431fc7b82544ffe64687b75e2582ee5fbd019a794e390beb6e376f5a66a6ffd38c62622c47a5c3198e", 0xf3}, {&(0x7f0000000a40)="fb6693d4fd9bbf6879ab7c1c0cf6fcf6de85557a442011cf059ca202b655abd63f1ea55e408a9687a6f6f480cb82490084deb4e89c945a39fe2a05e171f9a6af0942c2173a11807e26ea134b36337d62c15fc9d250b380a2e046311336602e6229e8de72a09c1af917e547a706f2ba09b29b279f3e49b87145358be79bd8392782e3b7f0a1593e9ac43131593cf745e82b8e2dc3520c47e2de1f8566ef4a9fdd22b830c680af07eed5666f6879992efc", 0xb0}, {&(0x7f0000000b00)="5626cd7f0c967f5e618ca6c7", 0xc}, {&(0x7f0000000b40)="29cfc62ab877a337200985f354fc11bbb378d46cff4215f293296c583bd50791b5672da8a14dec8129fda1bd6d4e1139819d66a5020f86dd21f896a313a61d00abd7dfcf715d1cb4a1f379b2f16093f465c3af4ea0c94e8e41f030acac9db8fa1859209cd369d8cbc625fa13cd8488f1d2ee15ad5e5c6e536ca56ef7e578b2e26eac96d20f5385139fa470fca79652128b0df859e67e0b3205bbbe36834caa9252bd125d138b96812da23c28b1d3b3172f99bdc25bc101b05198e7b13848", 0xbe}], 0x4, &(0x7f0000000d00)=[@rights={0x30, 0x1, 0x1, [r4, r3, r1, r1, r0, r4, r1]}, @cred={0x20, 0x1, 0x2, r5, r14, r15}, @rights={0x28, 0x1, 0x1, [r1, r3, r3, r1, r4]}, @rights={0x18, 0x1, 0x1, [r1]}, @rights={0x38, 0x1, 0x1, [r3, r0, r0, r1, r0, r1, r1, r3, r4]}], 0xc8, 0x800}, {&(0x7f0000000e00)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000020c0)=[{&(0x7f0000000e80)="da9188897b782c4652722448878a5c955efa3d812940e95d3f0038810697419448d51341b076e9c9f4d217475c78e755f8add7b10cacb271f20776508ff0b027ac957a3fdbddde524b1eb2b5fa0ef8ff56f8492c2dcc56aca2fce6e689a8b8c25f29884e12b2bb2d62d1000d96dd232d18273884e4f8e8fef1f159766f24534a01b8f5301c1a30b1bd26728791f7d22700be1290a79c40ed51000340e27984475ea46358f98a1dc822887cc3d0520b1f2d28", 0xb2}, {&(0x7f0000000f40)="ba503d9d29e59d223e3df792e5234b991ec8f3b1bc7ad73b6ffc22281a9a9de80fdebb20734d6789d48fc44a927cb947a5f9d638966a335033f59f0a402bb42d698cc370e72e79db7e52da26bea93dca73", 0x51}, {&(0x7f0000000fc0)="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", 0x1000}, {&(0x7f0000001fc0)="f788b272cba11480b2ade0408409f716baf3", 0x12}, {&(0x7f0000002000)="86a7804ec8dbb3a693f8c7f58e3ba729a567d9b15171ed1f246ba7cb2729f64b5f0be3941d3b031f8fc2e4a7e9c886729cf21c3e03abb3c36cb31c8ec1feb3b0fa2be8e78f6af15178562ab84c297bfc39ef81d6b5ebbd2883daf4e09e7e9116151918c1eb6bd5cef035f6de4e2f8dfd68b6bc2684fd3474aff81066d9db9a820412841f76a8b23d3c0ce215954720a86d7801621a0fa1768e5417ce4acbf27d28", 0xa1}], 0x5, &(0x7f0000002140), 0x0, 0x2400c004}, {&(0x7f0000002180)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000004340)=[{&(0x7f0000002200)="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", 0x1000}, {&(0x7f0000003200)="9b08a534f000179e06d71c1839867ddec7c9e75b67b292566c84234aebef3f8445ce404a435167e6ee017c7c4fa84e0e0ed075d152cdba997f33f52786907595a9146c978d513af5b8f9b2db", 0x4c}, {&(0x7f0000003280)="2471db4e7065182124fa970d7ac953cbd66832463d9b02168811e77de327c7293e975a0e8e9493c08c0860f882e7d781bf2530e9a1cada1ac1bcf0edda30553597e57dc9f96b529f509404b246f49a724135c3805b079055b991a8750f369cf697d91ef8ea5f54170f9d7a3d80828ee665ea4a3830b8cc618d6185ba2b19efd406b9eb82cbf4d84a6b7fb373aa5ade4fbd1696160377c4b16d9c8a1ce4b1a611d98e74712f11c3e88702941b7dcb64224b87a3afb130bfd440dc90e6dd0a84f650c486e05f929be85c3f1f5302151ec103dc6419e549b03ad399cc960e7a88194597f09d829058283f0325e35e494beddc5bc143a87a225d783c6940a46859725898324e38fa6f4ed23780e5d7bec7d123d48a1b5c080d1e42071db0b29f2dbb787e0194bf87ebf9f81f25ec10150f6092d26754189f34b55305a5e79f7fac5a6d745f20964516bb860d0db0c0f31329c9924d5be02bf88f3a91a2690da7ee95b93f5be9bce18188b602000ec39ab29b38bb707702c73c49755e849a66c3613d727e8fe3041517c1e9e180e645f284cdd4c0e0d962db080a1242816527f576497ad97579b2b0c2375f8b1eff351973582b18ef7216eafa12d71c22e376616f252e32b784900352223abc75b5353fe34daa4fa8c68563edafafb8f9fc09b9dda57c7536bd74f6af7da20ca102fcac3a97d0ce5290ae99cf8e02d36fa040683113fe7d5237e5e8a67e2dc929dc499faaa60d613d663e39110e54a953991f5e3ca598edbbe6820e9b638bc62a679ba1dfb10046bf4bd710efd2e8f99ca13bb8641e6f634739a6e55acd3487facd6e2ff5410381e1f6aee77f0b7380c0e8c7b2ad389ba5e0bec0f94d1d8ad19f1d336073c5fdec859884bff709999d7fe4358ac4f13292c9fe0c9688c951d55607823d442063a36730aede30d87ed9cf5a179a281bb2518ad945b57b589e17f5c759c168b87f3d59d08143057cc807012d36d2100a324911d9d16b020ab05259a3660448d50f796be73d5c65e084c076a0ce2514e90695d273bb5dae592e622ba356e7099abc138b393439a71c1a2d2986b4a3be1326453f81a17282579196eeec6ca58a7c9ba22c0468a5bce65abdaf06e6ce95fb6b93419df9da216d4e74fd56ae3e1f3f82fc06a03033496efc585c39e224bb2448f1e441dc2f382ed50eddfaeb87a6407930a6f0b3c942d20a9ec79f36c8a24eda36cf1af11e365242f36598a78e84d00c25c03cc7cd188f24a78251bc601bec43ff8044206fb9f029be8990fa45eb56c399e6e29e414cdbcef7bdf6872e98b295c3c3fd75c49ab7e68c8a8f4e2bc4f1ae00ac6a053e44b5ea4080026f485622f7db2715b102cbbc7fc916c5c8e96d48c6a2c113a10db4776935edc066c742ba539e5c6ffc541e4ec104a7bc9352f2e9aae76f354fc367c19cafc75299cd318373318d3ee9f77007a8392c5e9f27fce92c15b7566c9c855973b37a644edccab9af5226bc07bac8f7a3d072e546ca1c3f4a135ac701e689d1264770060f8ce39cb4b8ba7b97dfb0ec7b9e5a59e51cbc8cf29b8193dbabbe3b0144af1e621c9ba4bdcb688cd85a47709b347a113ee06eb0af179d0e53022d8bfb968c85f6e3341dbdc80c434b6231a3564f0e1df39b121c32034b57550f41a1e9c560c5485e635ab90bd38dc8f80e8062c9c42b257d709b3376ba72e5f5d00d37a6755142fb635f978ebe6d64535bcf87895db463e20d540e7d73abd5a90c655affae4c4f8cda9fdb90a1ceaa29d6064cc03d6ffeabe8a55dbacf0b4e2c2c9d28915ebe57bb6ea53b34c1b4eaca1c06d8917721130186b0c1cd020e82ef74390faa666230af322f323dee89c16ea635accd57e06996b1d9321a3963196d9a4cb71970410a5bb422d51d871624af40b73451ebc7ed1927a0b040f2efb43efbcb19a4240ffda330e2d1321d23055d024fd1f0311bc3ed993647eacfd0319441a22e4b3b60dfd3dbda44f1b596e875707b00f8ec3bc31622b71ac4693c7694d12efbb389f141afbf5a0d174427878e3e17b0c7bf4c4def9fdc8b5ffb86560bcb181f2a68faf3c7cb4ad20291ab901c4712019d3f1ce0c6cc708557cb853b7ce3807609db1a147ece51548ec2941a8f993524e48fa8913be29e39c1723f0ff605a5fd0ab6c49e965e7e6921b845cfe8e31229b220ade91bad1ca5e89fc7f22f8006475994e66a6a237e8be8e2b3114eacf303256f2f4b9ef8f9d2f4518f9675e5106a998ebea8ab5105788f8a35b737bb5c505fd50393fd445e0a4452d6d98c70dc67fca484951f9c9bd23d7fdce62546a4044603c437fa8d5df7888889bf8ab776034c5480f88ea748886da7d78bfa8be472a130812bfb1326ee9eb8b67d714696c371fefcc8a7b3d66fd43f001b27804dcc560d6e0efd3bb2f68faa1fd345c9405c5fe52269e8945da8f3ebd3e09e7b664d993ba6db62777a626f11e4adbda743a98e2235ff15e48938919a16e86c2039cf8527ceb5269b01549fe517a45c3183fa85aad807f5969ca90c4f3b381d77686ec135db410f3291f523939d3a9ff61ab99e0462a94c7a44ab6355031a4dfe0890a50df7c977bf31fbff93b85d1db306f3b171bfbc263dd38974c2fcb96d7b32d0a7098c6a9151aec0479ad862e4d4e3edaf1e2cbf02a27f92ccf83da1f593496ede1db8861bcf5e68d44c01cc5a5e564e6ba834746929c09be6114af766c063445b2dbe17aa67da62c1d1c044254743fde3e23bdcdf1ee84375b5dd66bd297ae8af39ec16ef47631762c3f43f17f399f1f1660a123ee00ce513b2b07dd5959b308e7ba90f021fdb4778c41d682141aab288fa1b7ab63cbb6c1705f9591e39a73c96cae54c21ccfe4ea2ce11abb99a1bed5876697e7581a81999c66ca5e274e14abad1f7c7a6d121fba593a64603369693d6bc29a30c5a049486ce24ba82b2f8b7f8bae52975bd009b77e99080fecd75116bbf227697c913c0bd94ae47f653d7ea825903fb9ec47795fcb3d1f2bf12793c866ca823c80fbad0788c6ac146f6fe960e5d07486c1e48673293ea6c21fcdaa202c58722aa9a5b464b885e4f784e627bbe9af4d26c63fcb4ed76a8bfdd762bfdd319d66968afdf69ecf789f8008298a3d3e77638213d292c964c8e69d79a90768d34ce0bb28a1aa1963eaa1a86bbf7e0f4b59d049f9cd7956d9d723b344c99e7850f7337b74ba748ee4f4f18f406b34be20925178edc2b5a24ce826aa0b4fd193a93928dfff83bd38ea3e9382b066672fac78467b9277738c4b999b26e22d04030dc3ae05b037a15e7797344c26a832fce7d978b1b87bc73a56a7ce261c65c87da2eb9fa0dfff591368dd1fda0389dfa393a744911991eb2a5d5380b797a4e5c945b61f8913b6e83e537ecef6928803a7262aeb7555a04dd6416c70ab861b09c9a710654c3b1caacbd35ae386a298c80affa8effe2dc955bda03e57c037e4213ed7d561a1040ec7076e92f163b0f47d307608467ba176f2704c55a6dcde47047c100a778dba1d0f525d3ee84fc20086f9445baeadb10f2eeee980b0579dc0a62882929072e5f37bda7b894d9fc9790f41543261d9f91ad691aaf94755f3803972d1ee604367620a00f01343f931a9dac5227a981d563109e9783e3012bc5f858d804dac347c60d8beb74366f470a535fbbdaec3dff364bf2d905e195856c1c0c29e9f74dc8d6f4d4799fc49a1b0902f251c07adbc60c4e985f47398b97bc25f671a2b8eacabab2b779127b1b7f5ac5082e8c2207cab33614168b7eef2600bb57f69b05bb115aee8aac88d04abcb018a857809a7c11c34c41954eb6ac06e03bf73fd17125c9f59c53ef894bdbcfdb69c46df179f5df87d6e92448dbef29b44ccd3faf834c7675e8e8b36e87a064cb7a7ea5c9491397230802890f3f0f80d7c20b341c68658437573e764ce78354db58c8fd7dfb966a2a142433507872502795640eebac8fcd7ffa9a61a3a794f7f7dbd77fa45608425fa3b6ed9e6b0bda24912ae020335c0cef05a6dd419d69bc23a5ed0d7509795f1e5c7b285db06abbe1f1d86e2f11a388a77f3a42291dd59b39b7ff164f01852af33118a2fb09644f18223d86e44d7ad402dfdc3b49806491fe2e1fbdf509721242f2767113c5ea3e509bf5e5696d7e0a44c81e8d8ad04059aa2f89d48e272043cece94f5296a32101838f3d6117aa87c075583cf664b56e4a4da7432b41a83bfe7a742292894c5561d37fe20ceea0a304e0bbb2110374517aaefbe2fee67d9a67b534cfe7b783f01146815f0ab1e0cc462cfc6383748aa390c577106c31c4a411a9232425bc8eb0296ee464654980bd6569a8a0e6366b38297fa9cc4925267a73da6ff60bb117579673f9cd8261c31a91255c88adb23682be294256f9b0b0e6dffdef43ee8461645c7862e16367c38d997dc0333bd37ac024cd6071b944db134361199e9d69e7d0d9fd1e51dfc5337fc4b94411ad73b9d7eedc475642f6622dee4a0765f1e4aac2a8a56072498b851381fceddeba7820df491af57cfd1a66cb45537a2236e2055ad75b65973ccdbeff737a34734b9c3863b120b89b351ed40b4caa0b5cb08f1e213099a4b17ea9ee53d719f2055a443141f1b26668a42d5b4bd676222479fff5e45d301e65a35a97833950600d5cec535f01abcc0958a2830d011a36514eee44f8a7504974377e8e53fde6e82bb8e3798c66b5b5b37c0497893ad40bed3e9538f68ce643a4c47dfc9dd8f255a6ee75b7541f3e6e466213ab455b215dfd8c9eba33fededc841d8008f46c53d5440266c9af29d9084ac11cce763edbc1054ab2f87d498b1e4f2c8241a302fd1723d916b9574e877508974059697a00181df85e215c21017a595988c7211e38b7eb7fc8707cfd077647d2e12186f949af63b9c123eeee66a1e87e1742f14348f79cb4144bb8f6475cca8755206e3294f46423d1d139e5e50926e00cbc14393a7dbfe4b6d83e142295841215cb02830e810341a8e8165bb100bcff7c0e0f98685f0ac17e05808755dd6748156ec47012afb294001d64e280d93d11033a537259572cb5f45c8f365ea364b5efaa8cce72197aa4f538eb6fe697b2a21ca7ac69e6961cf0b2f6b39588d9428b321854530dc23d6e7275c8aa909d690842dff1625784d16217424b0975ff38c5d2242aad8f77fb009116e30e1e3d7d8441da33efe78ca74ba5fb11ece3475774530cb57d72e322d4e06e4fdb4854f77a6a6aea8ed698c5c02ed0ef856358740a1a7f971efd8c966fe13cdcf56fe8d9afa66ebaf4c98cdb47248158bc4ed86b3d492a96625cd795069be515b604992c9fcac4f51776a691d7edb9c0063d3b5c2d423a9a6e40906fa49f8970d38494df0fa7295d0f60ed3b8b62783131512e0dc766475363028a95ecc6c8dcebfced0a250714d23ea485eb5edc63ce95ab2c1e4be50e76fd7da607bbd4258d28db00121ea4438196c08763cee6472a9dc64f4bdffd588e229c0b001ce69743e3b3ee7cad12c541b4b30b2f29b1c1777476a9f61b9b4fd10ba8a8d3cfa70fe99b52ea36b74436221185bb20de8a1d8d98c3d1b9722bdb0507ebc4bb3c74ac780830980bc560e0d5b7d329d1989c447d8e398eb70b15bfb61becc425547a62dfce51f775f4130edbeaf4418efd299066b5fdaab9f67e1c9d96c5cec78e3fa1dad3ca9df4ed7efc3d837980a0abbff333ad2b1d306ce9344ef53f94aeeff939dac1809694d4e46358d3162c1038251c767859cc77b0212e2296aed4970cbf516697d3399c251a579a9c5aa", 0x1000}, {&(0x7f0000004280)="88fcf2438b7746f456557772308b9cd300659b39ec20c1b080947a16b3d9ace841249bfbe6f2237e9b6c68027c3c91cb70c92dbae834eb7edfcf0e67196cc7e22672e99b11b26920be7356464759f2f3726b3f84da3baf945eeb23a52d56ec81c3636384ec7a01651d0f4942af0502607658d74307673c619d834eb9e08b56e33284200d183133dddc543d38a0088440e64ef1e2b929709eb07220da0be363ca6c57c4", 0xa3}], 0x4, &(0x7f0000004700)=[@cred={0x20, 0x1, 0x2, r2, r16}, @cred={0x20, 0x1, 0x2, r2, r17, r18}, @cred={0x20, 0x1, 0x2, r5, r19, r20}, @rights={0x30, 0x1, 0x1, [r4, r3, r1, r3, r4, r0, r3, r3]}, @rights={0x18, 0x1, 0x1, [r3, r3]}], 0xa8, 0x4000}, {&(0x7f00000047c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004a00)=[{&(0x7f0000004840)="c9", 0x1}, {&(0x7f0000005700)="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", 0x1000}, {&(0x7f0000006700)="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", 0x1000}, {&(0x7f0000004880)="e26e296ac9ad595816eea20eb615b4d16cf0bfc5452021dea76a71c2a1397950912de0bd3ad5e59b28e849f3998689a06574684c710568964e7c86b198a2aa4d79c90e506573d4040623328bf91fb8554e9ae50534a170678b446a1754e13cf4812252faddba1b828c49b869b4129012c910ec9b92660c2bb63dacae2f875d09d8687a506245218ced68e89b2b61e6c1f26685f17e90c37fcda7280693636a5ee0c4e86c9982e83cedc0293b95232426920caa188ce57f6876148822aea770a1a787e2229b2f8f4cce14ed526688526fd34acd327bc3d5936e03f18683279ae369c9b62df1e33a8b54624cff6fc09deb03965c", 0xf3}, {&(0x7f0000004980)="bfc76cbaef31c14ebcaa9e794a9c105e8333a67db81ddfcdf33d67070fb4b6d856399d29f03fa24ab595274858f819102421a24324055f16d8cc1ac917bf7d26681b402f40fa13ae7282d9b44485f7ab87ba8b6a91e359890cd864de1f0b132ac23fe3569c2867cf7ec2ce", 0x6b}], 0x5, &(0x7f0000004f80)=[@rights={0x30, 0x1, 0x1, [r0, r1, r3, r4, r1, r0, r3, r1]}, @rights={0x28, 0x1, 0x1, [r1, r1, r4, r4, r4, r4]}, @cred={0x20, 0x1, 0x2, r2, r21, r22}, @cred={0x20, 0x1, 0x2, r2, r23, r24}, @rights={0x20, 0x1, 0x1, [r1, r1, r3, r1]}, @rights={0x30, 0x1, 0x1, [r4, r1, r4, r1, r0, r0, r4, r0]}, @cred={0x20, 0x1, 0x2, r5, r25, r26}], 0x108, 0x4040}, {&(0x7f00000050c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000005340)=[{&(0x7f0000005140)="1ec90c34551cf8fd5076c970ce92355ac92a4d1afca92232163fcf7e6fe58c0fbdee8f0123e9805f1be6dd830c3025ac067c", 0x32}, {&(0x7f0000005180)="49e9b86d83d82e8565523e1ca1eab28e55670133cb3294ae09314725f188250660ece7aae2ea943a522f4799e516a766dbaa9ae2b3ee92555f272a5a4104db6b149237900f7b026251ada904854f567fad02be8748a776504158ce272172efe7b8ac1dbedc4e296e358ad831528705e62af6b175e291e6ef93e0a86d082b575986493d3b4de35e26e5692bc23536", 0x8e}, {&(0x7f0000005240)="dca19836339f6d924577d9fc00beb98fe566f84b97ea2a1e11511cc9840273e07300e09545d44dd7f30bf4a2783e73811a84cc0f002343daa665e8ec851404394fce306f63600d47993ccd0132d6eb830edc38dccb2bbcce02f6f7b42ee4778f728df1ddac896ea1a7dbcc688d094bc0fadee24e8d5a3c2a0ff29f43e4f6554200c10fa720021ec5079df3b1c8320b866f7725546e75b9b368481ff10c513cc6de134fc6221ad43465ddb91cbfcaecebd355219d3f592439b8b03633a5e2fb7628bdf9cff2d29f8ab97d27c754e07760bff049b185ed065dedfac51f4815a0f87ef3df6acdadbf", 0xe7}], 0x3, 0x0, 0x0, 0x8000}], 0x6, 0x800) fcntl$setown(r3, 0x8, r5) fcntl$setsig(r3, 0xa, 0x12) dup2(r3, r4) tkill(r2, 0x16) open(&(0x7f0000363ff8)='./file0\x00', 0x401, 0x0) 19:24:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434f6", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:27 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ba, 0x0) 19:24:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000010e, 0x0) 19:24:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4-', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:27 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000b1, 0x0) 19:24:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000400)={@ipv4={[], [], @remote}}, 0x14) 19:24:27 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4h', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\t', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000009d, 0x0) 19:24:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000010b, 0x0) 19:24:30 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/122, 0x7a}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r1, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) sendto$inet(r1, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x4, &(0x7f0000000180)=[{0x7ffffffb, 0x35fa, 0x7, 0x3ff}, {0x800, 0x4, 0x7, 0x9}, {0x1, 0x3f, 0xffffffffffffffe9, 0x8}, {0xfff, 0x5, 0x7f, 0x9}]}, 0x10) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x100000001, 0x1) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000140)) 19:24:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x5, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x95, 0x228000) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x5) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001b40)="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", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfcfd, &(0x7f0000000180), 0x0, &(0x7f0000000700), 0x365}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 19:24:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434e4", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:30 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000054, 0x0) 19:24:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000002f, 0x0) 19:24:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) [ 313.614095] EXT4-fs: 51 callbacks suppressed [ 313.614110] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 313.635770] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 313.648128] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000105, 0x0) 19:24:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000fd, 0x0) [ 313.727317] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 313.736489] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 313.769460] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\n', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:30 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:30 executing program 3: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2f0000001800030007fffd946fa283bc8020000000040005031d856808000700083c14cc16ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x80000) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000000c0)={0x2, 0x3, 0x3e00000, 0x34}, 0x8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)=0x0) ptrace$getsig(0x4202, r2, 0xfe00000000000000, &(0x7f00000001c0)) 19:24:30 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000500)=0xe8) shmget(0x0, 0x2000, 0x100, &(0x7f0000ffe000/0x2000)=nil) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000540)={@remote, 0x16, r2}) [ 314.029860] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000cc, 0x0) 19:24:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000004f, 0x0) [ 314.072621] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 314.105707] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 314.154721] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000073, 0x0) 19:24:30 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLERRORu(r1, &(0x7f00000015c0)=ANY=[@ANYBLOB='\r'], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f0000000040), 0x1, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000080)={0x97b9d79, 0x6, 0xfff}) close(r1) read$FUSE(r0, &(0x7f00000005c0), 0x1000) 19:24:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:30 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743482", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:30 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000100)=0x0) process_vm_readv(r0, &(0x7f0000000240)=[{&(0x7f0000000140)=""/135, 0x87}], 0x1, &(0x7f0000000980)=[{&(0x7f0000000280)=""/231, 0xe7}, {&(0x7f0000000380)=""/196, 0xc4}, {&(0x7f0000000480)=""/158, 0x9e}, {&(0x7f0000000540)=""/84, 0x54}, {&(0x7f0000000600)=""/239, 0xef}, {&(0x7f0000000700)=""/211, 0xd3}, {&(0x7f0000000800)=""/204, 0xcc}, {&(0x7f0000000900)=""/116, 0x74}], 0x8, 0x0) mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="14e6f0407ea9782b7e7e2519c4cc4c19cbcf29b26fc62898d7d1a15de0bc9cb91a820b0be505e6a15183976cedead2ffa8b333a73c118b"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='securityfs\x00', 0x0, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xb19c01d46d31fb2, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) 19:24:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434fc", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000088, 0x0) 19:24:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000cc, 0x0) 19:24:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r3 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0x1000) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x40086602, &(0x7f0000000000)=r3) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000001600)={0x0, 0x8001}, &(0x7f0000001640)=0x8) gettid() getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f00000016c0)=@assoc_value={0x0}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000001740)=@sack_info={r5, 0x2, 0x1f}, &(0x7f0000001680)=0x2ba) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x1, 0x30}, 0xc) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x101000, 0x0) write$nbd(r4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1010) sendfile(r2, r2, &(0x7f0000000140), 0x12000) getsockname(r0, &(0x7f0000001580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000340)=0x80) accept$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) syncfs(r6) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x12, &(0x7f0000000240)=@raw=[@exit, @alu={0x4, 0x0, 0x7, 0xa, 0x9, 0x108, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, @generic={0x9, 0xfff, 0x3, 0x5}, @alu={0x7, 0x1, 0xd, 0x0, 0xe, 0xfffffffffffffff8, 0xffffffffffffffff}, @jmp={0x5, 0x2, 0x0, 0xf, 0x4, 0xfffffffffffffffc, 0x4}, @ldst={0x0, 0x2, 0x3, 0x7, 0xb, 0xc, 0x1}, @map={0x18, 0x2, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x19}], &(0x7f0000000300)='syzkaller\x00', 0x2, 0x0, &(0x7f0000000340), 0x0, 0x1, [], r7}, 0x48) 19:24:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0), 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:31 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743497", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2800) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000500)}}, 0x10) 19:24:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000011d, 0x0) 19:24:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xb, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x27}], &(0x7f0000000140)='GPL\x00', 0x41, 0xa7, &(0x7f0000000280)=""/167, 0x0, 0x0, [], 0x0, 0x800000000000}, 0x48) 19:24:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000110, 0x0) 19:24:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:31 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:31 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000140)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, r0) r3 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x2, 0x82) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000640), &(0x7f0000000340)=0x84) ppoll(&(0x7f0000000180)=[{0xffffffffffffffff, 0x200}, {r2, 0x4}, {r3, 0x4020}, {r1, 0x4000}], 0x4, &(0x7f0000000200), &(0x7f0000000300)={0x3}, 0x8) fstatfs(r0, &(0x7f00000000c0)=""/116) 19:24:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 315.152183] syz-executor3 (13775) used greatest stack depth: 14904 bytes left 19:24:31 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:31 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000210000)=0x2, 0x4) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) getsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000651000)=""/240, &(0x7f0000ca5ffc)=0xf0) 19:24:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x0) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000046, 0x0) 19:24:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000008b, 0x0) 19:24:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:32 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) r2 = pkey_alloc(0x0, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x10000, 0x0) ioctl$SG_GET_SG_TABLESIZE(r3, 0x227f, &(0x7f0000000140)) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, r2) sysinfo(&(0x7f0000000080)=""/180) ioctl(r0, 0x8000, &(0x7f0000000340)="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") 19:24:32 executing program 4: syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2000000e442, 0x20000) 19:24:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) socket$kcm(0x29, 0x2, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000400)=0x6b65a878, 0x4) 19:24:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000dd, 0x0) 19:24:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:32 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = getpid() capset(&(0x7f00000000c0)={0x39980732, r2}, &(0x7f0000000100)={0x6, 0x8001, 0x54, 0x7ff, 0x2, 0xe044}) r3 = memfd_create(&(0x7f0000000140)='\x00', 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0)={0x4, 0x1, 0x205, 0x2, 0xfff, 0x5, 0x2, 0x2d0, 0x0}, &(0x7f0000000300)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000340)={r4, 0x1}, &(0x7f0000000380)=0xc) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) keyctl$describe(0xe, r0, &(0x7f0000000240)=""/140, 0x8c) 19:24:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000003c, 0x0) 19:24:32 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434fd", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x8, @dev, 0x8000}}, 0x0, 0x3cf}, 0xd76a43f33c6ec2f8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000040)="cc", 0x1, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r3, 0x1) recvfrom$inet(r3, &(0x7f0000000200)=""/179, 0xb3, 0x40000003, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x70a000) 19:24:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='wlan1\x00'}, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x101fe, 0x1, 0x2, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x0, 0x84080) perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) 19:24:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000068, 0x0) 19:24:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000174, 0x0) 19:24:33 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) semget(0x1, 0x2, 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x7776a29e79dbfef5) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) 19:24:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743406", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:33 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743411", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x0) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:33 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x29, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)={0x1}) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x80000) write$cgroup_int(r0, &(0x7f0000000080)=0x1f, 0x12) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f0000000300)}}, 0x10) 19:24:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c5, 0x0) 19:24:33 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000d3, 0x0) 19:24:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000125, 0x0) 19:24:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x8, &(0x7f0000000540)=ANY=[@ANYBLOB="c8a776170bac84cc9c76b25af4ea209d905c3116f8d90e9a02da52901d1107250bfd78cce5eb2e01720e60d853a4671ce5920e73b38e96b492805bb7ff1ece059278b20856f687685f6f633c264e7ce507ff1bee78ac8f88e2ff115317a457806f4b0abd51"]) r0 = socket$inet6(0xa, 0x100000003, 0x80000000000006) r1 = socket$packet(0x11, 0x808000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x1, 0x0) sched_setaffinity(0x0, 0x4, &(0x7f00000000c0)=0x80000001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./file0\x00', 0x100007) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000000), 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x15469}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000003368b20f78d6be6140000000000000000cf0275c17369da0400000008000c00a1d7122347dca39a22ca1fe4545b6a70c3e6803704da467ade2c4d1b9c22227b2bb054bfa06d033ae1eeaf7fbe83e4bb323a3ef89d399963049b633b3ef38e0715d28fe56a0fc35e5f5869c3083701f874", @ANYRES32=0x0], 0x2}}, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x4, 0x80) connect$bt_l2cap(r3, &(0x7f00000001c0)={0x1f, 0xbdb7, {0x0, 0x6, 0x7f, 0xce, 0x4, 0x7fffffff}, 0x40, 0x3ff}, 0xe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000080)={0x18, 0x0, {0x3, @dev, 'erspan0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r4, 0x4008b100, &(0x7f0000000040)={0x18, 0xfdfdffff, {0x0, @local, 'ip6_vti0\x00'}}) 19:24:33 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000015, 0x0) 19:24:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000049, 0x0) 19:24:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:34 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434d4", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000e2, 0x0) 19:24:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000051, 0x0) 19:24:34 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(0xffffffffffffffff, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="657874348c", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000053, 0x0) 19:24:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000007e, 0x0) 19:24:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ipx\x00') getsockname$unix(r1, &(0x7f0000000040), &(0x7f0000000140)=0xfffffffffffffedc) 19:24:34 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x8, &(0x7f0000000540)=ANY=[@ANYBLOB="c8a776170bac84cc9c76b25af4ea209d905c3116f8d90e9a02da52901d1107250bfd78cce5eb2e01720e60d853a4671ce5920e73b38e96b492805bb7ff1ece059278b20856f687685f6f633c264e7ce507ff1bee78ac8f88e2ff115317a457806f4b0abd51"]) r0 = socket$inet6(0xa, 0x100000003, 0x80000000000006) r1 = socket$packet(0x11, 0x808000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x1, 0x0) sched_setaffinity(0x0, 0x4, &(0x7f00000000c0)=0x80000001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000280)='./file0\x00', 0x100007) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000000), 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x15469}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000003368b20f78d6be6140000000000000000cf0275c17369da0400000008000c00a1d7122347dca39a22ca1fe4545b6a70c3e6803704da467ade2c4d1b9c22227b2bb054bfa06d033ae1eeaf7fbe83e4bb323a3ef89d399963049b633b3ef38e0715d28fe56a0fc35e5f5869c3083701f874", @ANYRES32=0x0], 0x2}}, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x4, 0x80) connect$bt_l2cap(r3, &(0x7f00000001c0)={0x1f, 0xbdb7, {0x0, 0x6, 0x7f, 0xce, 0x4, 0x7fffffff}, 0x40, 0x3ff}, 0xe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000080)={0x18, 0x0, {0x3, @dev, 'erspan0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r4, 0x4008b100, &(0x7f0000000040)={0x18, 0xfdfdffff, {0x0, @local, 'ip6_vti0\x00'}}) 19:24:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743406", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000fe, 0x0) 19:24:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000a3, 0x0) 19:24:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8540, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth0\x00', 0x43732e5398416f1f}) r1 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x1001, 0x2040000) getpeername$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) tee(r1, r0, 0x7, 0x1) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={@mcast1, @mcast1, @empty, 0x9e, 0x0, 0x0, 0x100, 0x7e0, 0x0, r2}) 19:24:35 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743411", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000001c, 0x0) [ 318.771142] EXT4-fs: 76 callbacks suppressed [ 318.771155] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 318.784975] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 318.822077] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 318.862604] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 318.903590] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 318.958036] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="0f01ee640fde350f070f011bb880038ed0f2650f22e7db4e000f019c00002e2e0f00d466b9800000c00f326635000100000f30", 0x33}], 0x1, 0x200000024, &(0x7f0000000080), 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000100)="3e36f30f22a5c4a1795ac8de8c66000000000f01ca664a0f3a61700ff036f342a766ba4300edc462f922fdc4c2f5913c550000010066420f38829c5d00000000", 0x40}], 0x1, 0x0, &(0x7f00000001c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x8, &(0x7f00000008c0)=[{&(0x7f00000002c0)="b318354a56a7942bb115bc1e283bc2c807feed2cc4586eddecb601f5aa156a5306fc1b6d251616e6412fc4b19f55e0fe904e9321de54a66c8fa3609bf5d686725dc7869b6d6fc59bd35f41128224844b96729338209463737e5e313fbdb0c5df7d3c9c1f0121012d554d06aec4e711720232108bb4b9ec3b3a3d8e3ebfb5042bcba683aef1a01bc002c9d6cd4cabd7ed9e7ac8e581783d029695ccefff562078102ff3a1677ab7a8605ec45ade61909f778f9147c753ce126ec21975efcdd6fdb6e294a2f28f58b44dd9e2604545219e50355fb8822cc824a28c20850269787fe73b", 0xe2, 0x9}, {&(0x7f00000003c0)="6a504bf9b76cde04dfa651c40a5e7dafd0456045e7f60f827331f8742b58f6e0096f5630c16ce3a01120c37613bd5c325e8e91dd8a2c4bece655399a858d9eeb225b3532d3c8a52ab60f42b41c53dd06705245ddc6c558a1b412253dba2b7170d3ddc4c527ea7015011ae1ed35a028b6ef3bde139b634b6e83c9586b94721ab7d19b2fc581669de2191e6d17e4ed0ea1aeb0b04673e3d3c3f7f5e3a054541157e79ad60ebeab1a734b3e31671c15266dc2ac70182092d748912ff074284acf0754d86e029ad779c905d8f7bf70c082e8ccf44c228a4f9f53fd75fd7fd7c160378d01cdd0f9ecebae6143636471f9729beb", 0xf1, 0x7}, {&(0x7f00000001c0)="9f2883bab3fdb280c66d823f86650b964f2b6d42de79fcfefbede569e090cc076df6532ef3bcf0e572dc19ebff5f8f49afb79a50b54847e21282d491791fd82237e14992a729bb98ece848d275ae6a6c", 0x50, 0xe70e}, {&(0x7f00000004c0)="87583fd5c315d77e47da27a96973376208ca3b4d9b5b6f86650982296578d5e4b572099e894b4b70888261523e720d631ad5636b495cb08eb1da715ed1b9c6454530d46c99fd8743832dcb2e3e65604f06267274215618d43747c0e4b4b78290ac953008e2f9e7aca12db8e885afd42f959c6c294adbca5085d89cc92d3893951fc87a55b56525d918c19e15cfef7bb93333fd51d263892ab76b13fc9dc6ccc082d525b892310f35038032fc3b72b873a88bdb26321984aafcf8b693474db56cd85ffe753a8af093e8", 0xc9, 0x2}, {&(0x7f00000005c0)="47f97f075c99b5bea7fc052bb2fee7cce7c2fd1672de52aa29a86a9520c473c71ab317700d81f064765acbcc47b871eab24bf596a5f581e6a8c6d35cd6ee69a881f43643b569669c88a658d679afd47c49ffd9bdc0cd53e4b2bd006333d5ce06a62255a9afa90fc28346de93b0cc03ebee462050519e964b133f785d812ceff9190ed5ff23a93f3b60d60bd29e91ab3e16cb7f1428337c568f63b831b7927c48b79605460afcdbd4e142566ed7c08de8caf9e8dbad143435e4f7f3549ac968591685655c6ed4d33cbe06cf", 0xcb, 0x3f0000000000}, {&(0x7f00000006c0)="472a7e0b7c6ae3389cda7e2ef09803d063775119a69fbfe8e3d0943b6223b76109f9d347c7bde81fbbb807afd8c87b1281b003a87c70a64f0f77569699d204d1963496685d3db9b3ccb7c6d3aeab78b541b61b231a068048c126b5a16b680f3605ab17730d4b93b43ab07018568ce5d163c3c521c2d257c3d4d28811c13eb1abbd958f45963e4856c8c07ca98e236d7867a399fa04e276b6a9607fc5fa78e191f3a169ad01767f9815d6609db18d89aea1c0d97eab177b30f6765159e39914fb27871687807446d6", 0xc8, 0x5}, {&(0x7f00000007c0)="98bae15f118d1ea98c7732bac1348e92566d6357429594e1e524a7bd2e6431375da2e6105655c40e610fae8aebf1ff5af517566a8a340ea424cfa5e89f8b2817619d7f713ff0312266c8496faf36d291eb7d05a50a012c4f9317786d0064adff81b28ed27010f5f67cb5da8182058e", 0x6f, 0x81}, {&(0x7f0000000840)="210943ab54e86c368efb4e9fa965fa0485734e8deb8b40dd87ea45364d20567838bb69b290c79d8194e102a3cd0654984921120f6f8e9116d6644bbd4dfb1d96ad8f1ccc08181dd7666a64929571493d3022af8279bf0101bf22904c048f25", 0x5f, 0x200}], 0x80802, &(0x7f0000000980)={[{@commit={'commit', 0x3d, 0x1}}, {@nobarrier='nobarrier'}, {@commit={'commit', 0x3d, 0x1}}, {@barrier='barrier'}, {@data_writeback='data=writeback'}, {@quota_account='quota=account'}, {@spectator='spectator'}, {@quota_account='quota=account'}, {@upgrade='upgrade'}]}) 19:24:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000074, 0x0) 19:24:35 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000052, 0x0) 19:24:35 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2, 0x6}}, 0x48) dup2(r0, r1) 19:24:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 319.127602] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 319.158808] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 319.172804] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000cb, 0x0) 19:24:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000034, 0x0) [ 319.236429] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:36 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000d53fc1)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x67, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, &(0x7f0000000000)) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x400) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x1, 0x4) 19:24:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ab, 0x0) 19:24:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000002b, 0x0) 19:24:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x0, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:36 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x4, &(0x7f0000000000)=[{0x6, 0x54d, 0x7f, 0x8}, {0x1, 0x818, 0x9, 0x4}, {0x9, 0xfff, 0x1000000000000000, 0xff}, {0x2, 0x4, 0x101, 0x7}]}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000280)={0x8, 0x0, 0x1000}, 0x4) r3 = request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)='\x00', 0xfffffffffffffff8) r4 = request_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000240)='system!-security\x00', 0xffffffffffffffff) keyctl$instantiate(0xc, r3, 0x0, 0x0, r4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}, 0x4) 19:24:36 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0xd33, 0x200000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000280)={0x1ff, 0x10000, 0x8, 0x3, 0xef, 0x44cd, 0x40, 0x2, 0x7ff, 0x7, 0x101}, 0xb) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r1, &(0x7f00000002c0)={0x18, 0xfffffffffffffff5, 0x3, {0xffffffff00000001}}, 0x18) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x400, 0x0) ioctl$NBD_DISCONNECT(r3, 0xab08) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000300)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) tgkill(r4, r5, 0x26) timer_create(0x3, &(0x7f0000000180)={0x0, 0x3}, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) timer_create(0x7, &(0x7f0000000080)={0x0, 0xa, 0x0, @tid=r6}, &(0x7f00000000c0)) 19:24:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743403", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000031, 0x0) 19:24:36 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000b8, 0x0) 19:24:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c2, 0x0) 19:24:36 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000094, 0x0) 19:24:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:36 executing program 3: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x200102, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000140)) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000180)="64728e8235d0a02e", 0x8, 0xfffffffffffffffd) keyctl$assume_authority(0x1d, r1) 19:24:36 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000080)) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = gettid() syz_open_dev$evdev(&(0x7f0000012fee)='/dev/input/event#\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") tkill(r2, 0x7) 19:24:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0x0, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000003d, 0x0) 19:24:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000079, 0x0) 19:24:37 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434fd", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:37 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000100)={[], 0x7a, 0x5531fee, 0x0, 0x0, 0x0, 0x0, 0x1d000}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) accept$nfc_llcp(r0, &(0x7f0000000680), &(0x7f0000000700)=0x60) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, &(0x7f00000002c0)={0x3, r1}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) r5 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000540)="660fee0e8d7ba3d000f280899ce900660f3a62b800a00a0f060fc7651c8f4202baf80c66b8b6ccee8366efbafc0cb82600ef0f3066b8000000000f23d80f21f86635800000a00f23f8"}], 0x0, 0x2a, &(0x7f0000000200), 0x1000000000000199) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000300), 0x4) fgetxattr(r4, &(0x7f0000000080)=@random={'trusted.', ',vboxnet0\\)-\x00'}, &(0x7f0000000400)=""/160, 0xa0) ioctl$KVM_RUN(r4, 0xae80, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00027, 0x0, &(0x7f00000000c0), 0x1, 0x0) ioctl$GIO_FONT(r5, 0x4b60, &(0x7f00000005c0)=""/134) setsockopt$netlink_NETLINK_PKTINFO(r5, 0x10e, 0x3, &(0x7f0000000740)=0x4, 0x4) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='/dev/audio\x00'}, 0x10) setsockopt$XDP_UMEM_COMPLETION_RING(r6, 0x11b, 0x6, &(0x7f00000004c0)=0x800, 0x4) 19:24:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x4, 0x1, 0x1, 0x0, 0x0, r0, 0x6}, 0x2c) r1 = getpgrp(0x0) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) rt_tgsigqueueinfo(r1, r2, 0x0, &(0x7f0000000100)) writev(0xffffffffffffffff, &(0x7f0000000180), 0x0) 19:24:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000d0, 0x0) 19:24:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000001e, 0x0) 19:24:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:37 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\b', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:37 executing program 4: r0 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) write$binfmt_elf32(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x1, 0x401, 0x100000000, 0xef0c, 0x2, 0x3e, 0xffff, 0xde, 0x38, 0x165, 0xba, 0x200, 0x20, 0x2, 0x4, 0x5, 0x1}, [{0x5, 0x200, 0x7, 0xffffffffffff70d2, 0x8, 0x5, 0x9, 0xa4ff}, {0x5, 0x0, 0x4, 0x101, 0xa8, 0x1ca, 0x4, 0x1}], "2e975eac09e192479dacc69ee351e5ea963c2772cdbe9ada317a92927a0c8949beabb49f104d91b59f515636fc98cfa4fad5dbcf3499f954774e05b3f7ec", [[], [], [], [], [], [], [], [], []]}, 0x9b6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="800600001f10189291536d6d17da59269638ab000000", 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r2, r2, &(0x7f0000000040), 0x20) 19:24:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000027, 0x0) 19:24:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000a1, 0x0) 19:24:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x0, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:37 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434fd", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:37 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x80100000002000) sched_setscheduler(r1, 0x5, &(0x7f0000000080)=0x4) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffb, 0x400800) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x2}, {{@in6=@dev, 0x0, 0x2b}, 0x0, @in6=@loopback}}, 0xe8) 19:24:38 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getpid() wait4(0x0, &(0x7f0000000100), 0x1000000, &(0x7f0000000500)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x1) creat(&(0x7f0000000440)='./bus\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x1, 0xfce, 0x0, 0x0, 0x0, 0x2, 0x800, 0x9, 0x580, 0x0, 0x0, 0xffffffff, 0x0, 0x1ff, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x40, 0xc3b, 0x100000000, 0x400, 0x0, 0x3, 0x4, 0x3a, 0x8, 0xfffffffffffff284, 0x8, 0x0, 0x0, 0x1b82, 0x40, 0x3f, 0x0, 0x30000000000000, 0x0, @perf_config_ext={0x3ff}, 0x46, 0x0, 0xffffffffffff8000, 0x4, 0x10001, 0x7}, 0x0, 0x0, r0, 0xb) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.procs\x00', 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)) openat$cgroup_procs(r1, &(0x7f0000000400)='tasks\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000180), &(0x7f0000000140)=0x14) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000000300)=""/194) fcntl$setstatus(r4, 0x4, 0x6100) sendfile(r4, r3, &(0x7f0000000040), 0x100000001) 19:24:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000002b, 0x0) 19:24:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000056, 0x0) 19:24:38 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:38 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000100)={[], 0x7a, 0x5531fee, 0x0, 0x0, 0x0, 0x0, 0x1d000}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) accept$nfc_llcp(r0, &(0x7f0000000680), &(0x7f0000000700)=0x60) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, &(0x7f00000002c0)={0x3, r1}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) r5 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000540)="660fee0e8d7ba3d000f280899ce900660f3a62b800a00a0f060fc7651c8f4202baf80c66b8b6ccee8366efbafc0cb82600ef0f3066b8000000000f23d80f21f86635800000a00f23f8"}], 0x0, 0x2a, &(0x7f0000000200), 0x1000000000000199) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000300), 0x4) fgetxattr(r4, &(0x7f0000000080)=@random={'trusted.', ',vboxnet0\\)-\x00'}, &(0x7f0000000400)=""/160, 0xa0) ioctl$KVM_RUN(r4, 0xae80, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00027, 0x0, &(0x7f00000000c0), 0x1, 0x0) ioctl$GIO_FONT(r5, 0x4b60, &(0x7f00000005c0)=""/134) setsockopt$netlink_NETLINK_PKTINFO(r5, 0x10e, 0x3, &(0x7f0000000740)=0x4, 0x4) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='/dev/audio\x00'}, 0x10) setsockopt$XDP_UMEM_COMPLETION_RING(r6, 0x11b, 0x6, &(0x7f00000004c0)=0x800, 0x4) 19:24:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000007b, 0x0) 19:24:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000ce, 0x0) 19:24:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:38 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434f6", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x0, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000000b, 0x0) 19:24:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000011c, 0x0) 19:24:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:39 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\t', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c6, 0x0) 19:24:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:39 executing program 4: r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000023c0)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x60, 0x80000) readv(r0, &(0x7f0000002340)=[{&(0x7f0000000140)=""/249, 0xf9}, {&(0x7f0000000240)=""/248, 0xf8}, {&(0x7f00000000c0)=""/11, 0xb}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}], 0x5) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000002440)="2897bfdebea68e6b00d842b74ea92d84f6c53f10546d4b2dd67b6a6322021b752c2737288c771056c9f43bd19bcbc8c0251728f31db5c8e3868db185f4928954d8b29f329a59113065bc413ae3317a7c8bdc67c0925355a66e6863cc27dad6e5ff68f3934d9a1bebc6cf19") fallocate(0xffffffffffffffff, 0x0, 0x0, 0x800000000081) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000002400)) [ 322.746589] syz-executor4 (14596) used greatest stack depth: 12928 bytes left 19:24:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="cbad00000301ffff00000000000000000000e5d0736a0000080008000420e140f68e6a8a3cd967863cd339eb36511ba6ad43824ecd089063651657bd7b1d781062d4f2589e8142bfdee78a79b3fdde527a77d676ffff0c66d54a8e66d2d26e59493f", @ANYRES32=0x0], 0x1c}}, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000240)=""/126) r2 = syz_open_dev$mouse(&(0x7f0000003640)='/dev/input/mouse#\x00', 0x2, 0x2040c0) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f0000000040)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000200)) 19:24:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000021, 0x0) 19:24:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000de, 0x0) 19:24:39 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) r2 = socket$inet(0x10, 0x3, 0xc) fadvise64(r0, 0x3, 0x7fffffff, 0x3) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000010507041dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e28000000110affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 19:24:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x0, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) [ 323.270786] netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. 19:24:40 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000062, 0x0) 19:24:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000002a, 0x0) 19:24:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa421d9511160601ccf69a412100140000fe8000000000aafefeffffffffffffffffffa1cd3a3b2d0db724f7f895c21b689039867ef08b14563c700b7d35ad0c036d3a"], &(0x7f00000002c0)) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffdef, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') 19:24:40 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x401) poll(&(0x7f00000003c0)=[{r0}], 0x1, 0xbb) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) pipe(&(0x7f00000000c0)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x80000, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:24:40 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000010, 0x0) 19:24:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000bc, 0x0) 19:24:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:40 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000002d, 0x0) 19:24:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000011a, 0x0) [ 323.795793] EXT4-fs: 72 callbacks suppressed [ 323.795807] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 323.891770] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 323.942259] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 323.971228] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0x0, 0x3, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x80000) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739c9d, 0x120, 0x0, 0x35) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={@empty, 0x7f, r2}) recvfrom$inet(r0, &(0x7f0000000200)=""/179, 0xb3, 0x40000003, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x70a000) 19:24:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000003a, 0x0) 19:24:40 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4l', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 324.149727] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 324.164937] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 324.195074] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 324.247159] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue [ 324.271309] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:41 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x40) preadv(r0, &(0x7f0000000740)=[{&(0x7f00000001c0)=""/191, 0xbf}, {&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f00000002c0)=""/5, 0x5}, {&(0x7f00000004c0)=""/81, 0x51}, {&(0x7f0000000540)=""/23, 0x17}, {&(0x7f0000000580)=""/193, 0xc1}, {&(0x7f0000000680)=""/175, 0xaf}], 0x8, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0x22599518, 0xfff, 0x4, 0x3, 0x1, 0xffffffffffffffff, 0x3, 0xb016, r3}, &(0x7f0000000100)=0x20) sendmsg$nl_generic(r1, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x34000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x18, 0x2e, 0x701, 0x0, 0x0, {0x2003}, [@nested={0x4}]}, 0x18}}, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000840)=0x3) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f0000000880)=""/246) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000007c0)={0x0, 0x0, [0x80000000, 0x2, 0x4, 0x5, 0xf86, 0x1, 0x6, 0xf41b]}) 19:24:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000114, 0x0) 19:24:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000a7, 0x0) 19:24:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:41 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 324.474383] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000,,errors=continue 19:24:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000174, 0x0) 19:24:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000200)=ANY=[@ANYBLOB="64254813b62654b2c8cb819829adce27c6faa4efe83dfc9cdcf4070f012140c56efdd94c82cc4ca500000000566b24c88858247e66417b4c34302dfe6e9e9bd25f3e68d7a74f6224a6eaf4872b35b682c05255a5527d13c297ba8c5f63edaa0770fe8dc7c6226b794eab8a5699212cdf3189de2550dc6b95f4155d3b5901289bffa7d648bb0b72aceb8684c95f6297e299c3234899a5b6469b50dcb5f14f5090c400042194b0d14cd7f182d7d8eca4c94067d7864b3d88cd9f04"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000140)=0x8) 19:24:41 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x0, 0x10000, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:41 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x40400) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000140)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000080)=""/66) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) 19:24:41 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000042, 0x0) 19:24:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000000c0)={0x1, 0x5}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000002c0)=@broute={'broute\x00', 0x20, 0x2, 0x228, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000000c0), &(0x7f0000000900)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'tunl0\x00', 'veth0_to_bridge\x00', 'veth0\x00', 'veth0\x00', @link_local, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0xc0, 0xc0, 0xf0, [@nfacct={'nfacct\x00', 0x28, {{'syz1\x00'}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x2a0) shutdown(r1, 0x0) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000100), 0x4) 19:24:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000118, 0x0) 19:24:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000180)=@ethernet={0x0, @local}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)=""/250, 0xfa}], 0x1, &(0x7f0000000500)=""/133, 0x85, 0x64f}, 0x40000000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75312a69887e", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,\x00']) read$FUSE(r0, &(0x7f0000003000), 0x4ea) read$FUSE(r0, &(0x7f0000005000), 0xe83) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f00000074c0)=ANY=[]) read$FUSE(r0, &(0x7f0000008000), 0x139f) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000640)={0x20, 0x0, 0x3}, 0x20) [ 325.230036] xt_nfacct: accounting object `syz1' does not exists 19:24:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x100000000000006d, 0x0) 19:24:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:41 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\a', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 325.424917] ISOFS: Unable to identify CD-ROM format. 19:24:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000d2, 0x0) 19:24:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000b2, 0x0) 19:24:42 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743410", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x0, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4l', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000007, 0x0) 19:24:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000fa, 0x0) [ 325.980229] xt_nfacct: accounting object `syz1' does not exists 19:24:42 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x20000, 0x40043fd}) 19:24:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000a7, 0x0) 19:24:42 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 326.199960] ISOFS: Unable to identify CD-ROM format. 19:24:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x0, 0x1, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\a', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x20000400) r1 = socket(0x21, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0xfffffffffffffffc, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r6 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x0, 0x7}) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x4, 0x0, &(0x7f00000004c0)="6e212e31e312e41ca0ca056a7973c8adff604d4a4f09bf1dc287b3c90b4d55249284db4822f93816f1d022fb7a04e4437669d2af8325575b91156e0085b4b64ea21e3e0921980d676b", &(0x7f0000000540)="05ba047dd3c04a8602f00636f403d1f79e5e1478fbe51c3587c33c0d3aeb29f869660e20a0d3531c38171b40ee4bb0b2af5b536cb349bcc79f2dedb94f215fb1cbadd0cb9cf90ee559e0770ad86572004be8941b095db58fa8556f08f9ce372cf52f69e63ceeb7c3d184e988917b0c2cef76a25ee08008e3235db2e1df8047b14297ab45bec37efedf45d83f599dee8313e369236917b8d18d42313e51922a2577b0f8f12c8b74b2b0a8fdf185511f9178e3e632e796", 0x49, 0xb6}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r6, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={0x400, {0x2, 0x4e23, @rand_addr=0x86c5}, {0x2, 0x4e21, @rand_addr=0x3}, {0x2, 0x4e22}, 0x300, 0x2983, 0x8, 0x52, 0x5, &(0x7f0000000100)='ipddp0\x00', 0x5, 0x8, 0x100000000}) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) ioctl$int_in(r5, 0x5452, &(0x7f0000000140)=0x9) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27bf84a51d684f52385f6d7db"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) getsockopt(r1, 0x10f, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 19:24:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000117, 0x0) 19:24:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000db, 0x0) 19:24:43 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434fc", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:43 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLERRORu(r1, &(0x7f00000015c0)=ANY=[@ANYBLOB='\x00'], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f0000000040), 0x1, 0x0) close(r1) read$FUSE(r0, &(0x7f00000005c0), 0x1000) 19:24:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787434ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x103100, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000100)=""/185) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000040)={'rose0\x00', 0xfff}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="000100000000000000"], &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 19:24:43 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000093, 0x0) [ 326.724922] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 326.867409] kasan: CONFIG_KASAN_INLINE enabled [ 326.872259] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 326.879708] general protection fault: 0000 [#1] SMP KASAN [ 326.885284] CPU: 1 PID: 15212 Comm: syz-executor3 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 326.893795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.903177] RIP: 0010:ubifs_mount+0x1a0/0x66f0 [ 326.907775] Code: 49 89 c7 48 89 c6 e8 3f 09 0f ff 49 81 ff 00 f0 ff ff 0f 86 91 03 00 00 e8 fd 07 0f ff 48 89 d8 48 89 da 48 c1 e8 03 83 e2 07 <42> 0f b6 04 28 38 d0 7f 08 84 c0 0f 85 1e 19 00 00 44 0f b6 2b bf [ 326.926688] RSP: 0018:ffff8801861d7660 EFLAGS: 00010246 [ 326.932062] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90003271000 [ 326.939344] RDX: 0000000000000000 RSI: ffffffff826dce73 RDI: 0000000000000007 [ 326.946628] RBP: ffff8801861d7b88 R08: ffff88018f3dc040 R09: ffffed003b6246de [ 326.953909] R10: ffffed003b6246de R11: ffff8801db1236f3 R12: ffff8801861d7b60 [ 326.961193] R13: dffffc0000000000 R14: ffff8801bbba95c8 R15: ffffffffffffffea [ 326.968489] FS: 00007f2420a17700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 326.976726] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 326.982620] CR2: 00007f0ac59c8000 CR3: 00000001d1831000 CR4: 00000000001406e0 [ 326.989928] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 326.997214] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 327.004497] Call Trace: [ 327.007105] ? __kernel_text_address+0xd/0x40 [ 327.011618] ? unwind_get_return_address+0x61/0xa0 [ 327.016567] ? __save_stack_trace+0x8d/0xf0 [ 327.020914] ? ubifs_iget+0x1bf0/0x1bf0 [ 327.024904] ? save_stack+0x43/0xd0 [ 327.028549] ? kasan_kmalloc+0xc4/0xe0 [ 327.032456] ? __kmalloc_track_caller+0x14a/0x720 [ 327.037310] ? krealloc+0x65/0xb0 [ 327.040796] ? apparmor_fs_context_parse_param+0x1dd/0x490 [ 327.046437] ? security_fs_context_parse_param+0x54/0xb0 [ 327.051901] ? vfs_parse_fs_param+0x127/0x2c0 [ 327.056408] ? vfs_parse_fs_string+0x1d5/0x2b0 [ 327.061007] ? do_mount+0x658/0x1e30 [ 327.064773] ? ksys_mount+0x12d/0x140 [ 327.068578] ? __x64_sys_mount+0xbe/0x150 [ 327.072733] ? do_syscall_64+0x1b9/0x820 [ 327.076812] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.082190] ? find_held_lock+0x36/0x1c0 [ 327.086276] ? __kmalloc_track_caller+0x26e/0x720 [ 327.091126] ? kasan_check_read+0x11/0x20 [ 327.095285] ? rcu_is_watching+0x8c/0x150 [ 327.099434] ? trace_hardirqs_on+0xbd/0x2c0 [ 327.103763] ? rcu_pm_notify+0xc0/0xc0 [ 327.107656] ? kasan_check_read+0x11/0x20 [ 327.111807] ? rcu_is_watching+0x8c/0x150 [ 327.115963] ? rcu_pm_notify+0xc0/0xc0 [ 327.119859] ? krealloc+0x7a/0xb0 [ 327.123320] ? rcu_read_lock_sched_held+0x108/0x120 [ 327.128340] ? kfree+0x1d7/0x210 [ 327.131715] ? kasan_check_read+0x11/0x20 [ 327.135878] ? rcu_is_watching+0x8c/0x150 [ 327.140033] ? rcu_pm_notify+0xc0/0xc0 [ 327.143928] ? vfs_parse_fs_string+0x1f8/0x2b0 [ 327.148521] ? rcu_read_lock_sched_held+0x108/0x120 [ 327.153551] ? kfree+0x1d7/0x210 [ 327.156932] ? ubifs_iget+0x1bf0/0x1bf0 [ 327.160911] legacy_get_tree+0x131/0x460 [ 327.165009] vfs_get_tree+0x1cb/0x5c0 19:24:43 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 19:24:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000000c7, 0x0) 19:24:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext4L', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x100020, &(0x7f0000000280)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 327.168824] do_mount+0x6f9/0x1e30 [ 327.172367] ? lock_release+0x9f0/0x9f0 [ 327.176350] ? copy_mount_string+0x40/0x40 [ 327.180597] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.186136] ? _copy_from_user+0xdf/0x150 [ 327.190290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.195835] ? copy_mount_options+0x285/0x380 [ 327.200338] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.205887] ksys_mount+0x12d/0x140 [ 327.209523] __x64_sys_mount+0xbe/0x150 [ 327.213512] do_syscall_64+0x1b9/0x820 [ 327.217423] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 327.222800] ? syscall_return_slowpath+0x5e0/0x5e0 [ 327.227742] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 327.232788] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 327.237817] ? recalc_sigpending_tsk+0x180/0x180 [ 327.242582] ? kasan_check_write+0x14/0x20 [ 327.246830] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.251690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.256887] RIP: 0033:0x457099 [ 327.260091] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.279086] RSP: 002b:00007f2420a16c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 327.286799] RAX: ffffffffffffffda RBX: 00007f2420a176d4 RCX: 0000000000457099 [ 327.294052] RDX: 0000000020fdb000 RSI: 0000000020000380 RDI: 0000000020000000 [ 327.301304] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 327.308652] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 327.315920] R13: 00000000004d3210 R14: 00000000004c81c6 R15: 0000000000000001 [ 327.323197] Modules linked in: [ 327.326382] Dumping ftrace buffer: [ 327.329917] (ftrace buffer empty) [ 327.333695] ---[ end trace 8c387455d6e67fb9 ]--- [ 327.338511] RIP: 0010:ubifs_mount+0x1a0/0x66f0 [ 327.343131] Code: 49 89 c7 48 89 c6 e8 3f 09 0f ff 49 81 ff 00 f0 ff ff 0f 86 91 03 00 00 e8 fd 07 0f ff 48 89 d8 48 89 da 48 c1 e8 03 83 e2 07 <42> 0f b6 04 28 38 d0 7f 08 84 c0 0f 85 1e 19 00 00 44 0f b6 2b bf [ 327.362061] RSP: 0018:ffff8801861d7660 EFLAGS: 00010246 [ 327.367444] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90003271000 [ 327.374740] RDX: 0000000000000000 RSI: ffffffff826dce73 RDI: 0000000000000007 [ 327.382037] RBP: ffff8801861d7b88 R08: ffff88018f3dc040 R09: ffffed003b6246de [ 327.389324] R10: ffffed003b6246de R11: ffff8801db1236f3 R12: ffff8801861d7b60 [ 327.396611] R13: dffffc0000000000 R14: ffff8801bbba95c8 R15: ffffffffffffffea [ 327.403910] FS: 00007f2420a17700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 327.412175] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 327.418074] CR2: 00007f0ac59c8000 CR3: 00000001d1831000 CR4: 00000000001406e0 [ 327.425452] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 327.432739] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 327.440029] Kernel panic - not syncing: Fatal exception [ 327.445739] Dumping ftrace buffer: [ 327.449274] (ftrace buffer empty) [ 327.452980] Kernel Offset: disabled [ 327.456589] Rebooting in 86400 seconds..