a900b3ba095d95ccc71f2ef0ca27d5f7004971bcc7bb816deb5f4715b884559273470e037a30f80f4e18cc10507afa3c2ee8172c000000000000"], 0x0, 0x0, 0x0, &(0x7f000000a000)) mount(&(0x7f0000000f00)=ANY=[@ANYBLOB="3897c61e2344b35ce4b0e8eb675766d6275488bb0fb34f52ffa1089aff3a2dda6d16dcf00100000000000000016b7b1039cfd93e445671550a8131d1"], 0x0, 0x0, 0x100000, &(0x7f0000444000)) mount(&(0x7f0000001140)=ANY=[@ANYBLOB="6e76826cec4b14e3e1ba40ade347da9043642d201bea3e06ad9460ae68add5babb300e80cffb9d2722ec15c095e10f1141cf2eed277caed5251ec0e73df9048dd0b27577f670ec108394fe34d1497700cd4b113e95d26431fcdeee9f0f76a06325e510b6d410732211c73965375e75ec82c0724c3fd14a553573f5f4c86a6658e16668ee9b827b4c2c0a2206277dcc42249dcc708a6ac21059b2b46095dde811799262fd0a78ffdc29275bf20901e334988b0d99c831272038d64eb2d4a0d82e191b80065564080491d61817683e9c6a9ec2f58a32b59e9e663771363247f40860319281057bcc793e14346d8f4a533631ec6f4614545e33fdb477babb336793abe5c578818d4be6b202"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000003200)=ANY=[], 0x0, &(0x7f0000001300)='hfsplus\x00', 0x80000, &(0x7f0000001340)="d170129a40bfb86eefc99789d27bdf9fb0386b1f06c01c73b307690be4308eb12330fc6da7e0dd8bee96514eaecb895490f0ce954fe602b07c6157577e2325f7d8b832ad068dc3201ca971c234ac20ac6858c2ad3873666080f1341d5a0fc56cc5177de838967b340fde3c6b3c0204ffa62420381038773d414f3fca890f0125f77571") pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000380)=ANY=[@ANYBLOB="f34e27a5ac"], 0x0, 0x0, 0x5010, &(0x7f00000e7000)) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) ioctl$int_out(r0, 0x545c, &(0x7f00000010c0)) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) close(r2) r4 = socket$inet6(0xa, 0x1000000000009, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r5 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r6 = getpid() setpriority(0x0, r6, 0xfffffffe80000002) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f000000dfd0)={0xc4, 0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0c635325d848fe2d3149a0735bb86e08e2218b6d22856b1f64a241cf21d269f662ffd5effc2728357a32be1d0e3845036b95d399693979a31c4d54930387f767da9999f66daf4f4d686046d194ce1def49c5cbb10e36d075d07daaa5180aa6943e63cfacdb596a9f59ae4a78ec4098864145362e601a3a74f7689a35de3cd157a6ce187eeed0bfc9c4d0b6d21588fd9bea79343746435a930232ccd1656500bbf1440edbec8073fde91334ef757e2ea1dd4cad0de1540dab6c33c5fd535773351adc5438"], 0x0, 0x0, 0x0}) ioctl$TIOCCBRK(r3, 0x5428) 14:49:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x30001, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000080)=0xffff) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000040)=0x7) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:17 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfi\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) fcntl$getown(r0, 0x9) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x800, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000000)={0x7, 0x4d, 0x2}, 0x7) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x81000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="08002ab57000fcdbdf250200000008000400020000000800030088000000080001004e21ebb104000500bb22a386b648bb2bca13e124f9b2ffb1df9dc01e47512257208ce31a1f84a08272d03adc6b75890831c15d604cfcb9ddd92251cfd44fff1eba635bc44c73b3e537d7e3b7066fb67b0f82eea4551185ad85a4b7b08f3d01c37003ec83b2634a4be4e09c93c49a651ec09314c1ece7ce89fd"], 0x30}, 0x1, 0x0, 0x0, 0x40090}, 0x8000) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:17 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB='discard,nodiscard,quota,smackfsdef=./cgroup.cpu/syz1\x00,smackfsdef=./cgroup.cpu/syz1\x00,fowner=', @ANYRESDEC, @ANYBLOB="2c8075626a5f7479704171be37e8b295061f5c653d6367726f75702c7365636c6162656c2c7569643e", @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB=',euid=', @ANYRESDEC, @ANYBLOB=',\x00']) 14:49:17 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x4}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x8}, 0x8) 14:49:17 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r2 = semget$private(0x0, 0x1, 0x1) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)=0x80000001) lstat(&(0x7f0000000100)='.\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000480)={'TPROXY\x00'}, &(0x7f00000004c0)=0x1e) syz_open_dev$ndb(&(0x7f0000000340)='/dev/nbd#\x00', 0x0, 0x80240) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getgroups(0x3, &(0x7f0000000300)=[0xee01, 0x0, 0xee01]) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000400)={{0x0, r3, r4, r5, r6, 0x4, 0x2}, 0x1, 0xad4e, 0x1}) 14:49:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xc) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) [ 260.480311] JFS: discard option not supported on device [ 260.513729] jfs: Unrecognized mount option "smackfsdef=./cgroup.cpu/syz1" or missing value 14:49:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x1d5) ioctl$NBD_DISCONNECT(r2, 0xab08) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="fb4dab06358cdd3577781fa6567c328f68de05a2dee91ffe05bacd83424dae3d369598aa7d7c16d4e63f5752998a31844b113f575bbb751f437921b8527ec84cf8fc9943d2", 0x45) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:17 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfl\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0xfffdfffffffffffd, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:18 executing program 3 (fault-call:2 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:18 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='discard,nodiscard,quota,smackfsdef=./cgroup.cpu/syz1\x00,smackfsdef=./cgroup.cpu/syz1\x00,fowner=', @ANYRESDEC, @ANYBLOB="2c8075626a5f7479704171be37e8b295061f5c653d6367726f75702c7365636c6162656c2c7569643e", @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB=',euid=', @ANYRESDEC, @ANYBLOB=',\x00']) 14:49:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000040)=0x7f) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000080)={'veth1\x00', @dev={[], 0xe}}) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="9e8e62c25f44f11f0556464a96aa349050f65b40b4b2f96a5f0a9898d780892073142cad751afbaf8da5bfe5ca05720add560d3d1eb214c018c2703cf39fcc8c3fd4b175d0350fb66b5587aa773373b0f9748abb1c807a235ec4e190af47656569a2b986b6cf7662138032aec5a2963c98bf810be41a649c2e0ceeec8633fcb09557c7723a5b913d5c423133fb68904cc1c1d2394918219c60", 0x99) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xc002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) write$cgroup_pid(r1, &(0x7f0000000280)=r2, 0x12) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), &(0x7f00000001c0)=0x4) [ 260.810122] JFS: discard option not supported on device [ 260.824335] jfs: Unrecognized mount option "smackfsdef=./cgroup.cpu/syz1" or missing value 14:49:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x57) 14:49:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) fstatfs(r0, &(0x7f0000000280)=""/4096) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001880)='/dev/sequencer\x00', 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) getsockopt$packet_int(r1, 0x107, 0x1f, &(0x7f00000018c0), &(0x7f0000000140)=0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000000)=0x7, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000180)={0x1, 0x0, {0xffffffffffffffff, 0x2, 0x100000000, 0x2, 0x8}}) 14:49:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfp\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000180)={@loopback, @loopback, 0x0}, &(0x7f00000001c0)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@loopback, 0x7a, r2}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x202, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x47100000000000) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r4, 0xc00c55ca) 14:49:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x200003d8) 14:49:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x4b) sched_yield() bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 260.979023] Unknown ioctl 35090 [ 260.998646] Unknown ioctl 35090 14:49:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="567a8d1292fc704bbb863ddb6f25bb78cfc9ddabb3b53269aba4f697f952fa9ae39d140100", 0x25) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:18 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xff) r1 = fcntl$getown(r0, 0x9) getpriority(0x0, r1) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r2, 0xc00c55ca) 14:49:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x10000) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x12d4}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={r2, 0xe3, 0x1, [0xffffffffffffffff]}, 0xa) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:18 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-des3_ede-asm\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) bind$alg(r2, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x8, 0x40) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100), 0x4) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfc\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x14) 14:49:18 executing program 0: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x3, &(0x7f0000000180)=[{&(0x7f0000000080)="47b0c3bded3e", 0x6}, {&(0x7f0000000280)="2a270f83827798976df2969c10399343eebd184a35b1698aa9007fe7c074fa1aea3de8499b5c7a3ee6a6cbdc4d659a6ce951473859c3e544b2b0929c710d99a3ebd6c77992efcea8e533a21ff1f06c9c2abe26f6dc573fa7dd92417d401c57054f44c133dfe228ac597feb490dbcfb4ce969722c4ce95b2d187ba5c06d53bc849518a72c7a8d1b48034eebd802c13737d51534176598ebc80725fdc572e17dd58f2cf7b02f9116355be9ef469e41ee9bdf1c1768f09345db6902c4f432388490ad11dfadd84613b53097", 0xca, 0x3e}, {&(0x7f00000000c0)="94fc9c0c97de4fdf14771a2f9a4fe2a0a80082b8b597e2b05f1c52a2182364b8c6c60c2076851328bcf0a2903f257815edbf212a9d0cea19931649b0", 0x3c, 0x6}], 0x10001, 0x0) socketpair$unix(0x1, 0x400005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x10000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x27a) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-aesni\x00'}, 0x37) 14:49:18 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 261.404598] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 14:49:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r2, 0xc00c55ca) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) ioctl$NBD_DISCONNECT(r3, 0xab08) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="240000000300040000000000000000000600000000090000030000000400000047404c00"], 0x24) 14:49:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:18 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80000001, 0x220000) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18, 0x1, 0x0, {0xfffffffffffffffb}}, 0x18) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x6, 0x22000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3e2d) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0x7, 0x4d, 0x1}, 0x7) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfd\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) write$smack_current(r2, &(0x7f0000000080)='/dev/uinput\x00', 0xc) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U-', 0xffffffffffff7fff}, 0x28, 0x2) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f00000000c0)={0x0, 0x640}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e23, 0x8, @loopback, 0x9}}, 0x5d, 0x1ff, 0xfffffffffffffffc, 0x7, 0x28}, &(0x7f00000002c0)=0x98) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000300)={r3, 0x2, 0xfa28}, 0x10) 14:49:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = syz_open_dev$mouse(&(0x7f0000001740)='/dev/input/mouse#\x00', 0x1f, 0x600100) sendto$unix(r1, &(0x7f0000001780)="3e6bdebb67ffa256f00ee4f317701d83caed305f15c26b44a2e54097718e5e5113236a447fb03b7a6ae21b91a8ea2a2b632ce79e36510ab47659ebea8fb238e18261e43c9729ec9407710171f5820b1092c78aea4fa478a2ccb4e014659b3927", 0x60, 0x40080d4, &(0x7f0000001800)=@file={0x1, './file0\x00'}, 0x6e) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000080)) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000140)={r1, 0x3, "9fe87c"}, &(0x7f0000000180)=0xb) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x3, 0x80, 0x9}) 14:49:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7, 0x40) recvfrom$llc(r1, &(0x7f00000000c0)=""/204, 0xcc, 0x10000, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000280)={{0x2, 0x4e20, @remote}, {0x1, @broadcast}, 0x20, {0x2, 0x4e21, @multicast2}, 'ip6gretap0\x00'}) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000001c0)={0x0, @speck128, 0x0, "34f6e745cf33f661"}) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000200)={0x81, 0x69, 0xb26, 0x7f, 0xfffffffffffff578, 0x9}) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000240)={0x39, @loopback, 0x4e21, 0x4, 'rr\x00', 0x10, 0xb7, 0x51}, 0x2c) 14:49:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:19 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x804, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000700)={@empty, 0x36, r2}) 14:49:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x2bc) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x95e4, 0x420080) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000400)=@security={'security\x00', 0xe, 0x4, 0x360, 0x1a8, 0x0, 0xc0, 0x1a8, 0x1a8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x2c8, 0x4, &(0x7f0000000040), {[{{@ip={@empty, @broadcast, 0xffffffff, 0xffffffff, 'veth1_to_bond\x00', 'bond_slave_0\x00', {0xff}, {}, 0xff, 0x2, 0x4}, 0x0, 0x98, 0xc0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x100}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x0, 0x1}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x2, 0x20}}}, {{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@unspec=@cpu={0x28, 'cpu\x00', 0x0, {0x5}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@ipv4={[], [], @multicast2}, [0xffffffff, 0xffffffff, 0xff, 0xffffff00], 0x4e22, 0x4e21, 0x4e20, 0x4e21, 0x4, 0xfffffffffffffff8, 0x7, 0x6, 0xff}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c0) 14:49:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:usb_device_t:s0\x00', 0x22, 0x1) 14:49:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x200800, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x200080, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x8}) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000080)={r4, 0x0, 0x80}) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfX\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U+'}, 0x28, 0x2) 14:49:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x4000, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000000c0)={0x8, 0x40, 0x1, 0x2, 0x4, 0x2, 0x1, 0x5, 0x4, 0x6}) 14:49:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="9e8e62c25f44f11f0556464a96aa349050f65b40b4b2f96a5f0a9898d780892073142cad751afbaf8da5bfe5ca05720add560d3d1eb214c018c2703cf39fcc8c3fd4b175d0350fb66b5587aa773373b0f9748abb1c807a235ec4e190af47656569a2b986b6cf7662138032aec5a2963c98bf810be41a649c2e0ceeec8633fcb09557c7723a5b913d5c423133fb68904cc1c1d2394918219c60", 0x99) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xc002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) write$cgroup_pid(r1, &(0x7f0000000280)=r2, 0x12) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 14:49:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = getpid() r2 = dup(r0) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x1, 0x6, 0x8, 0x3f, 0x0, 0x8, 0x1000, 0x8, 0xfffffffffffffff9, 0x9, 0x4, 0x8, 0x100000001, 0x6231ad80, 0x3, 0xcc9, 0xfffffffffffffffb, 0x80000000, 0x1, 0x0, 0x5, 0x5, 0x62fd, 0x4, 0xfff, 0xfffffffeffffffff, 0x3, 0x5, 0x24, 0x3, 0x8, 0x400, 0x1, 0x1, 0x1, 0x6, 0x0, 0x1000, 0x1, @perf_bp={&(0x7f0000000100), 0xb}, 0x2000, 0x7, 0x1, 0x5, 0x6, 0x4, 0x7}, r1, 0x7, r2, 0x2) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x400, 0x100) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f00000000c0)) 14:49:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = dup2(r0, r0) ioctl$TIOCNOTTY(r1, 0x5422) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) ioctl$FICLONE(r0, 0x40049409, r2) ioctl$UI_DEV_CREATE(r2, 0xc00c55ca) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1ff, 0x0) 14:49:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101100, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x1bb8}, 0x4) 14:49:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) 14:49:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="fb4dab06358cdd3577781fa6567c328f68de05a2dee91ffe05bacd83424dae3d369598aa7d7c16d4e63f5752998a31844b113f575bbb751f437921b8527ec84cf8fc9943d2", 0x45) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = dup2(r0, r0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000280)="d8e9918ca2dbf4d8f6f5f4ca24facdda18ec589c24392289164bacc30c3ea213b244782e903a78cb77a74a0b4f298cd523fdc01ee6aa6522bfb1a220eb507f990066e27c1590b95c0627dff3ad8e13758ba74d2d555e14ad2702ae031eaa5a0836de1eaf8809d3c25408dde2d7d065e79cddd8622cdc4ab49dc3e72b0e09161fa288cd29e8d5baf811124919342b446704e2f6264e76acd003b45dcc27219bafc714e92eedd99f73f007dc26e4c97e6380183bcd04bb542f8c7a8366ae8ac8ad37078ba1c32868d1bc1412a49b43d764a67c66907074ba48b41c3ad3c363c17e855b4185d58c7e5c38aff3", 0xeb) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000240)) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', r3}) 14:49:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfu\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0xf) 14:49:19 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x5, 0x2000) accept4$unix(r0, &(0x7f00000003c0)=@abs, &(0x7f0000000440)=0x6e, 0x80800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) r3 = dup(r1) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000080)=""/125) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x2, 0x8, 0x7, 0x12a, 0x80}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000300)={r4, 0x401}, &(0x7f0000000340)=0x8) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r2, 0xc00c55ca) getgid() getgroups(0x7, &(0x7f0000000000)=[0xee01, 0x0, 0x0, 0x0, 0xee01, 0xee00, 0xffffffffffffffff]) setregid(r5, r5) read(r3, &(0x7f0000000180)=""/159, 0x9f) 14:49:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') fcntl$getown(r0, 0x9) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8040, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x3, 0x11, 0x1, r3}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{0xf000, 0x0, 0xd, 0x1, 0x1f, 0x2938e00d, 0x4, 0x7, 0x4, 0xb996, 0x20, 0x9}, {0x5000, 0x4000, 0x0, 0x28a8, 0x2, 0x10000, 0x401, 0xa1, 0x7ff, 0xfa34, 0x7, 0x100}, {0x1, 0x13000, 0xf, 0x8, 0x38b2, 0x31c3, 0x10001, 0x8, 0x2, 0x5, 0x1000, 0x7f}, {0x11000, 0xd000, 0xa, 0x3e5, 0x2, 0x5, 0x26, 0xa6, 0x6, 0x0, 0x40, 0x5}, {0x2000, 0x10d005, 0x13, 0x8, 0x5, 0x7, 0x7, 0x8, 0x4, 0x80000000, 0x8, 0x7f}, {0xd004, 0xf001, 0x9, 0xf46d, 0xcee7, 0x8, 0x4, 0x7, 0xfffffffffffffff7, 0x0, 0x9, 0x2}, {0x6000, 0x4000, 0xb, 0x1000, 0x40, 0x7fff, 0x5, 0xb1, 0x2, 0x0, 0x100000000, 0x7}, {0x10000, 0x5004, 0xf, 0x1ff, 0xb9, 0x2, 0x4, 0xfa, 0x7, 0xf10, 0x40, 0xbb3}, {0x1001, 0x2}, {0xf000, 0x5000}, 0x80000000, 0x0, 0xf005, 0x200080, 0x7, 0x2400, 0xf000, [0x4, 0x2, 0x0, 0x3ff]}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)=0x3) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r5, 0xad}}, 0x18) ioctl$ION_IOC_HEAP_QUERY(r4, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="fb4dab06358cdd3577781fa6567c328f68de05a2dee91ffe05bacd83424dae3d369598aa7d7c16d4e63f5752998a31844b113f575bbb751f437921b8527ec84cf8fc9943d2", 0x45) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10001, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000040), 0x4) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:19 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x101001, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0xe26ce07874c62dc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 14:49:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101100, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x1bb8}, 0x4) 14:49:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffffffffffff6df4, 0x80) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000180)={0x7fffffff, @broadcast}) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x3ff) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x2b, 'io'}, {0x2b, 'memory'}, {0x2b, 'pids'}, {0x0, 'io'}]}, 0x16) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000001c0)={0x3, 0x0, [], {0x0, @reserved}}) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$TCFLSH(r0, 0x540b, 0x6) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) r3 = fcntl$dupfd(r0, 0x406, r0) write$P9_RREMOVE(r3, &(0x7f0000000000)={0x7, 0x7b, 0x1}, 0x7) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640\x00'}, 0x58) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128-generic\x00'}, 0x84) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x5, 0x404500) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000340)={r1, r1}) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000200)={{0x60a1f00000000000, 0x6, 0x2, 0xffff}, 'syz1\x00', 0xa}) getsockname$packet(r1, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000009c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000300)={'team0\x00'}) r2 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f00000001c0)=0x1, 0x8) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x2, 0x1}, {0x10001, 0xd96a}]}, 0x14, 0x3) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000140)={0xa, 0xffffffffffff0000, 0x1, 0x6}, 0xa) 14:49:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xf\n\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:20 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 262.717998] FAULT_INJECTION: forcing a failure. [ 262.717998] name failslab, interval 1, probability 0, space 0, times 0 [ 262.729796] CPU: 0 PID: 10559 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 262.738395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.747764] Call Trace: [ 262.750372] dump_stack+0x244/0x39d [ 262.754012] ? dump_stack_print_info.cold.1+0x20/0x20 [ 262.759207] ? lock_downgrade+0x900/0x900 [ 262.763374] should_fail.cold.4+0xa/0x17 [ 262.767433] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.772521] ? lock_downgrade+0x900/0x900 [ 262.776655] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 262.782176] ? proc_fail_nth_write+0x9e/0x210 [ 262.786653] ? proc_cwd_link+0x1d0/0x1d0 [ 262.790699] ? find_held_lock+0x36/0x1c0 [ 262.794753] ? perf_trace_sched_process_exec+0x860/0x860 [ 262.800216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.805738] __should_failslab+0x124/0x180 [ 262.809965] should_failslab+0x9/0x14 [ 262.813759] __kmalloc+0x2e4/0x760 [ 262.817297] ? strncpy_from_user+0x5a0/0x5a0 [ 262.821697] ? fput+0x130/0x1a0 [ 262.825005] ? do_syscall_64+0x9a/0x820 [ 262.828982] ? __x64_sys_memfd_create+0x142/0x4f0 [ 262.833838] ? do_syscall_64+0x9a/0x820 [ 262.837826] __x64_sys_memfd_create+0x142/0x4f0 [ 262.842491] ? memfd_fcntl+0x1910/0x1910 [ 262.846537] do_syscall_64+0x1b9/0x820 [ 262.850406] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 262.855751] ? syscall_return_slowpath+0x5e0/0x5e0 [ 262.860661] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.865502] ? trace_hardirqs_on_caller+0x310/0x310 [ 262.870500] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 262.875496] ? prepare_exit_to_usermode+0x291/0x3b0 [ 262.880496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.885390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.890567] RIP: 0033:0x457679 [ 262.893753] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.912661] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 262.920385] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457679 [ 262.927631] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc816 [ 262.934891] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 262.942153] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc04b0f16d4 [ 262.949407] R13: 00000000004c55ae R14: 00000000004d9b68 R15: 0000000000000003 14:49:20 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4c000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0xfffffd2a) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'os2.', 'salsa20-generic\x00'}, &(0x7f0000000180)=""/39, 0x27) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfffffbff) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) ioctl$sock_netdev_private(r0, 0x89f1, &(0x7f0000000080)="6b9012f1b7efe9c75dbe1b8465ebc61eb27a183b12c2b685221b8f69c3252816b8d1e1b9360cd3bb4c1dded3bdd55bc42e93cf8aa4248fce7b08f61e706f2f16d7b8f8526f6d0f427e36939df28cdee94a8f3fcee0dddb177d5493cb5adbb97d0a02b54dc5db8fa04386d88a8879700e6c1753f9f3a4d7d36e95262a057def032900551d13d34422a4a3c87ff2ee835fce7af57665613482f8b947b03be97b67d29b1e90") bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:20 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xf+\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) [ 263.250138] FAULT_INJECTION: forcing a failure. [ 263.250138] name failslab, interval 1, probability 0, space 0, times 0 14:49:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) [ 263.320164] CPU: 0 PID: 10588 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 263.328749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.338110] Call Trace: [ 263.340693] dump_stack+0x244/0x39d [ 263.344387] ? dump_stack_print_info.cold.1+0x20/0x20 [ 263.349568] should_fail.cold.4+0xa/0x17 [ 263.353618] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.358705] ? find_held_lock+0x36/0x1c0 [ 263.362752] ? graph_lock+0x270/0x270 14:49:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x100, 0x0) recvfrom$llc(r1, &(0x7f0000000180)=""/48, 0x30, 0x40000000, &(0x7f00000001c0)={0x1a, 0x309, 0x401, 0xd9, 0xff, 0x4, @local}, 0x10) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x600000, 0x0) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f0000000100)=0x20) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000000c0)={{0x0, 0x1, 0x7, 0x0, 0xfffffffffffffff8}}) [ 263.366564] ? __lock_acquire+0x62f/0x4c20 [ 263.370795] ? lock_downgrade+0x900/0x900 [ 263.374950] ? check_preemption_disabled+0x48/0x280 [ 263.379988] ? find_held_lock+0x36/0x1c0 [ 263.384105] ? expand_files.part.8+0x571/0x9a0 [ 263.388691] ? perf_trace_sched_process_exec+0x860/0x860 [ 263.394149] ? find_held_lock+0x36/0x1c0 [ 263.398220] __should_failslab+0x124/0x180 [ 263.402473] ? shmem_destroy_callback+0xc0/0xc0 [ 263.407150] should_failslab+0x9/0x14 [ 263.410974] kmem_cache_alloc+0x2c4/0x730 [ 263.415143] ? shmem_destroy_callback+0xc0/0xc0 14:49:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-aesni\x00'}, 0xffffffffffffff08) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x8) 14:49:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x221d3deaaff301e5, 0x0) [ 263.419827] shmem_alloc_inode+0x1b/0x40 [ 263.423938] alloc_inode+0x63/0x190 [ 263.427574] new_inode_pseudo+0x71/0x1a0 [ 263.431651] ? prune_icache_sb+0x1c0/0x1c0 [ 263.435884] ? _raw_spin_unlock+0x2c/0x50 [ 263.440036] new_inode+0x1c/0x40 [ 263.443403] shmem_get_inode+0xf1/0x920 [ 263.447386] ? shmem_encode_fh+0x340/0x340 [ 263.451635] ? lock_downgrade+0x900/0x900 [ 263.455792] ? lock_release+0xa00/0xa00 [ 263.459783] ? perf_trace_sched_process_exec+0x860/0x860 [ 263.465251] ? usercopy_warn+0x110/0x110 14:49:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) r1 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x1, 0x4000) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x44) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4d00, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000600)=""/133) bind$bt_sco(r2, &(0x7f0000000180)={0x1f, {0xffffffff, 0x46, 0x0, 0x1ff, 0x6, 0x5}}, 0x8) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) [ 263.469327] __shmem_file_setup.part.50+0x83/0x2a0 [ 263.474293] shmem_file_setup+0x65/0x90 [ 263.478286] __x64_sys_memfd_create+0x2af/0x4f0 [ 263.482956] ? memfd_fcntl+0x1910/0x1910 [ 263.487043] do_syscall_64+0x1b9/0x820 [ 263.490975] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 263.496340] ? syscall_return_slowpath+0x5e0/0x5e0 [ 263.501299] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.506134] ? trace_hardirqs_on_caller+0x310/0x310 [ 263.511160] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 263.516199] ? prepare_exit_to_usermode+0x291/0x3b0 [ 263.521208] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.526049] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.531227] RIP: 0033:0x457679 [ 263.534422] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.553313] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 263.561047] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457679 14:49:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x80000001, 0x6, 0x0, 0xd6, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x1f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) [ 263.568310] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc816 [ 263.575564] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 263.582846] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc04b0f16d4 [ 263.590096] R13: 00000000004c55ae R14: 00000000004d9b68 R15: 0000000000000003 14:49:21 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000040)={'team_slave_1\x00', 0x8}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="fdc7b1b996c0b6ec361d231bd69cd414d9ec03a7a85130a4a194864991b90d9e4bc7280fc0f0ee5bd5ccbf91be9ef0d45d97b5ea78cccdb4e4db9c36d17e2943", 0x40) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xf-\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:21 executing program 0: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x7ff}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000001c0)={r1, 0x40}, &(0x7f0000000200)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) sysfs$3(0x3) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0600, 0x0) ioctl$VIDIOC_G_CROP(r4, 0xc014563b, &(0x7f0000000040)={0x4, {0x6634, 0x80000000, 0x101, 0xfd}}) 14:49:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000100)={0x4}) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f00000000c0)={0x8000222, 0x401, 0xede8}) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r1, &(0x7f0000000080)="9e737f535b7917454dfc60d83d8bf384d72f40339877204f6bf072758f2f4ce8227c378da2828af9a0cba14dcc50b7c151ce042e3cb8c1384d2c8fa14b9694129ba15d7788f8960c77d30a13d27e912bbce5ce701b6862998802"}, 0x10) fcntl$setflags(r2, 0x2, 0x1) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) ioctl$UI_DEV_CREATE(r2, 0xc00c55ca) [ 263.787582] FAULT_INJECTION: forcing a failure. [ 263.787582] name failslab, interval 1, probability 0, space 0, times 0 [ 263.880318] CPU: 1 PID: 10641 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 263.888918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.898298] Call Trace: [ 263.900933] dump_stack+0x244/0x39d [ 263.904593] ? dump_stack_print_info.cold.1+0x20/0x20 [ 263.909839] should_fail.cold.4+0xa/0x17 [ 263.913915] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.913930] ? __kernel_text_address+0xd/0x40 [ 263.913960] ? unwind_get_return_address+0x61/0xa0 [ 263.913994] ? find_held_lock+0x36/0x1c0 [ 263.923620] ? perf_trace_sched_process_exec+0x860/0x860 [ 263.923647] __should_failslab+0x124/0x180 [ 263.923662] should_failslab+0x9/0x14 [ 263.923678] kmem_cache_alloc+0x2c4/0x730 [ 263.923694] ? mpol_shared_policy_init+0x235/0x650 [ 263.932670] ? current_time+0x72/0x1b0 [ 263.932703] __d_alloc+0xc8/0xb90 [ 263.932733] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 263.932766] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 263.972621] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 263.977834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.983397] ? timespec64_trunc+0xea/0x180 [ 263.987649] ? inode_init_owner+0x340/0x340 [ 263.991972] ? _raw_spin_unlock+0x2c/0x50 [ 263.996294] ? current_time+0x10b/0x1b0 [ 264.000292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.005854] ? __lockdep_init_map+0x105/0x590 [ 264.010380] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 264.015940] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 264.021483] d_alloc_pseudo+0x1d/0x30 [ 264.025292] alloc_file_pseudo+0x158/0x3f0 [ 264.029534] ? alloc_file+0x4d0/0x4d0 [ 264.033393] ? usercopy_warn+0x110/0x110 [ 264.037502] __shmem_file_setup.part.50+0x110/0x2a0 [ 264.042528] shmem_file_setup+0x65/0x90 [ 264.046512] __x64_sys_memfd_create+0x2af/0x4f0 [ 264.051185] ? memfd_fcntl+0x1910/0x1910 [ 264.055268] do_syscall_64+0x1b9/0x820 [ 264.059160] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.064530] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.069465] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.074312] ? trace_hardirqs_on_caller+0x310/0x310 [ 264.079335] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 264.084389] ? prepare_exit_to_usermode+0x291/0x3b0 [ 264.089442] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.094295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.099486] RIP: 0033:0x457679 [ 264.102682] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.121599] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 14:49:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = socket(0x3, 0x80a, 0x1) sendmsg$nfc_llcp(r1, &(0x7f00000026c0)={&(0x7f0000000080)={0x27, 0xfffffffffffffffd, 0x0, 0x3, 0x5, 0x9, "65c9a9db89355b5b2a80f9a4d0e106d02ca1a17e1b3e63a07e750fb312ca303092a2860627e04a64aa2c196397a38ed62ce363f381d0978f58d17536caf98d", 0x5}, 0x60, &(0x7f0000002540)=[{&(0x7f0000000100)="9e5baff52dec7e2129d16e7148617f299d1b48c07ac77869ff97227ae3cc714e9a5dd170f0e00258053a12ef0c04a951d48a5efb13d16c5a0ab7fa565f5c0d90e104178dd59840b86e375244d034587f1737bd4565fc93cd43e5525edfda61ed83671617ec03045622de4d1b62161161ca5acb6c9460e8cfa8fc09ea7a940c439fabe6941244bbc950d144b2b6995caddb08201d0695058b118b9ef1b070745368bd56f07401923d619c7bff", 0xac}, {&(0x7f00000001c0)="5e6aa3b91ec1dc6daf95d70e634fa18b4f0b8cb42ba282c3b6d1521fa860c05fe2fcc793b5b5828cc216b9c07cbaea56601028fd9139fbc38e23c8b7d44362e6", 0x40}, {&(0x7f0000000200)="14ffcba49a886217f138d75f04195f7740c6ccad3677c7356618f29b941e710153d89bf736b360aed651709ff4995ac2056ac6c619e502fb", 0xff05}, {&(0x7f0000002800)="e883512dc4385d6e0ac47a7a2d33a7535f3e1cfd8e02d4328e309aa670a1e1a5d7a3bb873a83fcdf4536c1718439485c8493bb60c1edcc6ab4da88768ec6be7d593a6f923bfef5caebfa35a8bd575317bc340e3a5c1938054676209d20b4370376547943e23364bd7a36ce2ef438baffd9463c92d6561800a149f10da25c3ffa9da9d49dbf6251ae41e7b5a205095fda9ee956d57898c7854930cd1bcf18082ca9b67f99316d14a8c27c4c6209a2e280edcfafdac0d5995d8e7d4eb61dec67bfdad426b3973f8610553729bae50c57dd14092490a0537be7257d8430c96759885b4fb2245ac0a5907588bfac23919198eb4065ff77d27f7a3d", 0xf9}, {&(0x7f0000000400)="c44e54c7805307638bf3970c4ccc41c54d60bbb4134c1bf5bb9b6541d1fe464a12bc8c79c99508158b015042e83e9f2d7a4940d871834117372fb1e85d666093e0f582a9dcae30d7a9826894e21dda1f9909a98befa8d5cd63abeed5cc43ff70bbac6357c10d089899572c0972a081d8977714931007357e5b6f09fcfd32a505813808ee57595d73501cbb15936f8dd760013b1a5b8b2d3cb3d64e54b3970a93ef216b75ecffb3b1a0e42d286e19d8ca25b9939d38ec552a7fc58058648bcc1ea7bc587cdd9aaab8fadddc2e621a8fd9540f9cd8332e3de30a88b388a29399c635e404561e7273c849be155754d4125c3f2d", 0xf2}, {&(0x7f0000000340)="ab5b3ed9866328532c5912cccbf151f8ce3c2c", 0x13}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="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", 0x1000}, {&(0x7f0000002500)="6cdcca61bd05005d72f98dca43bdd39d3d5c", 0x12}], 0x9, &(0x7f0000002600)=ANY=[@ANYBLOB="a800000000000000030100000800000091fb52db715b55a570b7247a64bf14a79a76da49dc8c479a8aa789051117f5d22e5d9d7e56f0085a76623263dd6635df4c42ba0f33e15cc3e8b24c10deb9f2bc1fd90b6482ec7cebba5bad2b13a3b29f6900fadaec39afbe5a6950736455a1d44391547c146c619d57b2fb97428c36f22011aef32da64dc30c8306c6acaf1e065c5c9caef355d3da14963e245865a672afd76facfb56c389"], 0xa8, 0x4000004}, 0x20000040) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r2 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x101, 0x40100) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000280)) ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f0000002700)={0x36d, "a173b1521c84fec55e46685660a3654d87f9cf48bd8fb67364eab048a22ecd3a", 0x0, 0x2c, 0x283, 0x0, 0x6}) 14:49:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x45baa93997ddaca6) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x20000000000, 0x101000) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0)={0x36}, 0x4) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000b00)={0x0, 0x110000}) recvmsg$kcm(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000180)=""/237, 0xed}, {&(0x7f0000000280)=""/115, 0x73}, {&(0x7f0000000300)=""/67, 0x43}, {&(0x7f0000000400)=""/8, 0x8}, {&(0x7f0000000440)=""/146, 0x92}, {&(0x7f0000000500)=""/220, 0xdc}], 0x6, &(0x7f0000000680)=""/156, 0x9c}, 0x40002000) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x2, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000b80)={@empty, 0x0}, &(0x7f0000000bc0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'gre0\x00', r3}) connect$can_bcm(r2, &(0x7f0000000140)={0x1d, r4}, 0xfffffffffffffeff) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) recvmsg$kcm(r1, &(0x7f0000000b40)={&(0x7f0000000780)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000800)=""/196, 0xc4}, {&(0x7f0000000900)=""/246, 0xf6}, {&(0x7f0000000a00)=""/176, 0xb0}], 0x3, &(0x7f0000000b00)}, 0x40002043) 14:49:21 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:21 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r2, 0xf}}, 0x10) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 264.129334] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457679 [ 264.136615] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc816 [ 264.143883] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 264.151855] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc04b0f16d4 [ 264.159122] R13: 00000000004c55ae R14: 00000000004d9b68 R15: 0000000000000003 14:49:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xf.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x3) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x3c) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x4}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000080)={r2, 0x1, 0xb1, "a38bffa0b4eebcec27c1580c0ab8449cb9297adf5b01ea1132fe2af785575fc2a0040ce8f431fd21f82937a13c39d6e5d0752852fed1bbbfe5676b5b2b8c763aa7d280bbca1a669037cec8c01736e4b1b36ed86b6a3b2bf04ef1f60952cceef5302a145f4cc713d1886d37cf055b362dcda2e96e6a8c2b3b9212c6915d09c647634c3e80e0da437e8b5073f1eabf067b7359ee51e70035d08ba2f5f34d960ef3529c4cae6b7cd5dd64c21b48b048cd0ba3"}, 0xb9) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 264.288690] FAULT_INJECTION: forcing a failure. [ 264.288690] name failslab, interval 1, probability 0, space 0, times 0 [ 264.303690] CPU: 0 PID: 10695 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 264.312274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.321625] Call Trace: [ 264.324227] dump_stack+0x244/0x39d [ 264.327862] ? dump_stack_print_info.cold.1+0x20/0x20 [ 264.333048] ? __save_stack_trace+0x8d/0xf0 [ 264.337391] should_fail.cold.4+0xa/0x17 [ 264.341492] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.346600] ? save_stack+0x43/0xd0 [ 264.350248] ? kasan_kmalloc+0xcb/0xd0 [ 264.354182] ? graph_lock+0x270/0x270 [ 264.357994] ? find_held_lock+0x36/0x1c0 [ 264.362083] ? __br_vlan_set_proto+0x908/0xa10 [ 264.366689] ? perf_trace_sched_process_exec+0x860/0x860 [ 264.372141] ? lock_downgrade+0x900/0x900 [ 264.376298] __should_failslab+0x124/0x180 [ 264.380535] should_failslab+0x9/0x14 [ 264.384361] kmem_cache_alloc+0x2c4/0x730 [ 264.388523] ? d_set_d_op+0x31d/0x410 [ 264.392359] __alloc_file+0xa8/0x470 [ 264.396075] ? file_free_rcu+0xd0/0xd0 [ 264.399961] ? d_instantiate+0x79/0xa0 [ 264.403864] ? lock_downgrade+0x900/0x900 [ 264.408015] ? kasan_check_read+0x11/0x20 [ 264.412164] ? do_raw_spin_unlock+0xa7/0x330 [ 264.416562] ? do_raw_spin_trylock+0x270/0x270 [ 264.416578] alloc_empty_file+0x72/0x170 [ 264.416593] alloc_file+0x5e/0x4d0 [ 264.416611] ? _raw_spin_unlock+0x2c/0x50 [ 264.416627] alloc_file_pseudo+0x261/0x3f0 14:49:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000040)=0x581f, 0x2) 14:49:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000440)=[{{&(0x7f00000000c0)=@tipc=@name={0x1e, 0x2, 0x3, {{0x40, 0x1}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="a580ce9e40757ab1359994588f7badeeca4c5708dff643465bff8a4bb43b8d3524da54c4a8e97960d6ceff931b7ab2c9b65217865fee06a42ffdaff8152790d17cf928a5114bde1a2f1ed990922de1cee6abde9131cd1108d406cefe5e0a30e7ff017ab3e64b7bfaf8aebb77", 0x6c}], 0x1}, 0x9}, {{&(0x7f0000000280)=@vsock={0x28, 0x0, 0xffffffff, @reserved}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000300)="29b2d00f0ac8c849cf2a1c7eaaedb2ec48c3bf11b245273e7963b4f414a0b331703c8a67571b61278f8b3efa80b853f278d7f6b296cf0c011a9e6c123f81110400156449663f3e1d44ad5fd410416275464faec1191e8bb41086c7f04f7b79ed4ad4009fab57d75773b40233b978835076aaddd3249cf608b5411569e5e8596947e81bc1367c3ba74497bbc2af5f77a29d70d0e1c177b7872d193ddcf5124187870c343bb4ae31ec16bcf9f139e72926265d77a13de28d96957abc168e77978265777523d42ee9db51fb383b1f9172cd2c1035b071347eff08e0b23296a86271116736a3cd119786130687ef5bc7d273fb3189", 0xf3}], 0x1}, 0xfffffffffffffff7}], 0x2, 0x4) r1 = socket$inet(0x2, 0x5, 0x10000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @loopback, @remote}, &(0x7f0000000040)=0xc) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={r2, @dev={0xac, 0x14, 0x14, 0xe}, @loopback}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400203) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x80000, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000040)={0x1, 0x100000001}, 0x2) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001400)='/dev/ptmx\x00', 0x801, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000001740)) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sendmsg$rds(r2, &(0x7f0000001700)={&(0x7f00000000c0)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f00000011c0)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/136, 0x88}], 0x2, &(0x7f00000015c0)=[@fadd={0x58, 0x114, 0x6, {{0x1, 0x2}, &(0x7f0000001200)=0x400, &(0x7f0000001240)=0x8000, 0x0, 0x8, 0x2, 0x83c, 0x4, 0x200}}, @mask_cswp={0x58, 0x114, 0x9, {{0x7, 0x10000}, &(0x7f0000001280)=0x5, &(0x7f00000012c0)=0x6, 0x5, 0x8, 0x3, 0x7, 0x1, 0xb6}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000001300)=""/54, 0x36}, &(0x7f0000001340), 0x14}}, @rdma_dest={0x18, 0x114, 0x2, {0x6, 0x3}}, @rdma_args={0x48, 0x114, 0x1, {{0x0, 0x4}, {&(0x7f0000001380)=""/102, 0x66}, &(0x7f0000001580)=[{&(0x7f0000001400)}, {&(0x7f0000001440)=""/81, 0x51}, {&(0x7f00000014c0)=""/61, 0x3d}, {&(0x7f0000001500)=""/104, 0x68}], 0x4, 0x40, 0x3}}], 0x140, 0x24040000}, 0x4008084) 14:49:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f00000000c0)={0x18, 0x0, 0x3, {0x7}}, 0x18) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) [ 264.437123] ? alloc_file+0x4d0/0x4d0 [ 264.440929] ? usercopy_warn+0x110/0x110 [ 264.445036] __shmem_file_setup.part.50+0x110/0x2a0 [ 264.450071] shmem_file_setup+0x65/0x90 [ 264.454049] __x64_sys_memfd_create+0x2af/0x4f0 [ 264.458720] ? memfd_fcntl+0x1910/0x1910 [ 264.462812] do_syscall_64+0x1b9/0x820 [ 264.466716] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.472080] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.477003] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.481850] ? trace_hardirqs_on_caller+0x310/0x310 14:49:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) prctl$PR_CAPBSET_READ(0x17, 0x21) [ 264.486885] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 264.491934] ? prepare_exit_to_usermode+0x291/0x3b0 [ 264.497018] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.501883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.507079] RIP: 0033:0x457679 [ 264.510286] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.529182] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 264.529195] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457679 [ 264.529203] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc816 [ 264.529211] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 264.529219] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc04b0f16d4 [ 264.529227] R13: 00000000004c55ae R14: 00000000004d9b68 R15: 0000000000000003 14:49:22 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:22 executing program 3: syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) getsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000100), &(0x7f0000000140)=0x4) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) [ 264.693912] FAULT_INJECTION: forcing a failure. [ 264.693912] name failslab, interval 1, probability 0, space 0, times 0 [ 264.716575] CPU: 0 PID: 10737 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 264.725175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.734533] Call Trace: [ 264.737142] dump_stack+0x244/0x39d [ 264.740805] ? dump_stack_print_info.cold.1+0x20/0x20 [ 264.746002] ? lock_downgrade+0x900/0x900 [ 264.750145] ? check_preemption_disabled+0x48/0x280 [ 264.750168] should_fail.cold.4+0xa/0x17 [ 264.759230] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.764369] ? is_bpf_text_address+0xd3/0x170 [ 264.768901] ? kernel_text_address+0x79/0xf0 [ 264.773339] ? __kernel_text_address+0xd/0x40 [ 264.777889] ? unwind_get_return_address+0x61/0xa0 [ 264.782823] ? __save_stack_trace+0x8d/0xf0 [ 264.787151] ? find_held_lock+0x36/0x1c0 [ 264.791241] ? gfs2_remove_from_journal+0x568/0xb80 [ 264.796277] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 264.801123] ? perf_trace_sched_process_exec+0x860/0x860 [ 264.806613] __should_failslab+0x124/0x180 [ 264.810853] should_failslab+0x9/0x14 [ 264.814650] kmem_cache_alloc_trace+0x2db/0x740 [ 264.819298] ? __might_sleep+0x95/0x190 [ 264.823295] apparmor_file_alloc_security+0x17b/0xac0 [ 264.828464] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 264.833980] ? apparmor_path_rename+0xcd0/0xcd0 [ 264.838629] ? __alloc_file+0xa8/0x470 [ 264.842501] ? rcu_read_lock_sched_held+0x14f/0x180 [ 264.847514] ? kmem_cache_alloc+0x33f/0x730 [ 264.851848] ? d_set_d_op+0x31d/0x410 [ 264.855650] security_file_alloc+0x4c/0xa0 [ 264.859863] __alloc_file+0x12a/0x470 [ 264.863640] ? file_free_rcu+0xd0/0xd0 [ 264.867505] ? d_instantiate+0x79/0xa0 [ 264.871376] ? lock_downgrade+0x900/0x900 [ 264.875508] ? kasan_check_read+0x11/0x20 [ 264.879635] ? do_raw_spin_unlock+0xa7/0x330 [ 264.884019] ? do_raw_spin_trylock+0x270/0x270 [ 264.888581] alloc_empty_file+0x72/0x170 [ 264.892624] alloc_file+0x5e/0x4d0 [ 264.896143] ? _raw_spin_unlock+0x2c/0x50 [ 264.900266] alloc_file_pseudo+0x261/0x3f0 [ 264.904480] ? alloc_file+0x4d0/0x4d0 [ 264.908262] ? usercopy_warn+0x110/0x110 [ 264.912318] __shmem_file_setup.part.50+0x110/0x2a0 [ 264.917314] shmem_file_setup+0x65/0x90 [ 264.921277] __x64_sys_memfd_create+0x2af/0x4f0 [ 264.925920] ? memfd_fcntl+0x1910/0x1910 [ 264.929970] do_syscall_64+0x1b9/0x820 [ 264.933834] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.939175] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.944079] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.948925] ? trace_hardirqs_on_caller+0x310/0x310 [ 264.953919] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 264.958911] ? prepare_exit_to_usermode+0x291/0x3b0 [ 264.963921] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.968761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.973927] RIP: 0033:0x457679 14:49:22 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000040)={0x0, 0x213, 0xb03, 0x401, 0x3}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:22 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfx\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x600000, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) 14:49:22 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x0, 0x4, 0x80000000) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f00000027c0)={{0x1ed, 0x5}, 0x40}, 0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0xc5) [ 264.977094] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.995983] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 265.003676] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457679 [ 265.010937] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc816 [ 265.018198] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 265.025457] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc04b0f16d4 [ 265.032715] R13: 00000000004c55ae R14: 00000000004d9b68 R15: 0000000000000003 sendmmsg$nfc_llcp(r1, &(0x7f0000004d40)=[{&(0x7f0000000080)={0x27, 0x0, 0x1, 0x4, 0x1, 0x6e, "dd1467a26f40c35fa0f07778f3df421849b548f5417a243ec25348193b26b9390e3825978341cb586d5127cf0aa78e65af0b6373c2f1df81d0d602ce0b08c5", 0x2f}, 0x60, &(0x7f00000001c0)=[{&(0x7f0000000180)="d3ffea96029df1030c5a1d8e397a2b", 0xf}], 0x1, &(0x7f0000000200)={0x38, 0x0, 0x0, "6304b400517ab1994574641724851e5d7c7c61d0e0ff450bcaa3f19ab3283fc32e"}, 0x38}, {&(0x7f0000000240)={0x27, 0x1, 0x0, 0x7, 0x8, 0xf5, "578344328413413e6f11b6851443dd4c416e85cb48f8b82d8f4aa563f8b5d922acd048dd032d99841042d405e07f718833002012242ad963510a97298c4114", 0x34}, 0x60, &(0x7f00000004c0)=[{&(0x7f00000002c0)='$:\t!', 0x4}, {&(0x7f0000000300)="f5508e499d357f2739be9ca0e12cba5c93b7322009541fcba8192bca66b2da60ae2848c5e0d9ae0ace1d7a2ce175a28a4e6462df37a9fd7cf497c691209f4b5543e995b60cd4d5c1e715c6f243c83ce6cd6ab403b204b1eb28cb475fdc80a44db26e74868630473022e0452c6e445a6996ab9c1df5d1221e0a3d3e4596b899e774f20e6f4b45aef2e19381404e87e3ebccadef4d212e1348df722b13e4e3d85e846e", 0xa2}, {&(0x7f00000003c0)="17e00b0e42f961a3c71060c45dc2f21bbb90784e04996dee372c339719f6e8303f5b8987c6", 0x25}, {&(0x7f0000000400)="239550086cb4aefe55be2698fb74af330caa914b3f2cf1db77142b2c9d57dcab777c4943674ecca7c449a48d9fb167997c1a4071c980edf86994424733b4a4e945b95486546c810c870f4f67bef2f468b9ccf7266b9ab7902b2ac73cfead4d01c2d1d604a0c64368aa33321ef5234258282291b803649feef11ad75141e584d131221d8e5ba4993354846f830a0de84baf148dcfc57a53278f19198d970c0bbe7d701bc5a54eb69ecfe68f25635a6a6a3098a282d1d15557", 0xb8}], 0x4, &(0x7f0000000500)={0xd8, 0x11, 0x9, "b67f999cd5fb501166a38461c21e5de5bad8b6b4638dd7678fcef73e4bb8f3ac5d6e05aaf1161bec662bd133dcceee39c930872613df58626c6225fc72a2387dad49b33c5d9456800fa523545d1af4764f4e777f51eff0724fd8bfa2ebbb03f082d06fdf0e2604b60b334cecd27c92292c17e30a6ad53bade3f5fd699049d49e85a34e942e36d8a5f9cc48f882358627d9519d653a3a165af4cab6a8cd8b659d40046fc851143c6c9c42df2cbf8af5d2f716c4f11cccfc3ec9488165567f95c5c4"}, 0xd8, 0x20000041}, {&(0x7f0000000600)={0x27, 0x0, 0x0, 0x5, 0x7, 0x1, "98de1e440d6a2e8f4ddab5ad9f8f3ce00dbae607e5b108fe5480ffde7d209fa9e9594daa4c36a671aabc38262d95c82afe042b506fdc69b915790033d62dd3", 0x3c}, 0x60, &(0x7f0000002940)=[{&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000001680)="4a8e1ffad2563389bf52d954e28aaf4150a1d7fcffe74c39d039cb72192f2fd3d5f37d25b6c0e4aeb0efb830f035d73aec3f39c00f049680", 0x38}, {&(0x7f00000016c0)="4b1791e290d70e670fd65812c7d14e94a75bdaf8a7a133d6167f61b0e758db63584f6b962ee41add69ccdabadd5b21d079d0e806036f0e2055b84fd5b56d669ecf58e5cf4426984904c646c2eb37d06299a39f4aa1f0da3570951adb339f14abc42cbb6dcccc94ff2101e50be3d1e65a3ce3e4c6807b79815d77c8e783aa07318d0fc0fae571c323c53eef5b41b7182dcb3980416fb970618b10f090129d42ab44449bc18734dbdcbe6fc617f3534523233704a1488203a55dd56e5ddad81121791b200997ea663bb3c76919dc33b6e6afe51431643f600568bb50f76c02d021e4dd156d8cd16ee50cf2a3c8c28223bdc91a56f0935a1ed945a9aff9cfbbc630817426b5590a968028f2f80003f6da60273313eb257e664a57efbfe6a503195d9a32772f96ea1927da692c2df1d726b81860d374279ed3654de1308aadd689f7ce3d30eb0a79335bd4c7603d44307e799008fa7bb36ca2f47e0698925234b794f36e0de12e46edd8910bdfded481cb5007f8ca258a162482a51a4dc24d32c4f38f5811a10244c57dec4f784c7a5846ce2bb96e201b40cabb8f47b87d831cdc671394a048bc150e15c87fa99821e61d2350cc377bf7b6197803c2f31fd4c12c22b5ae16e0963bb7ba4c7c00a9cf767c5b6a441c12673008e021bc7bb773b41cbbcc631d883210a039fbf6fbc824923182526babcd020f158886d1521bc9bbb44d82f049a67e2d1a8f3c11ce7d01d7850ddadc63b7acba440cdc1900491f5c41a77a1ea34c36b49e611cae2348a5f7dd6e3f25e2b97f38c11526c1b666fe2ba299d1478fa7491b1bf91c0ec6de3b9c8eb9e804156ad849b3f46ad95de099f97bca9022eb8a53c1d3b2cad6196064a0c85fefcd67b482621c0457f2bbc736b0e4249f728ef809a5f48d4f7fd52b1d6e033ec4785e141011651b353c252dbae0f616271089b347b48acf81d60aa3b4547f760bb2df4139974b7eabe35add383692e24f0c3a04478cb63b7ae8ced6f0ba1b68059975965b10bc153115638454d6a80a6b2b3e02832a54cd1e1018bc6f8be2e8f54da48d42a2722b49eb870e66663e75c6ee2d3302deecd4f74ce9466e0edfd8858791922882d37864aa6fa85613f9ff29fbe5fba212f6f7d44532dd7cd642f18c8f50088c97b9061d6ca6904b7518c14b54926e8bee1dce08ca8979e822e86cb42738220167f461a3cb07969a02cc102e0eb96e746ecadbe663d960d77359a3fda40d1009ba0b2ba18abdbf637efe639267fdfd9f9c89f76e831fac9e5d68fd8473e7b697dd0a416f7f0a8201a766d17bf464698d446c39e2957a695e3859871e218c3c1feaa808d61a695cd76ce872e518940d87266fdc898ac12f5e048699da1931c41b6b0e5b55c7aa1b09b5aeaac0173a78db208da964aa62dedc9aa5d3c3da4b5a434ee5e415d78e9cd94cf2f57d959561a250b83aabf384a9f4848a8f42fe6a24ea1c57ef97eb6cbe079b3194869b6728cde03c20f465543e1fd36f6344460d4c2baaf317b44ffda69299910f54a91882192cd0b5fd1835ca237cf86b2df722957ea176a4a05ae552359d6f6b5cfdceb7501cf731727148096d2010a7ec92c66529b87ba7f4e7acf9bd191ad3c2a1f044c4a71b28dac5d362b641ec3e8874207d3661b1b0b824e91ed741f63a45131a31d1b2d7274f355e461e90614ed5915e3cb34038d71240761362d903eaa909abdffdf39c73dfef7acdfda0cbd8404ccd166fa42ac6ce4552f8df4328260c69123b690ff95ddb2af2c8890cf373231f2b4b89403bc3e68ad81cbed3b0cce44c8d930ece1d67ba1f7a42f158c3fda85cd6cef8edcf631e06d1bcdf8666d99b7c02b2b1a057d1d865c25d792203362efc32c2398af56e3558e9a815c7ddda8e834991777f781128cc0c6d317481865cf9365a248b5819a085279c3161f2be5a5a2a25746a756ef08aa054611475f4f3ed8ff63923945cdbe21a9f1c661f39a2d28d687820af4fec27c529cf000aa66312a97ddb7eae389480551ed8cf0338931be3ab6b532fba7a429ed240c0adaa617e361c99c5147af256cbf848eba0905d8f00d3ab7e1c1f3aeca04d87bb7c008eb619b599081f3efd9caede4cfb045e3f3d4a6db2f99b994aeef2f1554841ad9af31fa918745068dde6adf46ff0de6f688789b98ff67a1e5961f33655185aceed7088ad7eb7d7f382237c52afd9cba8163c695ef467c959eedf3530c0651f41f3cd401e1ec0fcac988381cc1228cdc44d69740ee3c7345a199736c643ba9ba1b4dade8ddf5d638ee9b669e6b92369fe1bf15ad8abddc5030c252e1b20bbf134bdc47f1542cb5a0c5a5d48a7ef92a8fc905b165dd6764389c1302039728bca6480af1fb8126b37639feacd57c2610f5f507b94c2a9ab33ab51ca4b789ad03a3030b6b1624ce1f7d0146095d36faf2c09a72f35863890f686eb3b5f391859928d2223f4298c26251107e7e65d66a18f3fa17ffbde5cb530f904d0ff651f38398dd260ba80ce64a954bd340cca324c8286c1b525f05cef9ba09d3b2dcb85d13eb401c7c43dfac8ce8d5ecf745510580203d8995086a01a2ab6e3fcf179f37bb10bf5e453d9031f2e989e40d81573e98c2caa0508aa2d171ed8d78b4b0bd8069bf0e479b4fe4f1f8a1ae4f2b4f59af3867fee426eed5bfcc51dad63f95a3f7d21125af2bf52c57a40e309dde10da287958cb0c07730b5999c32721dbac1caf3c9d7f8c21e4fe7cce579e2abd93501506658e7ca4196378b7d6030ac57fecc44e76b5886d5b94d02c5d43178667dda8c8f948a5bdc25ccc250e85ab5b5f6e8e5a320f737266eaacdedd26805da7ca03892355faf8b6d4a3c761239cc10b55e7148f2514bfcd75c0aedc57959eed7342271cda8b60b25d4fe1e24965c064c8be0f6e404f7d1beb6706a8ef7693375b726619b43019b6fbb16e7097aff1dfb118d5890baf24eea8ebf59275392db3d75f7d9f0483f5106d29fb8798791322d5db5962620caaf211f7e7ffbbe847fbbfbb77604786d3343f4ca3ee37bd728090ef5c274f076f0eca432f047412ab6a8330a26384ec451b4ba8ed32ec33f0da273c2c8895af1de95f0b24634b5f3e9cde997b717406dd101171b26fe1019721cf09cf11b32c65720f49b1966169a9211223542035cb35e80961305d2f95f948739cbc14d5909701ef026cfab45a35da48891e1337b0e94fde5ee57af03893f4c076a9c13e57e679ed882a015fc0724d3176dd1996de50da68390b63f90c5d289a86f53a18359185807ccce33852b3076fcb7e99e143a7e0a4fadf755c956a34ccf4ab383be372b2796e028eef0605d839da0ccfa0fb6d0aa9fbfb95df852f7fb76af85ac5003c0206a7cf376ae935b6479df3b58db45ba0b11bb1e1d37eb50048c396b78cb3caa2d0bc2589cb2f02d396111f89a0e40fc9106cee9d34432a3aa24e5151b1ca29d54d4e927716f9b55818b00ee738e639b0cad0e8a1dc001fec1d485879b90f46b2021a1360af0c40f0c0f771ce05da1b3b21db9b9c7ca10f4d18e44489df61c0524fbd7f70fb0db6d370ecf58710dd03a26b78c5942c8006427975268daf6995e7bc9ca673a5adcbf409d6dc284dd26159f2955e2d1c15306f017fed8291f439f5ba84864e7b7f642ad163704ddfc5f7fe41b58b429e83a22185ba0d7e1d53aa829d83c80605ba3d34384617f13324aa575640cf261ba0116bbf5e6931d450c8d2cb58d8532b7e7292b1ee77c2e625c29941e89a08ad3b5e0e64570c34050ad03717c7b4915876b61072aedd5ae7966ac6644f3ccd29bd0ec3fc6baa1b38c5c2a8b5160f63c661f6f18a2fdd65e5a6ea870f38d62ae02a1c9b23622270e3d3e85bb8a2d0a49a23fbcfa784b890009c4385fea5f85b2e219ce1d01d2eb0c564e8d57e50e00faf181b928dbb47c966247d0c0b3ce05bb4fbe7de1f9d758b363ec662ad8fdc10f36b1cd4ebe4f69a847c79b7597efc97753cdf8afdd8f88f54a3547093a42bcf96b546428255a0234dc7ec3356eae1b5e474c7e7b79d7845de76c7d6f0beb03facc45dfabaa3dd353ef6a378d172feb83e99af0daae207565919ae87df70421ef68ded42d28c67f000353b210bc6bcc15f78970d29b7188ff887ab53060edbc25b5032bdd9e2e0fd87aceb7521f73d1126c2ab73051de7094e6a58e42466ce1bc33f9538adf92b5b1695d07ca4b0abdee8f5d1ae6c827a927611b8f13ece60411425e064392727a0354f84a9676a94a4135f2444933e4c3543db3f1442243fc38a210522f2efa6df94d53df9425cee1442d942bdd0ef1d09938009ba4a9da407556a44009e2e84ae616fef81339621b81103573a2d346ebfa9cb2e8bd16cefab93c62d90726f96fe696fde764c2f40986096025f36d6ef8f950e2a2be0c66becb39b5848d4ad149922e229335fc652dcbfb316d77fd1217caec4de601587e69455fa9db8d4871a5538ba73911d3dad5e3426ecfeb2c00f09f43a2ae5a582153840c3a36870a9f4f855e075ed1891517a55fd81c877d7610e51223f88f8f9fd32cb53f6e3b92d0f1a3de8b1af24f39ce9cbe4ab4497073b0fabef689bd57d13c75d6b98939cd44550b838aafad9c8d70d7c623444bb456b3cbb05869c612bfbfd2ac97f96f3708923dbbe9193537ee1598088f4f19ead0aef95678df30f41c0b47649dadcddbe4502b08e1708e320c8843172057772b09f787259bb9834043abbdc1cd2feced5c46f4bed512d31c9b81dcd30a80dbda1206c6352454cd72c2eefb07c38901a8e9045a4021a2558d12210d89b6967d64a385ac7e954d6b33bd74637cc97f2bc666ba5e9188c27ef021f6bd135758b81cd166ef88d3b074548fd34137a797f4462f35cd1d07d81d09737f9ad08ab6b05e8efc37f2dc766abc8c0fe4eb3f83c6c450c9ff4f4ab10fbf7a22bdc7a51a1c5c0836833dc60912f67028367b9277dc0ff073b34e7007462823e634fe468b24aa5644dd8639bb0f9b59b226dbf200e27ac32e2e9968ab883ae3d12cfd63c84a4da79d79e2492c60a219ab49915c192fab9f8217575e422b3ab20b9aa57f8375f4850bb14697f45d75361dcba11d63e9e9a60c4c806f32302c8b85e1b0051662d0b1b183a7b019351619d424ec263aafd5470c541a14b87a9b54071c9033a097f378823d5adcc64c30cd8877b1c9bf7866af8a9cab76a986cd4e3f8598ef6b5372b16157117945d94cebdb3320ec5f7fb28cb8fdec703873685e16dda15d9a04623e2886afc0c6e583c73fb84f54170182a7212b59851173d0ea570a1558b680d9db1bb64d354b098d29c08166a233628d015cc22b77d8dceccc546ba54a7ea4dd008fb756fccb5f687ba7f26f35cd95c3f9dca3e4e40a4424b2ff12fef7797d598ba8415192f83a270d10866b6c9f5b1b3f4b7b04fd3b7b9a70b6699345a58aa25c9a400ee01b9afc7727e1532fb851ba4a918f3cf54491eae60de4eee56917409d71bca4e93644efeb5d3178a9754d6b62ee6c6dc1e651242bb1dcb33c3f2480834162cdf944ac97a79c6bb93d007c7b43a38b1fcb6bf859b9109f980941eb825e37af3865fae9ca790c0052c8db59b0b9a51f2d234d6175cec7ae3da0c73992b852ed21413dab3657591ea02a5e42ee679869a7521553f8a4d4c86fe6d27ca407549fc0a6f04430444ed4d395847de7943aac3e10b33c2b84e6d3d9bf5b5034f4f1e495dbec2c6cc00e8b123d3fc4d312cdadbf2f19d4d3e716787d25e52c24c030ce7f5b4fc7d13496ea5181be3dce228af8", 0x1000}, {&(0x7f00000026c0)="b7b44acbd72c8688fc6352c388410d1032ecc3a731fc0b22b57b160fe8b1152744bde2ac2628df5362a7fe2717c9f805dfea9d0ce8d6eec8e4db6fcb0b254f727028c0185b9540f4c3f508dcd1b59a21886bcf754338cd6bebc4029b98c110257f5fa24142ea3db3f40187f5e9221329e02e7784b1bdfbf22a928eaab71f6a952675505bbd06692aac0a623c4dcf4758637b49f2b4d578509d819e0d6c01dabcd9", 0xa1}, {&(0x7f0000002800)="e95141c252bb71a5f2456d9f4521811c86922e5f392b2ea3ff16692dbe9370cae7c43fe9f72f48ec4b2683e9002806b707c0393f0ddcecf2dd55cd4e558a839eafe8ad41a202fc997d6d86159d9b139f66cd952668d445eb8a5491ce1fb1293fac4307029819e9d8d82dd80d2fe175cc317a60e9", 0x74}, {&(0x7f0000002880)="14eeff1aeafdfe402e4c7c7aaf00b50bce66e47d758fc065d51b5cf674175c83a10cfcd43d2a92e9af0ae04f6b226f84b01d9d1d899a7e384784c7359b10024084e0cef116bcf921390889dd570d475e43aa79dcaa21f687839571a38e6e3f921732de66a413c63c5b7297271333c8044b4ea055af8412d381d3667bb7960ff9ceaa0fb5987d8f2d25a5f1149dd021c200da66468753809ca92d2752bd3d955efcc4beb066f9ff3120b48fd31ae19762dddb641153f738a0701cafa09899b0", 0xbf}, {&(0x7f0000002780)="6f74e55fcef0b5f5a78773d1c62ed9141f937884ace4a23fda", 0x19}], 0x7, &(0x7f00000029c0)={0x20, 0x18e, 0x57, "4ca011cb6f28e5ac3045d6ff6400fd"}, 0x20, 0x40}, {&(0x7f0000002a00)={0x27, 0x0, 0x1, 0x7, 0x2, 0x4, "83b88d96fe514977d7dd5340422299d78d5220684b9b0e5e28d4018c9f8d3944fa7c3c203fd43ee44910740a5031ff62c6c9c6eedf23027fa0523513ab93d2", 0x16}, 0x60, &(0x7f0000002e00)=[{&(0x7f0000002a80)="ac75c406356c66a9e02ae4468fb1d3253260600befa29410709d13c6d7452a2e17145b3ead9febca8445303e034c04705e725cff61d3bc5ac1ea8bc5e6f5c2de936bdb47bec58b471ed8e791947083e3deb082fead704219fd46fa37c847935d7686d94ca2fbed223760c8d760a8c1a58a6df825f46fd39adbeedb6c78c220cdf3819c9aaba1af8eabae70c9fb8f5df76e3dacd93cf91328fc165d036a6f2ee7c2522bbfb431189fbc99d2e23d", 0xad}, {&(0x7f0000002b40)="08df30e28c0afeccf9771841d1da5cbcb4eecc5e427fab012514ab9bed5c173dabe867aaf7dfc317a6b2376b4d379ed418098e37a6221dd2aa152d6eb5b3b17b8ad4f3662fbf76b4c9e0d8dc2142adedcfb0c3ab49ddf2bd2a723630e2cddabe0aa2eadb62b90e73a5b4670ed87960dd0682cc827a7352b1ae8d27ad440f8caef54cb06c41ee23cb99755bed3724860cf93cca6a46bf1667d39e95acbc6d79585037f9498651dcbd26857dfb58d1ccf57b05c4b6c7b1bc90ba52f57e4a9bc967c4f13d705b9cca9731edf945668dce", 0xcf}, {&(0x7f0000002c40)="0bc846b670ae0022752eed156b4ef5463eda2f099d744c5c1469c82daf118742588e719fd7ee8d0d6a553c0ae04b9662ebc56f899a310e307e32b12df45f76905201a9bbe412eb8cef9dedb57c9c97fcdefc68dde5ecd1a8eeb9dd5e3826894bf9321920c47048eb8837d04d34b217e08e7764f9b833bb8c2a66217dfc566c5f8511721f64207eb5262f9a2e0fee778af046becc96805329c37fa7b9ab2d", 0x9e}, {&(0x7f0000002d00)="83b3f00b2fdcf150766d014e616aa50f05c774f08fd2ed6266928e2001b9457eafce07b7e9ba78985e6cd777bc20a5cf9d8e9d050b2774c0fdb05f1b25ce143d2fb6ecfabce80acb0cac2bf6fe56db10b3585bc12d2ece19ccc375cae07b2030eb0f46664fdd622cfc926afe2cd9f29e6c9b031032998ce85c23b0f4ffbad08dfd9fba51bb4c34eea8d94b118ec20a4105feb3b8d4348745329dd06856d170ae8ec15cabd192d608dfdb72d27fcd6fb546717c55bf01c7f968600e83701d3396899d186b", 0xc4}], 0x4, 0x0, 0x0, 0x44}, {&(0x7f0000002e40)={0x27, 0x0, 0x0, 0x4, 0x3, 0x7fff, "4c05359c42121b70ec5d9797f6f80af7ebc3dd43e932c66acebb94ffc5b1dcbef6561666f7bc627708b2e1135d9dad0bd6666af8ddb528e4469aa4005b1819", 0x9}, 0x60, &(0x7f0000002f80)=[{&(0x7f0000002ec0)="c99255baa11ac5466ce351187a815b307e5da5a2ca8a1d25c7b8f0a0e9c460a0715018a4860d09fc80225e8a27ab0c6fbb567b5ddc5024bf2c2b8c71d9321200c4384f63211876f868a45de42cb16ae4d12e38a4ca9d094436b419134e7c787740ca2f4679a5418c9386c008b6ba4473272a0690ce66372d480fe00a2a8bf4dd", 0x80}, {&(0x7f0000002f40)="6e6da9d9681ed837fcfce12b56e277f5e77dcc5d78b65c0ec6933b8d", 0x1c}], 0x2, &(0x7f0000002fc0)={0xa8, 0x112, 0x1f, "d5031bd6cff0fb2bfd874acb59f0070fcb43aea7a64cc0209499ebc395889eebcdff82d8ea8735e4ae869383c0bb3f510fab579f6482b9a21015e480a10f9811dc27e7519d694b2debe2bded46f87041afe0180227ce667d96169a750a5bbe1ecdd3663a36efc2efe9b0093cd15c290fe51001af5a41dd4c5b75b81c728c3ba490f5f33c91c1c686a6d46e73a28f2825ff173adf5c1d"}, 0xa8, 0x4000}, {&(0x7f0000003080)={0x27, 0x0, 0x1, 0x7, 0x8, 0xffffffffffffcbe0, "d75873e3cf00493960820cd6dc7170a49767a439186478e8724140f7ca059847b34e79faf05191dad23feb88aed86bd6b35bbc45d2ff0d13c4e2cad4199772", 0x2a}, 0x60, &(0x7f0000003500)=[{&(0x7f0000003100)="db57848528860ee72bc1c2498ed7505e152398fb66dd1c3c087ec86c7715417eae2b9b936718b9324bce0f6823bf849fe4f095f331f7b1b65745dd6a7b3cf1e1d66c02dd65bc48b6c646c43d25e96ef68d5cf22c20d9c22fe63b19be4856e59095360b09e31bd0124d6dd98fb931fdd12ce8cce6d473e67fba8fef7ab3cc95ae1ff3b90b51ccce8269489d1b99a7d450ee5f74927c3bd96c8045500945b2dfdfb836d651f5a7278ab2584ba13511e45fcd1737d600e0417aee50bb6ddd633beffe33f673220c8a8f4913cd9460e9aab19bb15de97b6d24bac62f60c371e8a3c9bd9ed31b2a5874dfdaebd322", 0xec}, {&(0x7f0000003200)="0a8f4faac64f633f57b8a171846af2e4f21b6f9eb6a1b602cc6257a82af95b37a41b21d12ac7b41a94a734787d8d02ff7a65a5f2ff3394262b1c13a9546154d5cc9a1d99456cd036916a48caf0937aa1fb94cb6e6151aaad0dc51dd818f83329a08c1084fa2a42a6047a5c1cc759fcb85ff2b85a7977eb33b337f6075d6df0fd3251b6cba5f5a6b158b0393ad912911b85071196537a5734a2bf0c9e9bd153", 0x9f}, {&(0x7f00000032c0)="c203ceefd16dde1b7a25c502ea453e9b1c4a564f6a82d2dcc2f5312248d9ae4535ccecec6bb18349d1251e076f48d422bd00e7df3cb29ea3fe36cc6e8cbd7dcc4a8f6c2c3e7e17cbeda4c2879d7a6c7721573257ee0fb4e3eb2e78fe5045c085cb8ad06d085e1f", 0x67}, {&(0x7f0000003340)="643e300afca14b8a449be6017798a423a442fb4b761e04738579790e76af3257f2645add447bf89341ce5e1cbecebf98f165004340712fab8b46e6e29f260d643a2f3394c15549f6041c1f2bf3d73c47d804585c6ccfae63e02d69f3f167739ebc0fd21f", 0x64}, {&(0x7f00000033c0)="96ac81392ad2c63ca5aa9faa5acd838a", 0x10}, {&(0x7f0000003400)="93273b3200637e72ae6eab5eed4932bdaed9fc26bfa15d99963000759c04c74a2b0e8be89d7719d7c335088469a0698b38873324dfb84bae71e1d29b8d496a301299690df6803e8707d86fe4513faf07bc7dfff02360df", 0x57}, {&(0x7f0000003480)="74bceea4d55bc5bc6d2d9379e999033bdd718556e038fac1e85f68093e695cee69cbebb3d46d315a90fa33f5742ade2ffdf75b1d80779592107805d89976228fd8", 0x41}], 0x7, &(0x7f0000003580)={0x18, 0x13b, 0x5, "7eea49aa147896"}, 0x18, 0x80}, {&(0x7f00000035c0)={0x27, 0x0, 0x2, 0x7, 0x2, 0xffff, "45685c77e39449c1b1cae94b78db6e6404962f355648109e981846763b27c93b5d619cced1073fba33ac9e25bf737589e8547dbe444fdb54c4d3477b09c9f7", 0x13}, 0x60, &(0x7f0000004940)=[{&(0x7f0000003640)="c4cbe3fe5572f839d4a9c0b56f4d0163c1190864caac323d018f40a7124766d0d38bf507c05663c5d15f1453ed2e843a2a25aff63456b8142d382afc72706b8b488653421f2d90687c7acc2e4b3dcb1aa29f755345b2a5d8dc63852e0c28ae9b8a861542033ef0033752f06417bc038c7533c34709eb2918dbe29e24e009bef7b29514c101c7d77b04efff217f8dc4fbb6", 0x91}, {&(0x7f0000003700)="a4d4101ad4462e3f4e55567b839a4d0b39fdbfa8fcce1ba7825a1fc94fcc6916b8dd43da80f3ef5e6ef8d6cbe06f9b44ab2c69d40f87b8ed03ad165f697d4ff3de7da5a6e5889f0203f3f68bf233ba0b09bc7e5b9c90a0312034f0df96ef1f01d0cf371de551b31684f86809d052bffc4fd52de717808ccab48e34a760732fc4", 0x80}, {&(0x7f0000003780)="e9a048487dc4416c065bd2afb5e604d604033e35eb46bca134535e40b65e537d9ff7d1c393c69b9d3098176ee2b4e32fb53bedd9889608a06c01e58a1b8c4a3c1b5019f1e6060e72d39f0c3fdedf7e3ad9fcbc1bd0dc7d0a813618cf807215d859102dd22eec", 0x66}, {&(0x7f0000003800)="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", 0x1000}, {&(0x7f0000004800)="506161199937", 0x6}, {&(0x7f0000004840)="5bdaf75e207c318f2ada0ac61cbb48242345936c1f430632da3567a141c020681ee66dfa4362be8eb9d2ec2a157048f4c303f61e9f4398bce033cd18f0089438ff696c6aeb39db4492b75ad36e66fb4d6781a62ae73775370a23e6267b825d4b21be36c6ea81843b6bdee087db0b7be9124817dbda132c436e0db21aa5fe9a4a02c3d18c759e9043010921ddde73fa362fa743cd708f46a6852100fac5c4f837cc2a17aa7667809e54fa40e004580c50e96bbfcda2043525cb0085bb277e5d7ac221488297d708b7fba3a34636c4c98197e0ee8bcab4de1f9be3b199dc3ca8", 0xdf}], 0x6, &(0x7f00000049c0)={0xd8, 0x1ff, 0x9, "af59da8b890a0fc78573239a4ac0897bc2920c35eb0d2603a18b0a0fe1486e1d7888dca07f809e3f854e6c1a9f9f4a7559e8fd418194ba0b18938de2f26d2063da3f771aa049ca6b3c2f57cda673f9143376e4028834871126c0b47cfb4957315d7281d5380e84334cf6c61ea82fdc9f73804d3f4ec02627748f5bae574a0690b409e175008f40ddb84e6295bcb4a791122e48d812e2009b36d6a5eb3bbb47412becbe024781474efa17206688364f2c7e4a0ef62ff6941899de79c7f8e7c66833f8826954860e"}, 0xd8, 0x8800}, {&(0x7f0000004ac0)={0x27, 0x1, 0x2, 0x5, 0x400, 0x67, "25f779f46d436fb3177a88ee3680951c31b234b8a9052ce3ae087c9471d243797b8f305408e3b515131fdadcb46dcd1a0c53a1f296b8f36f2af2c81fe7c06b", 0x11}, 0x60, &(0x7f0000004c40)=[{&(0x7f0000004b40)="4cfff569731bb5813d86542e27854daea76e335dc388783b80f5e18fd87bb9e20176a40fb2a79dd1199164060edc92faa3cc6fe4d8c18eb5767564a55c0aa0afc6f46c5fe40515291f02310e06113aeb3c98bc831eb24d68a6d44dc5c2a8cea730e64c8662fe291f92cbed72da8f6db56f0132240c6de1e52e78a123c9252ea7c2d158624125bffd39ae028579d50f7d702415c88c0f10c2a17b5f3bf17607a0b49a6c549d2a8d98c6dffe7f36667ade7ca5f92979a2087a92555d0816b5b7601d3458", 0xc3}], 0x1, &(0x7f0000004fc0)=ANY=[@ANYBLOB="98000000000000008b010000010000006a00dbff5539eeced02c686930fbf2ec9565c2fd27085dc0de58b95a559fa63505ad09971d55d1b553d721c4ce04c841091d00bb6c15ac768a63b5b751d9d39a3fd0103afbac61cbec3d4661cabcfde5938505c3343feadad06c19e38b806775993f5972311894ac9d9af11c02969b2fd77ec62130ac2dff510425dca9e035156086ff844f8a8207ff00"], 0x98, 0x4044881}], 0x8, 0x0) r2 = request_key(&(0x7f0000004f00)='keyring\x00', &(0x7f0000004f40)={'syz', 0x0}, &(0x7f0000004f80)='!%/proc\x00', 0xfffffffffffffffa) keyctl$update(0x2, r2, &(0x7f0000004fc0), 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000004c80)={0x5, 0x3a910f58, 0x1ff, 0x0, 0x8, 0x1, 0x1}, 0xc) [ 265.126677] FAULT_INJECTION: forcing a failure. [ 265.126677] name failslab, interval 1, probability 0, space 0, times 0 14:49:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setlease(r1, 0x400, 0x2) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) sysfs$3(0x3) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) fcntl$setflags(r0, 0x2, 0x1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) [ 265.174951] CPU: 0 PID: 10757 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 265.183544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.192893] Call Trace: [ 265.195502] dump_stack+0x244/0x39d [ 265.199142] ? dump_stack_print_info.cold.1+0x20/0x20 [ 265.204341] ? find_held_lock+0x36/0x1c0 [ 265.208426] should_fail.cold.4+0xa/0x17 [ 265.212487] ? find_held_lock+0x36/0x1c0 [ 265.216593] ? fault_create_debugfs_attr+0x1f0/0x1f0 14:49:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000140)=""/36, &(0x7f0000000180)=0x24) r2 = socket$netlink(0x10, 0x3, 0x13) getsockname$netlink(r2, &(0x7f0000000080), &(0x7f00000000c0)=0xc) [ 265.221722] ? lock_downgrade+0x900/0x900 [ 265.225872] ? current_time+0x72/0x1b0 [ 265.229770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.235314] ? timespec64_trunc+0xea/0x180 [ 265.239559] ? inode_init_owner+0x340/0x340 [ 265.243890] ? find_held_lock+0x36/0x1c0 [ 265.247966] ? btrfs_ioctl+0x1718/0x9e30 [ 265.252062] ? perf_trace_sched_process_exec+0x860/0x860 [ 265.257520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.263071] __should_failslab+0x124/0x180 [ 265.267317] should_failslab+0x9/0x14 [ 265.271141] kmem_cache_alloc+0x2c4/0x730 14:49:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 265.275315] ? do_sys_ftruncate+0x428/0x550 [ 265.279656] ? lock_downgrade+0x900/0x900 [ 265.283813] getname_flags+0xd0/0x590 [ 265.287629] ? __lock_is_held+0xb5/0x140 [ 265.291729] getname+0x19/0x20 [ 265.294920] do_sys_open+0x383/0x780 [ 265.298642] ? filp_open+0x80/0x80 [ 265.302191] ? trace_hardirqs_off_caller+0x310/0x310 [ 265.302220] ? do_sys_ftruncate+0x449/0x550 [ 265.302253] __x64_sys_open+0x7e/0xc0 [ 265.302274] do_syscall_64+0x1b9/0x820 [ 265.311720] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 14:49:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x20000, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000240)={0xf, 0x0, 0x2, {0x8d0, 0x0, 0x6, 0x9ca}}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0xe723, @remote, 0x81}}, 0x6e6, 0x0, 0x9, 0x200, 0xd1}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r2, 0x8ac}, 0x8) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000200)={0x3, 0x8acb, 0x1, 0xfffffffffffffff7, 0x2, 0x9, 0x6a, 0x20, 0x9, 0x1, 0xfff}, 0xb) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000680)=ANY=[@ANYBLOB="0700000000000000010000000000000003000000010000000a0000000000000008000000000000000500000000000000e806000000000000000000000000000000000000000000008000000000000000000000000000000003000000000000000700000000000000070000000000000000000000000000000000000000000000000400000000000000000000000000000400000000000000ce01000000000000050000000000000000000000000000000000000000000000010a000000000000000000000000000005000000000000000500000000000000040000000000000000000000000000000000000000000000000100000000000000000000000000000200000000000000080000000000000007000000000000000000000000000000000000a16ed1c629522881000000000000000000000000000200000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000c5000000000000000000000000000000010000000000000000000000000000000000000000000000000c0000000000000000000000000000e21315290000000004000000000000009f00000000000000000000000000000000000000000000000818000000000000000000000000000004000000000000003400000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000500000000000000f39f0000000000002dd0ba1300000000000000000000000000000000000000000806000000000000000000000000000083a2c12cd62bf1440a4708"]) [ 265.324745] ? syscall_return_slowpath+0x5e0/0x5e0 [ 265.324759] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.324775] ? trace_hardirqs_on_caller+0x310/0x310 [ 265.324790] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 265.324805] ? prepare_exit_to_usermode+0x291/0x3b0 [ 265.324822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.354581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.359774] RIP: 0033:0x4112b1 14:49:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000080), 0x4) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x1b) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r2, 0xc00c55ca) [ 265.362984] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 265.381881] RSP: 002b:00007fc04b0f0a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 265.389594] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004112b1 [ 265.396867] RDX: 00007fc04b0f0afa RSI: 0000000000000002 RDI: 00007fc04b0f0af0 [ 265.404142] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 265.411444] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 265.418729] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xf#\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e21, @rand_addr=0x7}}, 0x5, 0x8001}, &(0x7f0000000240)=0x90) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000280)={r2, 0xa2, "2974964e913499dfca8ab7f578291d7b2f28f7c77228163671f209ebb6111fbbb4ffc1c2a5ebfc13bc0ad4fd71cdaf222e27c5ef6622fd5c1de99ada2ad965e5bdfb662b78d8237105d320bce7058b89cc0758bdf560880c35e793086135de75e9f09cc4a817e510f51a66f392b6f78083db09467c7d5856f01d37c9f619596646b954e20501123efb3ba1359490eca6c2a307c341f28de51fc97352acf44ddfb3fe"}, &(0x7f0000000340)=0xaa) syz_open_dev$dmmidi(&(0x7f0000000380)='/dev/dmmidi#\x00', 0x7f, 0x8001) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:22 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:22 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000040)={0x3f, 0x1c, [0x5, 0x80000000, 0x7fffffff, 0x3ff, 0x8, 0x8, 0x4]}) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000080)=0xfff, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(0xffffffffffffffff) arch_prctl$ARCH_SET_GS(0x1001, 0x5) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x2, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000000c0)) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:22 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 265.591687] FAULT_INJECTION: forcing a failure. [ 265.591687] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 265.603530] CPU: 0 PID: 10805 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 265.612099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.621437] Call Trace: [ 265.624016] dump_stack+0x244/0x39d [ 265.627639] ? dump_stack_print_info.cold.1+0x20/0x20 [ 265.632823] should_fail.cold.4+0xa/0x17 [ 265.636888] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 265.641993] ? print_usage_bug+0xc0/0xc0 [ 265.646058] ? mark_held_locks+0x130/0x130 [ 265.650281] ? graph_lock+0x270/0x270 [ 265.654068] ? print_usage_bug+0xc0/0xc0 [ 265.658130] ? graph_lock+0x270/0x270 [ 265.661933] ? lock_downgrade+0x900/0x900 [ 265.666073] ? check_preemption_disabled+0x48/0x280 [ 265.671103] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.676639] ? should_fail+0x22d/0xd01 [ 265.680518] ? find_held_lock+0x36/0x1c0 [ 265.684577] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 265.689692] __alloc_pages_nodemask+0x366/0xec0 [ 265.694354] ? current_time+0x72/0x1b0 [ 265.698247] ? __alloc_pages_slowpath+0x2e00/0x2e00 [ 265.703261] ? inode_init_owner+0x340/0x340 [ 265.707566] ? find_held_lock+0x36/0x1c0 [ 265.711629] ? print_codec_info+0x1d58/0x4650 [ 265.716140] ? trace_hardirqs_off+0xb8/0x310 [ 265.720557] cache_grow_begin+0xa5/0x8c0 [ 265.724674] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 265.730206] ? check_preemption_disabled+0x48/0x280 [ 265.735220] kmem_cache_alloc+0x66a/0x730 [ 265.739358] ? do_sys_ftruncate+0x428/0x550 [ 265.743663] getname_flags+0xd0/0x590 [ 265.747445] ? __lock_is_held+0xb5/0x140 [ 265.751533] getname+0x19/0x20 [ 265.754713] do_sys_open+0x383/0x780 [ 265.758415] ? filp_open+0x80/0x80 [ 265.761956] ? trace_hardirqs_off_caller+0x310/0x310 [ 265.767063] ? do_sys_ftruncate+0x449/0x550 [ 265.771416] __x64_sys_open+0x7e/0xc0 [ 265.775221] do_syscall_64+0x1b9/0x820 [ 265.779122] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 265.784471] ? syscall_return_slowpath+0x5e0/0x5e0 [ 265.789386] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.794216] ? trace_hardirqs_on_caller+0x310/0x310 [ 265.799216] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 265.804231] ? prepare_exit_to_usermode+0x291/0x3b0 [ 265.809247] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.814094] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.819270] RIP: 0033:0x4112b1 [ 265.822447] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 14:49:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x5aaf140082bd6e3f) 14:49:23 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xad52, 0xc00) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f00000000c0)={0x0, 0x8000, 0xfffffffffffff000, 'queue0\x00', 0x2}) name_to_handle_at(r0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x67, 0x9, "5b7c327a2fb45987db4e4362da00c2b5c3852a0aedcc47db6587fdc76b58efd3c5005bb341a72e00cfec55c4ef6facc4303c2d6fb1bb0add11cfd02eec501e688ad217a3ca3a39a7ee7e956f513c5a7f59736717c7b3cf7f332614c321ecc1"}, &(0x7f0000000240), 0x400) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 265.841358] RSP: 002b:00007fc04b0f0a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 265.849112] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004112b1 [ 265.856383] RDX: 00007fc04b0f0afa RSI: 0000000000000002 RDI: 00007fc04b0f0af0 [ 265.863636] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 265.870903] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 265.878154] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x5, 0x8040) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000400)={0x2, 0x20, 0x7fffffff, 0x1}, 0x10) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000300)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x16, 0x6, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffffffffcc05, 0x0, 0x0, 0x0, 0x100}, @exit], &(0x7f0000000040)='GPL\x00', 0x9363, 0x1f, &(0x7f0000000100)=""/31, 0x40f00, 0x1, [], r2, 0xf}, 0x48) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:23 executing program 5: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:23 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x200000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000040)={0x0, 0x0, 0x0}) [ 266.160857] FAULT_INJECTION: forcing a failure. [ 266.160857] name failslab, interval 1, probability 0, space 0, times 0 [ 266.211763] CPU: 1 PID: 10846 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 266.220355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.229698] Call Trace: [ 266.232313] dump_stack+0x244/0x39d [ 266.235931] ? dump_stack_print_info.cold.1+0x20/0x20 [ 266.241156] ? print_usage_bug+0xc0/0xc0 [ 266.245217] ? print_usage_bug+0xc0/0xc0 [ 266.249266] should_fail.cold.4+0xa/0x17 [ 266.253310] ? find_held_lock+0x36/0x1c0 [ 266.257367] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.262472] ? lock_downgrade+0x900/0x900 [ 266.266625] ? check_preemption_disabled+0x48/0x280 [ 266.271660] ? kasan_check_read+0x11/0x20 [ 266.275795] ? find_held_lock+0x36/0x1c0 [ 266.279840] ? ntfs_nlstoucs+0x2b8/0x620 [ 266.283890] ? perf_trace_sched_process_exec+0x860/0x860 [ 266.289327] __should_failslab+0x124/0x180 [ 266.293559] should_failslab+0x9/0x14 [ 266.297373] kmem_cache_alloc+0x2c4/0x730 [ 266.301515] ? graph_lock+0x270/0x270 [ 266.305303] ? print_usage_bug+0xc0/0xc0 [ 266.309364] ? mark_held_locks+0x130/0x130 [ 266.313596] __alloc_file+0xa8/0x470 [ 266.317304] ? file_free_rcu+0xd0/0xd0 [ 266.321172] ? find_held_lock+0x36/0x1c0 [ 266.325235] ? is_bpf_text_address+0xac/0x170 [ 266.329761] ? lock_downgrade+0x900/0x900 [ 266.333896] ? check_preemption_disabled+0x48/0x280 [ 266.338918] alloc_empty_file+0x72/0x170 [ 266.342986] path_openat+0x170/0x5150 [ 266.346795] ? rcu_softirq_qs+0x20/0x20 [ 266.350784] ? unwind_dump+0x190/0x190 [ 266.354708] ? graph_lock+0x270/0x270 [ 266.358495] ? path_lookupat.isra.43+0xc00/0xc00 [ 266.363245] ? unwind_get_return_address+0x61/0xa0 [ 266.368169] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 266.373183] ? expand_files.part.8+0x571/0x9a0 [ 266.377750] ? find_held_lock+0x36/0x1c0 [ 266.381799] ? __alloc_fd+0x347/0x6e0 [ 266.385583] ? lock_downgrade+0x900/0x900 [ 266.389725] ? getname+0x19/0x20 [ 266.393087] ? kasan_check_read+0x11/0x20 [ 266.397234] ? do_raw_spin_unlock+0xa7/0x330 [ 266.401626] ? do_raw_spin_trylock+0x270/0x270 [ 266.406206] ? __lock_is_held+0xb5/0x140 [ 266.410255] ? __check_object_size+0xb1/0x782 [ 266.414759] ? _raw_spin_unlock+0x2c/0x50 [ 266.418910] ? __alloc_fd+0x347/0x6e0 [ 266.422721] do_filp_open+0x255/0x380 [ 266.426515] ? may_open_dev+0x100/0x100 [ 266.430490] ? get_unused_fd_flags+0x122/0x1a0 [ 266.435053] ? __alloc_fd+0x6e0/0x6e0 [ 266.438845] ? __lock_is_held+0xb5/0x140 [ 266.442893] do_sys_open+0x568/0x780 [ 266.446639] ? filp_open+0x80/0x80 [ 266.450204] ? trace_hardirqs_off_caller+0x310/0x310 [ 266.455297] ? do_sys_ftruncate+0x449/0x550 [ 266.459604] __x64_sys_open+0x7e/0xc0 [ 266.463391] do_syscall_64+0x1b9/0x820 [ 266.467260] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 266.472634] ? syscall_return_slowpath+0x5e0/0x5e0 [ 266.477568] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.482408] ? trace_hardirqs_on_caller+0x310/0x310 [ 266.487419] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 266.492438] ? prepare_exit_to_usermode+0x291/0x3b0 [ 266.497459] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.502286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.507455] RIP: 0033:0x4112b1 [ 266.510643] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 266.529540] RSP: 002b:00007fc04b0f0a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 266.537226] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004112b1 [ 266.544477] RDX: 00007fc04b0f0afa RSI: 0000000000000002 RDI: 00007fc04b0f0af0 [ 266.551724] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 14:49:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xf*\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x4000) recvmsg$kcm(r1, &(0x7f0000000340)={&(0x7f00000000c0)=@hci, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/13, 0xd}, {&(0x7f0000000180)=""/252, 0xfc}], 0x2, &(0x7f00000002c0)=""/111, 0x6f}, 0x40) pwritev(r0, &(0x7f0000000440)=[{&(0x7f0000000400)="f45833f4e1d9d1414e04d8bbe4fe6fda1c8a93da48b6374d63f85393e11eec7cad8139567ee9b0", 0x27}], 0x1, 0x0) 14:49:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000180)={0xf, @capture={0x1000, 0x1, {0xd08, 0x9}, 0x5, 0x8}}) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x8, 0x20010, r0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:23 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 266.558973] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 266.566232] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:24 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x10000, 0x0) flistxattr(r0, &(0x7f0000000180)=""/128, 0x80) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000000c0), 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r1, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) [ 266.649283] FAULT_INJECTION: forcing a failure. [ 266.649283] name failslab, interval 1, probability 0, space 0, times 0 [ 266.705761] CPU: 0 PID: 10860 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 266.714362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.723714] Call Trace: [ 266.726311] dump_stack+0x244/0x39d [ 266.729998] ? dump_stack_print_info.cold.1+0x20/0x20 [ 266.735202] ? lock_downgrade+0x900/0x900 [ 266.739369] ? check_preemption_disabled+0x48/0x280 [ 266.744410] should_fail.cold.4+0xa/0x17 [ 266.748482] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.753645] ? is_bpf_text_address+0xd3/0x170 [ 266.758146] ? kernel_text_address+0x79/0xf0 [ 266.762562] ? __kernel_text_address+0xd/0x40 [ 266.767060] ? unwind_get_return_address+0x61/0xa0 [ 266.771995] ? __save_stack_trace+0x8d/0xf0 [ 266.776342] ? find_held_lock+0x36/0x1c0 [ 266.780451] ? do_syscall_64+0x1b9/0x820 [ 266.784550] ? perf_trace_sched_process_exec+0x860/0x860 [ 266.790024] __should_failslab+0x124/0x180 [ 266.794282] should_failslab+0x9/0x14 [ 266.798097] kmem_cache_alloc_trace+0x2db/0x740 14:49:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) [ 266.802791] ? __might_sleep+0x95/0x190 [ 266.806798] apparmor_file_alloc_security+0x17b/0xac0 [ 266.812013] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 266.817559] ? apparmor_path_rename+0xcd0/0xcd0 [ 266.822264] ? __alloc_file+0xa8/0x470 [ 266.826161] ? rcu_read_lock_sched_held+0x14f/0x180 [ 266.831187] ? kmem_cache_alloc+0x33f/0x730 [ 266.835515] ? graph_lock+0x270/0x270 [ 266.839337] security_file_alloc+0x4c/0xa0 [ 266.843586] __alloc_file+0x12a/0x470 [ 266.847403] ? file_free_rcu+0xd0/0xd0 [ 266.851299] ? find_held_lock+0x36/0x1c0 14:49:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f00000000c0)='maps\x00') bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 266.855385] ? is_bpf_text_address+0xac/0x170 [ 266.859917] ? lock_downgrade+0x900/0x900 [ 266.864094] ? check_preemption_disabled+0x48/0x280 [ 266.869129] alloc_empty_file+0x72/0x170 [ 266.873205] path_openat+0x170/0x5150 [ 266.877037] ? rcu_softirq_qs+0x20/0x20 [ 266.881015] ? unwind_dump+0x190/0x190 [ 266.884918] ? graph_lock+0x270/0x270 [ 266.888740] ? path_lookupat.isra.43+0xc00/0xc00 [ 266.893510] ? unwind_get_return_address+0x61/0xa0 [ 266.898450] ? __sanitizer_cov_trace_cmp4+0x16/0x20 14:49:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x54, 0x400000) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000180)={0x1, 0x0, [{0x5, 0x3, 0x0, 0x0, @irqchip={0xac0, 0x4185}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r2, 0xc00c55ca) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0xb, &(0x7f0000000280)=""/215, &(0x7f00000000c0)=0x3725c06c0592a400) openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000001c0)=0x9) 14:49:24 executing program 3: socketpair(0x13, 0x7, 0xfff, &(0x7f0000000180)) r0 = socket$alg(0x26, 0x5, 0x0) listen(r0, 0x943) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e22, 0x9, @mcast1, 0x67}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e24, 0x1, @mcast2, 0x5b0f}, @in6={0xa, 0x4e23, 0x9, @ipv4={[], [], @broadcast}, 0x267}], 0x84) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 266.903478] ? expand_files.part.8+0x571/0x9a0 [ 266.908070] ? find_held_lock+0x36/0x1c0 [ 266.908107] ? __alloc_fd+0x347/0x6e0 [ 266.908143] ? lock_downgrade+0x900/0x900 [ 266.915977] ? getname+0x19/0x20 [ 266.916016] ? kasan_check_read+0x11/0x20 [ 266.916059] ? do_raw_spin_unlock+0xa7/0x330 [ 266.916075] ? do_raw_spin_trylock+0x270/0x270 [ 266.936716] ? __lock_is_held+0xb5/0x140 [ 266.940777] ? __check_object_size+0xb1/0x782 [ 266.945288] ? _raw_spin_unlock+0x2c/0x50 [ 266.949440] ? __alloc_fd+0x347/0x6e0 [ 266.953281] do_filp_open+0x255/0x380 [ 266.957090] ? may_open_dev+0x100/0x100 [ 266.961097] ? get_unused_fd_flags+0x122/0x1a0 [ 266.965688] ? __alloc_fd+0x6e0/0x6e0 [ 266.969498] ? __lock_is_held+0xb5/0x140 [ 266.973568] do_sys_open+0x568/0x780 [ 266.977288] ? filp_open+0x80/0x80 [ 266.980834] ? trace_hardirqs_off_caller+0x310/0x310 [ 266.985956] ? do_sys_ftruncate+0x449/0x550 [ 266.990302] __x64_sys_open+0x7e/0xc0 [ 266.990321] do_syscall_64+0x1b9/0x820 [ 266.990335] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 14:49:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2, 0x10) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000000c0)={0x0, @reserved}) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 266.990364] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.003400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.003417] ? trace_hardirqs_on_caller+0x310/0x310 [ 267.003446] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 267.003467] ? prepare_exit_to_usermode+0x291/0x3b0 [ 267.028230] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.028252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.028267] RIP: 0033:0x4112b1 [ 267.041455] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 267.060356] RSP: 002b:00007fc04b0f0a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 267.060370] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004112b1 [ 267.060378] RDX: 00007fc04b0f0afa RSI: 0000000000000002 RDI: 00007fc04b0f0af0 [ 267.060387] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 267.060395] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 267.060402] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x50d000, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x45, &(0x7f0000000040)=""/101, &(0x7f00000000c0)=0x65) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:24 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0xfffffdbb) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) write$binfmt_aout(r0, &(0x7f0000000400)={{0x10b, 0x8, 0x4, 0xcd, 0x3b7, 0xd1c, 0x31b, 0x6}, "4a75f8e677c596c3404586cc3b30ab0694dc0ea03626836fcac01eb365ee9e7844f71be81ecd84382d449e740ef4a5358e2c941ab8e2e2a780f2f4d4643c922a8b8287fac50fc39d6ffec0657dd4481d39c2bf51e047685c85d39624f6b02a988882d11cfd4f1e3e66b019132977b6f3e7aec513ab3e36b5b760b34c49fe586b9b79643aec47ef33390b10ffa44abcf7a81bb8c7088592ac657ca79cd0c049b0e72e7c7066b1bf93c871e95a4c6a111d51f61186ea53fcc1e31a1e886f2d47e187efcd3efda9", [[], [], [], [], [], [], [], []]}, 0x8e6) 14:49:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)=0x0) ptrace$getsig(0x4202, r3, 0x1e, &(0x7f0000000280)) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_cache\x00') rt_sigaction(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)="c4e27922133ef33500000080c463a122b90d000000002e2666400ff892d481c0c566450f3831764346e962000000430fac1dd08e2b2712410f1b47680f2b1c5c44dcf7", {0xd0}, 0x40000000, &(0x7f0000000180)="66450f664300c4a231398a0c000000c4c3217b91feefffff82c4c1cd612f6636470fa242f9c4a17e10ab00000000c4e3416b0200c4c14967ce3ef2460f5fe1"}, 0x0, 0x8, &(0x7f0000000200)) ioctl$VIDIOC_G_FREQUENCY(r4, 0xc02c5638, &(0x7f0000000080)={0x3, 0x7, 0x6}) ioctl$UI_DEV_CREATE(r2, 0xc00c55ca) 14:49:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 267.321271] FAULT_INJECTION: forcing a failure. [ 267.321271] name failslab, interval 1, probability 0, space 0, times 0 [ 267.333704] CPU: 0 PID: 10909 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 267.342300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.351707] Call Trace: [ 267.354311] dump_stack+0x244/0x39d [ 267.357954] ? dump_stack_print_info.cold.1+0x20/0x20 [ 267.363173] should_fail.cold.4+0xa/0x17 14:49:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffff9c, 0x10, &(0x7f0000000100)={&(0x7f0000000080)=""/91, 0x5b, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r1, 0x4) 14:49:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x4e) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) [ 267.367248] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.372377] ? print_usage_bug+0xc0/0xc0 [ 267.376464] ? up_write+0x7b/0x220 [ 267.380033] ? graph_lock+0x270/0x270 [ 267.383839] ? lock_acquire+0x1ed/0x520 [ 267.387825] ? lo_ioctl+0x25d/0x22a0 [ 267.391554] ? find_held_lock+0x36/0x1c0 [ 267.395652] ? __lock_is_held+0xb5/0x140 [ 267.399716] ? __x32_compat_sys_io_submit+0x338/0x580 [ 267.404945] ? lo_ioctl+0x25d/0x22a0 [ 267.408669] ? perf_trace_sched_process_exec+0x860/0x860 [ 267.414132] __should_failslab+0x124/0x180 14:49:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$NBD_DISCONNECT(r1, 0xab08) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0xfffffe58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 267.418375] should_failslab+0x9/0x14 [ 267.422180] kmem_cache_alloc_trace+0x2db/0x740 [ 267.426879] ? check_preemption_disabled+0x48/0x280 [ 267.431923] __kthread_create_on_node+0x137/0x540 [ 267.436774] ? loop_get_status64+0x120/0x120 [ 267.441186] ? kthread_parkme+0xb0/0xb0 [ 267.445177] ? __lockdep_init_map+0x105/0x590 [ 267.449678] ? __lockdep_init_map+0x105/0x590 [ 267.454188] ? loop_get_status64+0x120/0x120 [ 267.458617] kthread_create_on_node+0xb1/0xe0 [ 267.463126] ? __kthread_create_on_node+0x540/0x540 [ 267.468163] ? check_preemption_disabled+0x48/0x280 [ 267.473191] lo_ioctl+0xcb3/0x22a0 [ 267.476747] ? lo_rw_aio+0x1ed0/0x1ed0 [ 267.480636] ? find_held_lock+0x36/0x1c0 [ 267.484699] ? lo_rw_aio+0x1ed0/0x1ed0 [ 267.488584] blkdev_ioctl+0x988/0x21a0 [ 267.492467] ? blkpg_ioctl+0xc10/0xc10 [ 267.496335] ? lock_downgrade+0x900/0x900 [ 267.500485] ? check_preemption_disabled+0x48/0x280 [ 267.505516] ? kasan_check_read+0x11/0x20 [ 267.509644] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 267.514920] ? rcu_read_unlock_special+0x370/0x370 [ 267.519848] ? __fget+0x4d1/0x740 [ 267.523300] ? ksys_dup3+0x680/0x680 [ 267.527034] block_ioctl+0xee/0x130 [ 267.530670] ? blkdev_fallocate+0x400/0x400 [ 267.534976] do_vfs_ioctl+0x1de/0x1790 [ 267.538882] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 267.544403] ? ioctl_preallocate+0x300/0x300 [ 267.548792] ? __fget_light+0x2e9/0x430 [ 267.552743] ? fget_raw+0x20/0x20 [ 267.556181] ? rcu_read_lock_sched_held+0x14f/0x180 [ 267.561196] ? kmem_cache_free+0x24f/0x290 [ 267.565412] ? putname+0xf7/0x130 [ 267.568865] ? do_syscall_64+0x9a/0x820 [ 267.572819] ? do_syscall_64+0x9a/0x820 [ 267.576805] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 267.581389] ? security_file_ioctl+0x94/0xc0 [ 267.585796] ksys_ioctl+0xa9/0xd0 [ 267.589228] __x64_sys_ioctl+0x73/0xb0 [ 267.593092] do_syscall_64+0x1b9/0x820 [ 267.596958] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.602298] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.607204] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.612032] ? trace_hardirqs_on_caller+0x310/0x310 [ 267.617030] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 267.622028] ? prepare_exit_to_usermode+0x291/0x3b0 [ 267.627029] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.631854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.637022] RIP: 0033:0x4574e7 [ 267.640194] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.659075] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 267.666776] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 267.674042] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 267.681291] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 267.688539] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 267.695790] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 267.856554] XFS (loop2): Invalid superblock magic number 14:49:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0xfffffffffffffffc, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, r1, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet(0x2, 0x803, 0x7fffffff) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e23, 0x1, @local, 0x2}}, 0x5, 0x1, 0x4, 0x10000000000, 0x93}, &(0x7f0000000200)=0x98) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x400000, 0x0) openat$cgroup_ro(r3, &(0x7f0000000440)='pids.events\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@dev, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) 14:49:25 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) recvmmsg(r0, &(0x7f00000027c0)=[{{&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)=""/3, 0x3}, {&(0x7f0000000140)=""/154, 0x9a}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/253, 0xfd}], 0x4, &(0x7f0000000400)=""/105, 0x69}, 0x10000}, {{&(0x7f0000000480)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000001840)=[{&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/235, 0xeb}, {&(0x7f0000001600)=""/126, 0x7e}, {&(0x7f0000001680)=""/32, 0x20}, {&(0x7f00000016c0)=""/98, 0x62}, {&(0x7f0000001740)=""/210, 0xd2}], 0x6, &(0x7f00000018c0)=""/62, 0x3e}, 0xa9}, {{&(0x7f0000001900)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001980)=""/53, 0x35}, {&(0x7f00000019c0)=""/213, 0xd5}, {&(0x7f0000001ac0)=""/162, 0xa2}, {&(0x7f0000001b80)=""/106, 0x6a}, {&(0x7f0000001c00)=""/181, 0xb5}], 0x5, &(0x7f0000001d40)}, 0x5}, {{&(0x7f0000001d80)=@ll, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/76, 0x4c}, {&(0x7f0000001ec0)=""/95, 0x5f}], 0x3, &(0x7f0000001f80)=""/47, 0x2f}, 0x4d}, {{&(0x7f0000001fc0)=@nfc, 0x80, &(0x7f0000002640)=[{&(0x7f0000002040)=""/113, 0x71}, {&(0x7f00000020c0)=""/221, 0xdd}, {&(0x7f00000021c0)=""/126, 0x7e}, {&(0x7f0000002240)=""/228, 0xe4}, {&(0x7f0000002340)=""/55, 0x37}, {&(0x7f0000002380)=""/146, 0x92}, {&(0x7f0000002440)=""/155, 0x9b}, {&(0x7f0000002500)=""/162, 0xa2}, {&(0x7f00000025c0)=""/117, 0x75}], 0x9, &(0x7f0000002700)=""/184, 0xb8}, 0x2}], 0x5, 0x20, &(0x7f0000002900)={0x0, 0x1c9c380}) [ 267.927505] XFS (loop2): Invalid superblock magic number 14:49:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2(&(0x7f0000000000), 0x80000) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x3000000, 0x800040032, r0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) [ 268.040401] FAULT_INJECTION: forcing a failure. [ 268.040401] name failslab, interval 1, probability 0, space 0, times 0 [ 268.070706] CPU: 1 PID: 10979 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 268.079296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:49:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RWSTAT(r1, &(0x7f00000000c0)={0x7, 0x7f, 0x2}, 0x7) [ 268.088648] Call Trace: [ 268.091272] dump_stack+0x244/0x39d [ 268.094935] ? dump_stack_print_info.cold.1+0x20/0x20 [ 268.100148] ? account_entity_enqueue+0x3a3/0x660 [ 268.105003] should_fail.cold.4+0xa/0x17 [ 268.109089] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.114202] ? enqueue_entity+0x34b/0x20a0 [ 268.118440] ? print_usage_bug+0xc0/0xc0 [ 268.122507] ? graph_lock+0x270/0x270 [ 268.126292] ? lru_lazyfree_fn.part.23+0x1480/0x27b0 [ 268.131400] ? print_usage_bug+0xc0/0xc0 [ 268.135471] ? find_held_lock+0x36/0x1c0 [ 268.139522] ? __lock_is_held+0xb5/0x140 [ 268.143576] ? lru_lazyfree_fn.part.23+0x1488/0x27b0 [ 268.148723] ? perf_trace_sched_process_exec+0x860/0x860 [ 268.154165] ? __x2apic_send_IPI_dest+0x5c/0x80 [ 268.158824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.164361] __should_failslab+0x124/0x180 [ 268.168583] should_failslab+0x9/0x14 [ 268.172380] kmem_cache_alloc+0x2c4/0x730 [ 268.176514] ? mark_held_locks+0xc7/0x130 [ 268.180645] ? print_usage_bug+0xc0/0xc0 [ 268.184696] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 268.189700] __kernfs_new_node+0x127/0x8d0 [ 268.193944] ? trace_hardirqs_on_caller+0xc0/0x310 [ 268.198863] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 268.203628] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 268.208413] ? graph_lock+0x270/0x270 [ 268.212203] ? print_usage_bug+0xc0/0xc0 [ 268.216266] ? graph_lock+0x270/0x270 [ 268.220059] ? find_held_lock+0x36/0x1c0 [ 268.224134] kernfs_new_node+0x95/0x120 [ 268.228115] kernfs_create_dir_ns+0x4d/0x160 [ 268.232538] internal_create_group+0x5fc/0xd80 [ 268.237139] ? remove_files.isra.1+0x190/0x190 [ 268.241707] ? up_write+0x7b/0x220 [ 268.245247] ? down_write_nested+0x130/0x130 [ 268.249643] ? down_read+0x120/0x120 [ 268.253356] ? resched_curr+0x1f0/0x1f0 [ 268.257330] sysfs_create_group+0x1f/0x30 [ 268.261486] lo_ioctl+0x166a/0x22a0 [ 268.265106] ? lo_rw_aio+0x1ed0/0x1ed0 [ 268.268984] ? find_held_lock+0x36/0x1c0 [ 268.273035] ? lo_rw_aio+0x1ed0/0x1ed0 [ 268.276943] blkdev_ioctl+0x988/0x21a0 [ 268.280848] ? blkpg_ioctl+0xc10/0xc10 [ 268.284721] ? lock_downgrade+0x900/0x900 [ 268.288855] ? check_preemption_disabled+0x48/0x280 [ 268.293869] ? kasan_check_read+0x11/0x20 [ 268.298027] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 268.303318] ? rcu_read_unlock_special+0x370/0x370 [ 268.308242] ? __fget+0x4d1/0x740 [ 268.311685] ? ksys_dup3+0x680/0x680 [ 268.315430] block_ioctl+0xee/0x130 [ 268.319044] ? blkdev_fallocate+0x400/0x400 [ 268.323362] do_vfs_ioctl+0x1de/0x1790 [ 268.327235] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 268.332760] ? ioctl_preallocate+0x300/0x300 [ 268.337170] ? __fget_light+0x2e9/0x430 [ 268.341147] ? fget_raw+0x20/0x20 [ 268.344602] ? rcu_read_lock_sched_held+0x14f/0x180 [ 268.349604] ? kmem_cache_free+0x24f/0x290 [ 268.353841] ? putname+0xf7/0x130 [ 268.357304] ? do_syscall_64+0x9a/0x820 [ 268.361269] ? do_syscall_64+0x9a/0x820 [ 268.365240] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 268.369820] ? security_file_ioctl+0x94/0xc0 [ 268.374237] ksys_ioctl+0xa9/0xd0 [ 268.377681] __x64_sys_ioctl+0x73/0xb0 [ 268.381553] do_syscall_64+0x1b9/0x820 [ 268.385421] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 268.390765] ? syscall_return_slowpath+0x5e0/0x5e0 [ 268.395671] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.400496] ? trace_hardirqs_on_caller+0x310/0x310 [ 268.405492] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 268.410486] ? prepare_exit_to_usermode+0x291/0x3b0 [ 268.415497] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.420327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.425526] RIP: 0033:0x4574e7 14:49:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@sha1={0x1, "a5b6226b75030e3822955559f017e6174fcb34b4"}, 0x15, 0x1) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x20000000801, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) exit_group(0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) [ 268.428700] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.447608] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.455332] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 268.462622] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 268.469872] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 268.477122] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 268.484382] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x65) r1 = semget(0x0, 0x3, 0x0) semop(r1, &(0x7f0000000080)=[{0x4, 0x40, 0x1800}, {0x0, 0x1, 0x1000}], 0x2) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x3) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x200, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x800, 0x8, 0x2, 0xe5c}}) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:26 executing program 5: socketpair$unix(0x1, 0x8000000000000000, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:26 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:26 executing program 5: socketpair$unix(0x1, 0x800001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x5eb857) r3 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}], 0x1ee, 0x0) sendmmsg(r4, &(0x7f0000000c00), 0x4000000000001e6, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101800, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffb000/0x4000)=nil) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000100)=0x80000001) renameat2(r5, &(0x7f0000000180)='./file0\x00', r5, &(0x7f00000001c0)='./file0\x00', 0x2) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x2000000000000000, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r6, 0xc00c55ca) setsockopt(r5, 0x5, 0x100, &(0x7f0000000000)="daa8ad8144917cc5f35f399eb31ccb7d6e839181b0792c6a86cae664683eee3004611d73", 0x13) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x6) 14:49:26 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40000, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x28401, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000080)="0fc7280fc72e0f01e0c4e1ab5af3673e26640f01729beaa29d0000c50066baf80cb84cb7088bef66bafc0cedd9fd66baf80cb8ba1c4a8bef66bafc0c66b86b0066ef0f540a", 0x45}], 0x1, 0xe, &(0x7f0000000180)=[@efer={0x2, 0x8000}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) [ 268.694724] XFS (loop2): Invalid superblock magic number [ 268.728800] FAULT_INJECTION: forcing a failure. [ 268.728800] name failslab, interval 1, probability 0, space 0, times 0 [ 268.766090] CPU: 1 PID: 11031 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 268.774697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.784040] Call Trace: [ 268.786617] dump_stack+0x244/0x39d [ 268.790248] ? dump_stack_print_info.cold.1+0x20/0x20 [ 268.795420] ? radix_tree_tag_set+0x3d0/0x3d0 [ 268.799901] should_fail.cold.4+0xa/0x17 [ 268.803946] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.809037] ? kernfs_activate+0x8e/0x2c0 [ 268.813173] ? graph_lock+0x270/0x270 [ 268.816958] ? lock_release+0xa00/0xa00 [ 268.820924] ? perf_trace_sched_process_exec+0x860/0x860 [ 268.826368] ? find_held_lock+0x36/0x1c0 [ 268.830414] ? __lock_is_held+0xb5/0x140 [ 268.834459] ? perf_trace_sched_process_exec+0x860/0x860 [ 268.839884] ? find_held_lock+0x36/0x1c0 [ 268.843927] __should_failslab+0x124/0x180 [ 268.848139] should_failslab+0x9/0x14 [ 268.851915] kmem_cache_alloc+0x2c4/0x730 [ 268.856038] ? find_held_lock+0x36/0x1c0 [ 268.860098] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 268.865097] __kernfs_new_node+0x127/0x8d0 [ 268.869318] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 268.874064] ? kasan_check_write+0x14/0x20 [ 268.874080] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 268.874093] ? __kernfs_new_node+0x697/0x8d0 [ 268.874117] ? wait_for_completion+0x8a0/0x8a0 [ 268.874133] ? graph_lock+0x270/0x270 [ 268.883329] ? kasan_check_write+0x14/0x20 [ 268.900293] ? __lock_is_held+0xb5/0x140 [ 268.904406] ? wait_for_completion+0x8a0/0x8a0 [ 268.908972] ? mutex_unlock+0xd/0x10 [ 268.912662] ? kernfs_activate+0x21a/0x2c0 [ 268.916891] kernfs_new_node+0x95/0x120 [ 268.920865] __kernfs_create_file+0x5a/0x340 [ 268.925259] sysfs_add_file_mode_ns+0x222/0x530 [ 268.929929] internal_create_group+0x3df/0xd80 [ 268.934494] ? remove_files.isra.1+0x190/0x190 [ 268.939052] ? up_write+0x7b/0x220 [ 268.942574] ? down_write_nested+0x130/0x130 [ 268.946965] ? down_read+0x120/0x120 [ 268.950663] ? resched_curr+0x1f0/0x1f0 [ 268.954626] sysfs_create_group+0x1f/0x30 [ 268.958759] lo_ioctl+0x166a/0x22a0 [ 268.962374] ? lo_rw_aio+0x1ed0/0x1ed0 [ 268.966250] ? find_held_lock+0x36/0x1c0 [ 268.970299] ? lo_rw_aio+0x1ed0/0x1ed0 [ 268.974171] blkdev_ioctl+0x988/0x21a0 [ 268.978071] ? blkpg_ioctl+0xc10/0xc10 [ 268.981942] ? lock_downgrade+0x900/0x900 [ 268.986075] ? check_preemption_disabled+0x48/0x280 [ 268.991075] ? kasan_check_read+0x11/0x20 [ 268.995205] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 269.000463] ? rcu_read_unlock_special+0x370/0x370 [ 269.005385] ? __fget+0x4d1/0x740 [ 269.008877] ? ksys_dup3+0x680/0x680 [ 269.012595] block_ioctl+0xee/0x130 [ 269.016206] ? blkdev_fallocate+0x400/0x400 [ 269.020513] do_vfs_ioctl+0x1de/0x1790 [ 269.024385] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 269.029903] ? ioctl_preallocate+0x300/0x300 [ 269.034292] ? __fget_light+0x2e9/0x430 [ 269.038241] ? fget_raw+0x20/0x20 [ 269.041671] ? rcu_read_lock_sched_held+0x14f/0x180 [ 269.046682] ? kmem_cache_free+0x24f/0x290 [ 269.050912] ? putname+0xf7/0x130 [ 269.054356] ? do_syscall_64+0x9a/0x820 [ 269.058311] ? do_syscall_64+0x9a/0x820 [ 269.062282] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 269.066848] ? security_file_ioctl+0x94/0xc0 [ 269.071284] ksys_ioctl+0xa9/0xd0 [ 269.074727] __x64_sys_ioctl+0x73/0xb0 [ 269.078596] do_syscall_64+0x1b9/0x820 [ 269.082464] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 269.087809] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.092719] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.097559] ? trace_hardirqs_on_caller+0x310/0x310 [ 269.102554] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 269.107565] ? prepare_exit_to_usermode+0x291/0x3b0 [ 269.112567] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.117405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.122574] RIP: 0033:0x4574e7 [ 269.125747] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.144727] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 269.152426] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 269.159675] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 269.166962] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 269.174208] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 269.181468] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:26 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x0, 0x11a6, 0x100000001, 0x51f83fb6}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'fpu(chacha20)\x00'}, 0xfffffffffffffdc4) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x10880, 0x9c) write$P9_ROPEN(r1, &(0x7f00000000c0)={0x18, 0x71, 0x1, {{0x92, 0x1}, 0xffffffffffffb47d}}, 0x18) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000240)='./file0\x00', 0xfa6, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="e70c3aad014238891cf9138f89d5d8d96a3ac1dedc362929819f8ac077984a10b1a7a6f09042d101d1827fe316b73feb4af26482c69c479b6ad2c9de9597aa376a94d175382097fbf1537fbbfab7d215c8660d409a9bfc67", 0x58, 0x8}, {&(0x7f0000000300)="8d5b642921179b19554e817005ea13bd6280d5ecf5fbddb715ae20006ad4f3d75b04999ed522944bde9fa5cf7dd64f3a8c61302be8abff462457bd9776f4bc0537d815ab32203a19db0312365ac6a79d586d9c6f63c1a5d2", 0x58, 0xca}], 0x210000, &(0x7f0000000440)={[{@utf8='utf8'}, {@dmode={'dmode', 0x3d, 0x4}}, {@cruft='cruft'}, {@check_strict='check=strict'}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fsname={'fsname', 0x3d, '*securityS'}}]}) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000100)={[{0x2b8, 0x7, 0x2, 0x8, 0x2, 0x9, 0x6, 0xb865, 0x3, 0x8, 0x1, 0x4, 0xfffffffffffff001}, {0x6a8f, 0x7f, 0x4332, 0x0, 0x200, 0x1, 0x81, 0x6c8, 0x0, 0x0, 0x1, 0x1a94, 0x80000001}, {0x40, 0x7, 0x4, 0x4, 0xffffffffffff4030, 0xffffffffffffff01, 0x800, 0x8, 0x3, 0x4, 0x2, 0x7ff, 0x3}], 0x7}) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000180)={0x0, 0x0, [0x2, 0x6, 0x8bb, 0x8000, 0xffff, 0x7, 0x40, 0x100000001]}) 14:49:26 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xf7e0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) getsockopt$inet_dccp_buf(r2, 0x21, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000080)={0xe8, 0x67a, 0x7, {r3, r4+30000000}, 0x1, 0xcdbe}) 14:49:26 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:26 executing program 3: r0 = epoll_create(0x1f) fcntl$getflags(r0, 0x40a) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 269.338455] FAULT_INJECTION: forcing a failure. [ 269.338455] name failslab, interval 1, probability 0, space 0, times 0 14:49:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0xfffffffffffffffe) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfff, 0x402) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xfff) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f00000017c0)={0x0, @bt={0x64, 0x80000000, 0x1, 0x3, 0x2, 0x3, 0x7, 0x1, 0xffffffffffff6b19, 0x68, 0xbcbd, 0xfffffffffffffffa, 0x3f, 0x2, 0x1, 0x6}}) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000180)=""/4096, 0x20000, 0x800, 0x3}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) write$binfmt_elf32(r0, &(0x7f0000001180)={{0x7f, 0x45, 0x4c, 0x46, 0xc3, 0x2, 0x3ff, 0x2, 0xc000000000000000, 0x3, 0x3e, 0x3, 0x11, 0x38, 0xd3, 0x200, 0x38cecf1c, 0x20, 0x1, 0x2, 0x6, 0xffffffffedc50d52}, [{0x60000007, 0x7, 0x2, 0x81, 0x10000, 0x7, 0x3}, {0x0, 0x5, 0x2, 0x1, 0x7, 0xaae0, 0xdad7, 0x10001}], "0fc56ac789ad947658a1ae9e97a998f071ab003d632c606088a93f896eae7ba51bf65de5846abf0b10db6b5d61cde43d11197ff8a686d3cb69e220bf24ae2419534b2ab525c24f23729666db56b9f0a7c34e6063085929c0e41ea1f2ea58d409406ae5eb7e361264ad48a70d144ee8465470db5ba52d8882ef90df7bc3010aa0748bee8eefa070326a40d81f6c53567abaca34fe8e534c8391625cc6f2d6d1ab7000b3da02d136057cc9b3fcca40fecb2d97d730f93f4b0adb9393", [[], [], [], [], []]}, 0x633) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f00000000c0)={0x100, 0x1}) [ 269.381134] CPU: 1 PID: 11053 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 269.389739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.399093] Call Trace: [ 269.401723] dump_stack+0x244/0x39d [ 269.405370] ? dump_stack_print_info.cold.1+0x20/0x20 [ 269.410578] should_fail.cold.4+0xa/0x17 [ 269.414658] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.419754] ? lock_release+0xa00/0xa00 [ 269.423708] ? perf_trace_sched_process_exec+0x860/0x860 [ 269.429210] ? graph_lock+0x270/0x270 [ 269.433042] ? find_held_lock+0x36/0x1c0 [ 269.437096] ? __lock_is_held+0xb5/0x140 [ 269.441154] ? perf_trace_sched_process_exec+0x860/0x860 [ 269.446623] ? kernfs_activate+0x21a/0x2c0 [ 269.450877] __should_failslab+0x124/0x180 [ 269.455094] should_failslab+0x9/0x14 [ 269.458884] kmem_cache_alloc+0x2c4/0x730 [ 269.463041] ? lock_downgrade+0x900/0x900 [ 269.467189] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 269.472190] __kernfs_new_node+0x127/0x8d0 [ 269.476407] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 269.481140] ? graph_lock+0x270/0x270 [ 269.484979] ? __lock_is_held+0xb5/0x140 [ 269.489048] ? wait_for_completion+0x8a0/0x8a0 [ 269.493617] ? mutex_unlock+0xd/0x10 [ 269.497329] ? kernfs_activate+0x21a/0x2c0 [ 269.501557] ? kernfs_walk_and_get_ns+0x340/0x340 [ 269.506399] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 269.511918] ? kernfs_link_sibling+0x1d2/0x3b0 [ 269.516529] kernfs_new_node+0x95/0x120 [ 269.520491] __kernfs_create_file+0x5a/0x340 [ 269.524884] sysfs_add_file_mode_ns+0x222/0x530 [ 269.529540] internal_create_group+0x3df/0xd80 [ 269.534113] ? remove_files.isra.1+0x190/0x190 [ 269.538679] ? up_write+0x7b/0x220 [ 269.542236] ? down_write_nested+0x130/0x130 [ 269.546645] ? down_read+0x120/0x120 [ 269.550402] ? resched_curr+0x1f0/0x1f0 [ 269.554365] sysfs_create_group+0x1f/0x30 [ 269.558524] lo_ioctl+0x166a/0x22a0 [ 269.562141] ? lo_rw_aio+0x1ed0/0x1ed0 [ 269.566053] ? find_held_lock+0x36/0x1c0 [ 269.570130] ? lo_rw_aio+0x1ed0/0x1ed0 [ 269.574012] blkdev_ioctl+0x988/0x21a0 [ 269.577883] ? blkpg_ioctl+0xc10/0xc10 [ 269.581762] ? lock_downgrade+0x900/0x900 [ 269.585939] ? check_preemption_disabled+0x48/0x280 [ 269.590953] ? kasan_check_read+0x11/0x20 [ 269.595102] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 269.600368] ? rcu_read_unlock_special+0x370/0x370 [ 269.605317] ? __fget+0x4d1/0x740 [ 269.608771] ? ksys_dup3+0x680/0x680 [ 269.612477] block_ioctl+0xee/0x130 [ 269.616117] ? blkdev_fallocate+0x400/0x400 [ 269.620443] do_vfs_ioctl+0x1de/0x1790 [ 269.624325] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 269.629852] ? ioctl_preallocate+0x300/0x300 [ 269.634244] ? __fget_light+0x2e9/0x430 [ 269.638205] ? fget_raw+0x20/0x20 [ 269.641642] ? rcu_read_lock_sched_held+0x14f/0x180 [ 269.646650] ? kmem_cache_free+0x24f/0x290 [ 269.650886] ? putname+0xf7/0x130 [ 269.654337] ? do_syscall_64+0x9a/0x820 [ 269.658315] ? do_syscall_64+0x9a/0x820 [ 269.662281] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 269.666879] ? security_file_ioctl+0x94/0xc0 [ 269.671277] ksys_ioctl+0xa9/0xd0 [ 269.674719] __x64_sys_ioctl+0x73/0xb0 [ 269.678591] do_syscall_64+0x1b9/0x820 [ 269.682482] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 269.687836] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.692749] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.697592] ? trace_hardirqs_on_caller+0x310/0x310 [ 269.702608] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 269.707627] ? prepare_exit_to_usermode+0x291/0x3b0 [ 269.712631] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.717478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.722661] RIP: 0033:0x4574e7 [ 269.725854] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.744744] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 269.752432] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 269.759683] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 269.766931] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 269.774180] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 14:49:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x2, 0x2000) inotify_add_watch(r1, &(0x7f0000000240)='./file0\x00', 0x4000200) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000100)={0x5, 0x1, 0x81, 0x7f}, 0x8) ioctl$int_in(r0, 0x5473, &(0x7f0000000140)) bind$alg(r0, &(0x7f0000000400)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x3c9) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x3, 0x2, 0x205, 0x6, 0x800, 0x4, 0x0, 0x1, r2}, &(0x7f0000000200)=0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r3 = semget(0x1, 0x8, 0x483) clock_gettime(0x0, &(0x7f00000001c0)) semctl$GETZCNT(r3, 0x1, 0xf, &(0x7f0000000000)=""/19) 14:49:27 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000840)='/dev/cec#\x00', 0x2, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x100, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(twofish)\x00'}, 0x58) bind$alg(r2, &(0x7f0000000380)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0xfffffffffffffee2) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xb) r3 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x6000, 0x20) getsockopt$inet_dccp_buf(r3, 0x21, 0x0, &(0x7f0000000140)=""/225, &(0x7f0000000240)=0xe1) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r3, 0x10f, 0x84, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80000, 0x0) ioctl$SG_GET_NUM_WAITING(r4, 0x227d, &(0x7f0000000400)) syz_mount_image$hfsplus(&(0x7f0000000440)='hfsplus\x00', &(0x7f0000000480)='./file0\x00', 0x6, 0x4, &(0x7f0000000680)=[{&(0x7f00000004c0)="f6b94ec8ebd17bb778df728439d487734d2482f5c55761c8c57d9f5cb985f795dd91d861c6", 0x25, 0x7}, {&(0x7f0000000500)="c10dfe8f8373f2ab1a2d7370021c660a4e64c677e0b13122fc4e0820f02a02f16428fb78e1a5921f89cd815302ce64ceb3c4977c16175d92a727ae5e4b34374ab6f564494d16ca05801ae2961fa3f0ba888c7a6b335e3a5abfa37c163ae5a28c27c20c21ed7c0b845ad66865f513432418b3", 0x72, 0x3}, {&(0x7f0000000580)="bfdc864c4d36f99ddde5212b8f19816d77fbd312e06de7a4216671bc538cffacafcbc9d2baeea9d509bd6e62c63c589932299a6aead8e918d8bb14d064fd4f85ebc0c140894ce95765a625bf031da08adb716debbc4635272e502443ba97b7871d6395ffd1e52f7ff448fddd0c686fc956a66f8fd4e40b230ef61bbf2bc327c4432eb10351df", 0x86, 0x48f1}, {&(0x7f0000000640)="197ddb3534a81df32d39a95f7604e174f31a0d5b89027ab2256c4a90ad8ac983dedddddb69081285b4625cab7253c971fc21dc80b0cd510ff85279ab", 0x3c, 0x80000000}], 0x21001, &(0x7f0000000700)=ANY=[@ANYBLOB="706172743d3078303030303030303038303030303030302c6e6fee6fbe5fea41a2e081d7e7626172726965722c7365636c6162656c2c6f626a5f"]) ioctl$SG_SET_DEBUG(r4, 0x227e, &(0x7f00000000c0)=0x1) renameat(r1, &(0x7f0000000740)='./file1\x00', r0, &(0x7f0000000780)='./file0\x00') ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f00000007c0)=0xffffffffffffffff) [ 269.781430] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x800c0, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000040)={0x9, 0xb, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) setsockopt$inet_tcp_int(r1, 0x6, 0x24, &(0x7f0000000080)=0x84a7, 0x4) 14:49:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) [ 269.947923] XFS (loop2): Invalid superblock magic number 14:49:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:27 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x80000000) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r3, 0xc00c55ca) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x7) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)) 14:49:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TIOCNXCL(r1, 0x540d) write$binfmt_script(r0, &(0x7f0000000400)={'#! ', './file0', [{0x20, "647262675f70725f6374725f616573313932008d9e0bfa26e5967c8c85245a25a4c4f69ca06dbad5c3d1fb491e134ec4e44ff65adf5be65e44b3ac4c13defe2548"}, {0x20, '(-,system%eth1posix_acl_access'}], 0xa, "8e55eaba031569d9da59d34b3349441fb3c84877297094a212c52bba96453df7f0ec41af59f8fa1739fc076bbbf8093a927f8c2c9f07a9c89221dc1fa30717c765efe8d27b02e228ceb6a6a1f3f2f3a977be86cd71ceaeba6f6f5b9b8497c31e1aa8a96f0c3e01a06aed74ad02a40a4272b46722e61dd3ba0debca54ab1ad885f89dad01cd5b0b28382522d09d993baaf93fc8d515fe0c11e3cbd992fb7ecdae44415ad30b1666dc1ffa3bb9a02781b59857c2a39413e2bff154a2feb570c706b2c030d884d0372480cc3b18a44aa3dfb0d5a64dd1d67edf"}, 0xc5) getsockopt$inet6_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000240)=""/138, &(0x7f0000000040)=0x8a) 14:49:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0x5, 0x1}) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000040)={0x6, 0x7f, 0x9, {0x0, 0x1c9c380}, 0x6, 0x8}) 14:49:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) flistxattr(r0, &(0x7f0000000400)=""/4096, 0x1000) 14:49:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x8bc1, 0x1ffe) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000300)=0x86) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000140)=[0x1, 0x1]) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000180)={0xe, 0x7fff, {0x51, 0x18c, 0x22, {0xfffffffffffffffd, 0xfff}, {0xc96, 0x81}, @ramp={0x80000000, 0x3078000000000, {0x4, 0x5, 0x4, 0xddf}}}, {0x0, 0x8, 0x10000, {0x100000001, 0x6}, {0x800, 0x1f}, @cond=[{0xffffffffffffff01, 0x948f, 0x3e0000000, 0x800, 0x7fffffff, 0x10001}, {0x40, 0x3ff, 0xfffffffffffeffff, 0xf6, 0xffffffffffffffff, 0xfff}]}}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/hci\x00') bind$can_raw(r2, &(0x7f0000000340), 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xb, "dcc0fc83bb04afe15b6f31"}, &(0x7f0000000240)=0x13) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000280)={r3, 0x8000}, &(0x7f00000002c0)=0x8) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f0000000400)={0x6, 0x2, 0x5}) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000080)) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r2, 0xc00c55ca) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x201, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) 14:49:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x2) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = accept4(r0, &(0x7f0000000100)=@ax25, &(0x7f0000000180)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 14:49:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 270.230148] FAULT_INJECTION: forcing a failure. [ 270.230148] name failslab, interval 1, probability 0, space 0, times 0 [ 270.241861] CPU: 0 PID: 11128 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 270.250454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.259808] Call Trace: [ 270.262424] dump_stack+0x244/0x39d [ 270.266088] ? dump_stack_print_info.cold.1+0x20/0x20 [ 270.271310] should_fail.cold.4+0xa/0x17 [ 270.275422] ? fault_create_debugfs_attr+0x1f0/0x1f0 14:49:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x82, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100), 0x4) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18, 0x1, 0x0, {0x2}}, 0x18) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=0x0, &(0x7f0000000280)=0x4) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)={r2, 0x18}, &(0x7f0000000300)=0x8) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f00000004c0)=""/162) [ 270.280540] ? lock_release+0xa00/0xa00 [ 270.284527] ? perf_trace_sched_process_exec+0x860/0x860 [ 270.289996] ? graph_lock+0x270/0x270 [ 270.293819] ? find_held_lock+0x36/0x1c0 [ 270.297893] ? __lock_is_held+0xb5/0x140 [ 270.301994] ? perf_trace_sched_process_exec+0x860/0x860 [ 270.307456] ? kernfs_activate+0x21a/0x2c0 [ 270.311717] __should_failslab+0x124/0x180 [ 270.315976] should_failslab+0x9/0x14 [ 270.319791] kmem_cache_alloc+0x2c4/0x730 [ 270.323964] ? lock_downgrade+0x900/0x900 [ 270.328126] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 270.333160] __kernfs_new_node+0x127/0x8d0 [ 270.337412] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 270.342174] ? graph_lock+0x270/0x270 [ 270.345992] ? __lock_is_held+0xb5/0x140 [ 270.350071] ? wait_for_completion+0x8a0/0x8a0 [ 270.354649] ? mutex_unlock+0xd/0x10 [ 270.358362] ? kernfs_activate+0x21a/0x2c0 [ 270.362599] ? kernfs_walk_and_get_ns+0x340/0x340 [ 270.367436] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 270.372967] ? kernfs_link_sibling+0x1d2/0x3b0 [ 270.377542] kernfs_new_node+0x95/0x120 [ 270.381507] __kernfs_create_file+0x5a/0x340 [ 270.385904] sysfs_add_file_mode_ns+0x222/0x530 [ 270.390563] internal_create_group+0x3df/0xd80 [ 270.395138] ? remove_files.isra.1+0x190/0x190 [ 270.399721] ? up_write+0x7b/0x220 [ 270.403272] ? down_write_nested+0x130/0x130 [ 270.407696] ? down_read+0x120/0x120 [ 270.411397] ? resched_curr+0x1f0/0x1f0 [ 270.415377] sysfs_create_group+0x1f/0x30 [ 270.419524] lo_ioctl+0x166a/0x22a0 [ 270.423146] ? lo_rw_aio+0x1ed0/0x1ed0 [ 270.427033] ? find_held_lock+0x36/0x1c0 [ 270.431084] ? lo_rw_aio+0x1ed0/0x1ed0 [ 270.434979] blkdev_ioctl+0x988/0x21a0 [ 270.438861] ? blkpg_ioctl+0xc10/0xc10 [ 270.442747] ? lock_downgrade+0x900/0x900 [ 270.446912] ? check_preemption_disabled+0x48/0x280 [ 270.451921] ? kasan_check_read+0x11/0x20 [ 270.456087] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 270.461356] ? rcu_read_unlock_special+0x370/0x370 [ 270.466271] ? __fget+0x4d1/0x740 [ 270.469717] ? ksys_dup3+0x680/0x680 [ 270.473469] block_ioctl+0xee/0x130 [ 270.477117] ? blkdev_fallocate+0x400/0x400 [ 270.481434] do_vfs_ioctl+0x1de/0x1790 [ 270.485304] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 270.490831] ? ioctl_preallocate+0x300/0x300 [ 270.495230] ? __fget_light+0x2e9/0x430 [ 270.499187] ? fget_raw+0x20/0x20 [ 270.502627] ? rcu_read_lock_sched_held+0x14f/0x180 [ 270.507630] ? kmem_cache_free+0x24f/0x290 [ 270.511845] ? putname+0xf7/0x130 [ 270.515284] ? do_syscall_64+0x9a/0x820 [ 270.519249] ? do_syscall_64+0x9a/0x820 [ 270.523220] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 270.527800] ? security_file_ioctl+0x94/0xc0 [ 270.532190] ksys_ioctl+0xa9/0xd0 [ 270.535634] __x64_sys_ioctl+0x73/0xb0 [ 270.539514] do_syscall_64+0x1b9/0x820 [ 270.543396] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 270.548777] ? syscall_return_slowpath+0x5e0/0x5e0 [ 270.553691] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.558527] ? trace_hardirqs_on_caller+0x310/0x310 [ 270.563537] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 270.568547] ? prepare_exit_to_usermode+0x291/0x3b0 [ 270.573557] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.578452] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.583635] RIP: 0033:0x4574e7 [ 270.586824] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.605725] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 270.613413] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 270.620677] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 270.627928] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 270.635179] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 270.642429] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 270.804625] XFS (loop2): Invalid superblock magic number 14:49:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x42a843) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r3 = dup3(r0, r0, 0x80000) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0xc2, 0x0) r5 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x2, 0x2) r6 = dup2(r0, r0) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x40480, 0x0) r8 = dup(r0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010029bd7000fcdbdf25030000000c000400bd8a0000000000003400070008000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8], 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:28 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400, 0x0) ioctl$KVM_SET_XSAVE(r2, 0x5000aea5, &(0x7f0000000280)={"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"}) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 270.879704] XFS (loop2): Invalid superblock magic number [ 270.969794] FAULT_INJECTION: forcing a failure. [ 270.969794] name failslab, interval 1, probability 0, space 0, times 0 [ 270.993849] CPU: 0 PID: 11188 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 271.002453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.011797] Call Trace: [ 271.014421] dump_stack+0x244/0x39d 14:49:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3654, 0x4e00) ioctl$TCSBRK(r0, 0x5409, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) lseek(r1, 0x0, 0x0) 14:49:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 271.018060] ? dump_stack_print_info.cold.1+0x20/0x20 [ 271.023288] should_fail.cold.4+0xa/0x17 [ 271.027362] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.032474] ? lock_release+0xa00/0xa00 [ 271.036452] ? perf_trace_sched_process_exec+0x860/0x860 [ 271.041909] ? graph_lock+0x270/0x270 [ 271.045720] ? find_held_lock+0x36/0x1c0 [ 271.049786] ? __lock_is_held+0xb5/0x140 [ 271.053867] ? perf_trace_sched_process_exec+0x860/0x860 [ 271.059323] ? kernfs_activate+0x21a/0x2c0 [ 271.063579] __should_failslab+0x124/0x180 14:49:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x402, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8a04d902cb4dc27e}, 0x8080) ioctl$sock_proto_private(r0, 0x89e9, &(0x7f0000000080)="51b73ed1") bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 271.067844] should_failslab+0x9/0x14 [ 271.071660] kmem_cache_alloc+0x2c4/0x730 [ 271.075842] ? lock_downgrade+0x900/0x900 [ 271.080016] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 271.085039] __kernfs_new_node+0x127/0x8d0 [ 271.089284] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 271.094046] ? graph_lock+0x270/0x270 [ 271.097861] ? __lock_is_held+0xb5/0x140 [ 271.101926] ? wait_for_completion+0x8a0/0x8a0 [ 271.106525] ? mutex_unlock+0xd/0x10 [ 271.110262] ? kernfs_activate+0x21a/0x2c0 [ 271.114503] ? kernfs_walk_and_get_ns+0x340/0x340 14:49:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x20000, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000280)) 14:49:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={r2, 0x5}, &(0x7f0000000180)=0x8) 14:49:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={r2, 0x20}, &(0x7f0000000180)=0x8) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x400) [ 271.119364] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 271.124915] ? kernfs_link_sibling+0x1d2/0x3b0 [ 271.129629] kernfs_new_node+0x95/0x120 [ 271.133629] __kernfs_create_file+0x5a/0x340 [ 271.138048] sysfs_add_file_mode_ns+0x222/0x530 [ 271.142734] internal_create_group+0x3df/0xd80 [ 271.147322] ? remove_files.isra.1+0x190/0x190 [ 271.151944] ? up_write+0x7b/0x220 [ 271.155506] ? down_write_nested+0x130/0x130 [ 271.159938] ? down_read+0x120/0x120 [ 271.163678] ? resched_curr+0x1f0/0x1f0 [ 271.167663] sysfs_create_group+0x1f/0x30 [ 271.171818] lo_ioctl+0x166a/0x22a0 [ 271.175460] ? lo_rw_aio+0x1ed0/0x1ed0 [ 271.179360] ? find_held_lock+0x36/0x1c0 [ 271.183460] ? lo_rw_aio+0x1ed0/0x1ed0 [ 271.187376] blkdev_ioctl+0x988/0x21a0 [ 271.191260] ? blkpg_ioctl+0xc10/0xc10 [ 271.195126] ? lock_downgrade+0x900/0x900 [ 271.199254] ? check_preemption_disabled+0x48/0x280 [ 271.204254] ? kasan_check_read+0x11/0x20 [ 271.208382] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 271.213635] ? rcu_read_unlock_special+0x370/0x370 [ 271.218547] ? __fget+0x4d1/0x740 [ 271.222000] ? ksys_dup3+0x680/0x680 [ 271.225728] block_ioctl+0xee/0x130 [ 271.229354] ? blkdev_fallocate+0x400/0x400 [ 271.233657] do_vfs_ioctl+0x1de/0x1790 [ 271.237521] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 271.243043] ? ioctl_preallocate+0x300/0x300 [ 271.247434] ? __fget_light+0x2e9/0x430 [ 271.251390] ? fget_raw+0x20/0x20 [ 271.254841] ? rcu_read_lock_sched_held+0x14f/0x180 [ 271.259855] ? kmem_cache_free+0x24f/0x290 [ 271.264072] ? putname+0xf7/0x130 [ 271.267509] ? do_syscall_64+0x9a/0x820 [ 271.271464] ? do_syscall_64+0x9a/0x820 [ 271.275422] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 271.279985] ? security_file_ioctl+0x94/0xc0 [ 271.284377] ksys_ioctl+0xa9/0xd0 [ 271.287827] __x64_sys_ioctl+0x73/0xb0 [ 271.291705] do_syscall_64+0x1b9/0x820 [ 271.295577] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 271.300926] ? syscall_return_slowpath+0x5e0/0x5e0 [ 271.305837] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.310660] ? trace_hardirqs_on_caller+0x310/0x310 [ 271.315658] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 271.320659] ? prepare_exit_to_usermode+0x291/0x3b0 [ 271.325660] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.330492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.335661] RIP: 0033:0x4574e7 [ 271.338884] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.357763] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 271.365448] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 271.372696] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 271.379950] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 271.387197] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 271.394444] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 271.511527] XFS (loop2): Invalid superblock magic number [ 271.588444] XFS (loop2): Invalid superblock magic number 14:49:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:29 executing program 3: r0 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000340)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000400)='trusted.overlay.opaque\x00', &(0x7f0000000440)='y\x00', 0x2, 0x2) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0xfffffffffffffffc, 0x105880) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0x6a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) setreuid(r3, r4) setsockopt$inet_buf(r2, 0x0, 0x0, &(0x7f0000000480)="ade7bc8eff01a5943f098ccab512fbdc70c90ff1b8a61917e93ffed98b7e263dc99e651b9e96b8de45e1d7b5b63d", 0x2e) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:29 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000040)) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000400), &(0x7f0000000440)=0x4) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000340)="79a224f67c958d20bd15051dde6709b8fce11bcf801c1dcab34d9c1889fbf443c52df6ba8e964da8a7771140ca52116f23", 0x31) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x134, r2, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe0f3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffc8f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x17e3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffe00000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9f}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_NET={0x4}]}, 0x134}, 0x1, 0x0, 0x0, 0x80}, 0x40005) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-aesni\x00'}, 0xc8e4389c53dbc793) 14:49:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000003440)='cpuacct.usage_percpu\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000200)='/dev/ion\x00'}, 0x30) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x200000, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000003240)=0x0) fstat(0xffffffffffffffff, &(0x7f0000003280)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000003300)=[0xee01, 0x0, 0x0]) r7 = getpgid(0x0) fstat(0xffffffffffffff9c, &(0x7f0000003340)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000033c0)=[0xee00]) r10 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r11 = syz_open_dev$sndpcmc(&(0x7f0000003400)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffff8, 0x101801) r12 = socket$can_raw(0x1d, 0x3, 0x1) r13 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r14 = openat$cuse(0xffffffffffffff9c, &(0x7f0000003500)='/dev/cuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003540)={0x0}, &(0x7f0000003580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000035c0)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000036c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003780)=0x0) stat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003900)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003940)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003a40)=0xe8) r23 = getgid() r24 = socket$inet6(0xa, 0x0, 0xd3) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000003a80)=0x0) lstat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000003d80)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f00000000c0)="f7e3c91f845af5b4e5969c35cb87e92e28296c68584f5a259f100e919a241a496955aa9264a968342cb6e79ab0e7be4622d3a53007488c221736bdc0dc773556fd979f8beda3a717381a725ad44bf59deb946d146160f1e60803d896dedcc03734658b64d351dd095a96a928d6575701a6b12f6eb3", 0x75}, {&(0x7f0000000180)="fa0b6b4483dfd09bc796755173ba1570519b972314d5bd0fea34d65801c53f6aceb6630112ca0b3953695c6b1a151c4a981f05516c135e988d616c70d230c8754abb6973a942a578c314412e7cf2358ec1612e", 0x53}, {&(0x7f0000000280)="aee0e298a8b6b637f7a216378157238a0065d6876128baef02a31f69dc8a97c74dd300012d3bab0ec329ad3c1b7615a5d7f668c398f63d9bbce96add9e8d7b17319732254a4fbbe9694b07344dfe86cb4d77b80ebab3ac41f527714c93bb68fce31c86a3", 0x64}, {&(0x7f0000000300)="c3ab675e571dcf901500a22686c95e536d6630b29ef930532b95b64e574232214361091dc8b6c4ba7aef19b9c85418e048678481604f1b16849f4cb5967d3d4ddd654570bd259f5d6c9c41c508d04346c2529f1dc6c1892ed774d063bc0831380e9380a4f06f3e9901bb21d74d3f931b628b5278d51e1597b7010b2aa80549047bd419412ee592a56a35bbb700706e53ad5d35bbdc0a01e40ae5", 0x9a}, {&(0x7f00000003c0)="409350aaed6238c5e41b7e688bbea0b498f694b038998dbec927412159d69982c2954b845ba2588f555c4648c4e164e66e998da90fe562e706a15ee783e56d58424fe01be6d38915c6ab003db26b9e400f711671b7446f8a45ec6fcbc96652007f3ddd5ed3fb4e3fbb5172bb92123b10d666", 0x72}, {&(0x7f0000000440)="09ba9865010117485f76cd634ed15becb8622002d09224a08d991776c68c16f8479fbafd814ba3a817422630ad673a6d06958ff2e93f31ce08a16028e1e7b61291fb5757d6871bb3be146a39d78bd3e56ad6da879d00642e72670348f6d5df25cb9b", 0x62}, {&(0x7f00000004c0)="8a8f9ea6b54461a0f40d499455516cfdf157ef3671b60cd99ae2842eb0ea56bceafd6bdc6de76e237ea801584026218de0b5a6ac266cc3b34e651a3efdd0e9f8f03b77", 0x43}], 0x7, &(0x7f0000000680)=[@rights={0x20, 0x1, 0x1, [r1, r2, r3]}], 0x20}, {&(0x7f00000006c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001800)=[{&(0x7f0000000740)="a735b7975d0fae1e950347f7c5a90d14cd7bf0e2697670319fedb3293a2cdf02f2652bca5219c08e9213694b8175bc540f45d60e7aa6d80eb0230ec4a0e98e44569500ae7de8c4bbd2b2e46732aff662007cedb8844d991b6126fdd9dcee5d62de52284a5be5234e54ac35cec3a5921d71e91926e8eb88bed945dec98c45f2049708d00adbc8961a7cc9a935693a37e8439451dc05be7aa8586e095d42e85b91caf4a56c838290a3a4cc", 0xaa}, {&(0x7f0000000800)="b7ff27f4ecd68ab428863e31e53d2ab5e6d1471e1e01af5065548509682f9dfcc1e1e6bf2f6d0e82f9ac5c4ec3320a28fc462593dc6e065793f3588555453ff2597e820f22a7f0862ba5609852b240a9ee278ada35aacd3ebac89457b83942d7692f78e26d19d216c59b6dbe499c3d8b76e2a6a28c4418238ad046ca22b04974be87825a81ba87109bdda1f3788202d82b84a1b6f74c776c6229bd7c09665ea5bcd061ce6c5bacaebb9a2f5a13c2567da4663ad18ac2d9284f17ff6d61a53ab73bc159b01e0e7abd1678358965829cc6ee079bd8094e1b270034e834a7a82c9be731aa66b70aa09dff6823b3943f70c180327f88fd91d228a96792eb7e9fb7c57c56622759e68fabb450984505f5d1da10c991234c43ac12d0dc45539c1e15b689cb3b1ef9a69eb0b494c6ed0cb12573dce7ac81d67ab099129852119325d3ff3646db7be4496bf8af822ac93b621ed9d5dead32fa7863da839782cd7fc1d6bf51f080cb005738adf36074bbc37ced903d846e76b25612c3513d1160355637f85e91e9f5944c200a70e57e86c0118ef3dd8c7b44b8617cf7b57c30e4c5cfc3cc2e4add418251fc5b71c270b72b9025a0bb6777978603b9bc5dda3033a10a88ff8bb834b6c26d2b509881b7ed218bdf67973db3bfdbe861937da50b48f2b00312824317e1af17c9c1000ee50b426b4916292c87406765888861bb3bd698fc711fb8e233fb75b51620c1c5c8b8e8587ca523de35b44fa44175ce02a4457ad3b8766d2e3b7a3d732c989b8eb58b3166aa5aa88d6243ee04816746ce118f97421a5faac52a41d2b37f6f13baf0c11bf067bb5ac810cf2150cced885327f6b82fbdd5d9fdd39909852d8c61c2c8670baa76bd90990e9fccb0a79e02796addeb6179af7223439de3c1d90b6fad8bd492407f343f8425c6649ba4b4fec86bd3cb0004e7725f9b9deba8e8a79d161483960578b2f4b92413ec4f90b624061929f16d688fcf344ae5b159197f57ca997ad0de95fee2315bc1fbda91b521df4cd99d6b009dee1998347a63f9fd711f9983cbf5892f9623f90e2d26842bebbe8aee72a11106e68bfaf39c1314442391154e98ee791686f2b4bebe4fdd6537c1332a5e220fb7677c8f53c3ca6157ed048c0ac7179aa77e090744c8589b2ccc83c25c335d02928b53f41a4e8fa181d06a82a6cf07039b92294d27d2a5db29d7a5a66f60d2b6e412bcef69b6b0fc813e21982cec890ace9f6a211fddb597fd68a715648520600088cbb808456b605b32c866778f10d455961fa41a17945beba4c2bf1ef9653fb57a1a00090fd09353362892a736eadad9c51f9196164f836c3f1fe394446dc4caa27484246a24fd831799c1dda6defea5133daafd3bc31d6bbc692aced007d6f490cb27ef0e1be5019b9f650deb2c5edd2a6a5e5096f65bae79a1035e528ec2b87974657c602982f5ed5b76b57e9841cc6d5d2381f755d0711e53c4b65920ed05cebba9772be99f76e7eeae55b53e8aa7f51b3b6b3b255ddffdf84d7fbbcb291cea96ebb65b911a9b3bb18f05c87d732cbf13935b80d718033c0b411aa24127bc7ec525c2dde8c59dee9f5e8ec7dc78d9c347713f0df725cb83e3661300a40078fcdae45e92094d338c1e3246ca307b088deb0fa70cc7d3a72a4458fdb9aa707f1ac06077cd97036ea69483db0f61219a7d8ae9215adcbe1ca65e1e4ad7f3c0b3d698b99a1b44dbe52f0786ef3fbb2a5564b11351d511c3fffd8277ac3e1f8d70c957da8dbe15cf8c19473dbd0e503b1678b5918c8ab2cfe3ca0672310def13d13cc60849f97f9ef9c48e249a64cb40b6719d8851ccf0e0a6fc07856723e6271001b843d4da11d4273cb7cd9595ee1fcf36297da452bd9fc15533c84cc0b5dc78c08d50b5cf3422cefe967c187445fabf40e4a418dde0bd055ac69f01a7d9845ab7ba072f6f941b3b95525ad9081c57aeae3383e312bb4efd5f21cabdb1d793e056529b35096f4f13cf10ed2e2a9a4c7f82041fadb72d361ab64f7a66a4cdc2065c81065e37ae48a312acea2804bd4502a868e8331ca9c0da144c04e3aec64534576df4a0d1565dfc3e3f8a0ad4e1c1601df7b89650b341448c446c0b0f9fbbb3211db959bd356df5c763f906bd137524906e71f2211a01734fd86637224e05b53179bfa05c1e05060b5cada91ce8c8d9f1ce5c1e997debdd19a82369072996e22bf5c2f276c974f83fbde42b46228c3b4eabb57e98f77c909166869e9c6ce2b09b5e198bc037bf3a60ba41b3791f9306e31fdee7ab2be39c6f01f4cfa736fd7434a56005425fd5aa61d07c1e99e8a6f2b8db3bff853f063a8f5a09b3faf621266958aaafccb23136ec0d767ffb3b7e89fb91bdd65b664e4c0c1d8fa8fa53b736156dba7b3fd1c971cb455443e418f9811aefdc86354fb285ae53c68c692c79c3c8cd2ac51ce247ae7a73dbcbc026a0087cc9ac0298f722e1dfa5528bafd55abe3b02564ba09ee6ce62be8b373c8aa8499e31c4c52090dd97392061b3b02d928fe4f0e53f892588a708d2b4769944e883401b9a197d1a3aac642aa7849cdc9b9f72aa69786374621be49f986224327ffb943f46970439c8717ab66a224bd493559329397494678496d8ce2495eed8825b652ceaa33d901a8941d3ec4ea28cf0cfcceb68d8664a24a82a949c599be7ed6e11bcf72cf52306d1b1e737a005c1f9a7aafbb016105a6743f25def9ea11ac65850e6fcfc6c6c73866ab55a3735d8b43f164b478d0b7d354ce2883504eef412f81aba85985bfcd723386b47fb1c6872b13b211f4c1b518b47d8082ccfa8c1da28f64cb13d806ae0a6d044308da35406f65b17feb671e70bf2f1ccd37c26fb54dcc25aaf0d79d6b89d1ddd253004fe9104caa48ffb746933ef4424486571f5303bf7cd2302e949ff9df40cb6623dde783ff134bb6c70da1679ecef347c665d3db9962b41b92ca4b9ee5f50aba701e0e5a0184d9803cd722f90d574bd2835c1f823c4051b5b8e95dbd36e3f0646e4f48db3d425cd47c2439625e6ef7c08366b66e29d290a015552273d514efda48331ca1964d4af6df5691c468f95127ec292fd47535f7a480e8deaf8a979fb8b0a84ca61b76971bd342ca6d441ab68d356c8de985ef432f3b8ef1aa54ed758dc3beb68479e7bbfc8f731a738f3b489e1e4c35a2a8c7720a48b228c1aa1e1bb27c5c9e84480a1fb7eefb1a1ccb447c42cc821dd028719ee591dc034170f8175cdcfdd3269497cd5efdf424884e371200948fd80abf3a72bc54a26efe2420ab0b292eab9f80922923fe530f87a10d0d87689dde7f4089e36536393bcf51e3e7ae451c01b78bbec76e25813721badeb88e732a92984d1dd13b994aa0969b136286d55c851dd13aa44a480173de4a623b69f8bcc77cece6f3f4a61fdf0fb508d7418e5d20ad98d06a26d76b76d0bdde9b022d6022d5e58ab6cb3a6bedb96fcfab85e5255e890708dd40eb09223c3c7ce0eea638de0308da20daf4d4eb5e7a72dfa0b604798ab83c7cc993ddd974439eb31f3c4295a7a0395a7b4ebfe03591f2b548fa3dd6b04263c8d31fef2657e7790805d418c22382b7d9e68ea62380b810e7efa047d61f34dcfa6f9d7520d179f458563c2e2d64d24cf1430ebb66680ef2a6d3d71bbaebccd13f34617d56dc7eb6fda59746c13b045ba6013aac5d6c9be405d7bca90d3420b0754a83b6e85aec1f2bba0e0a69dddd36bfaefb811b08ff9d21b8ce6c4aef42961d88723c79a4d8df99c9963860349aa36ac2ded80b432f15c85f37e040c690289dbb0257776dcea8509da76228ba104cec0ce122fa6cd5c8990b203bca245acf1af3a26d54fb00bb922ee1f4a78ac968ce862a48c669202cd14f2def141b5555be9cff2e4749bd724363177c72936d58ec922eb641be893378fb4248f42be4fb2029d1e074492ef32a91621a025bf64a0859bbfe9ea0ff7731b8ae20cedd9a29d3bd294903679b6eae2d5c3e315bfe880c25ee9f1f75beff721c14e2b2974c8e3970c6293ef5a34790c5200cce63b33eeb77e69a3f00ea8a696a0235cb0945140384fc44b928a10826c259da8925b5bfa6171686f86952f37bf8b7e130fe65aa85ad9310195930119dc648a6670a29b542623ae13aadc583eac2e831c7f0c6b3c75925de6fac402c9d30fd065f8150739dd3f43e16d941a65695b9b919b478e7ab018e1854b54b8e570c35c2c407422c0ab43e5303e00e6332778b670278c56da306979e1700cb5b86da0bf56bf102495a64acce2dfc4294b3d1b0381a0b63c77fc3fd95970f8d1435a65b652ed9b69bc66a95cf99e418da791fc6c0931964c38ae362ee2acb1dd065e7f18c23c7b7baf4c89204978dea6b0f6431c5b8f9986b519003c8036314620ebe6eaa9a52d096f97820b65ec0f858908af306bd10c78c01fb671ce21689f2804d82c4594db11efa822b2fc5614998f7d71a3fe9be02a01f438c4758726dab59a826e546033b56fd94690988185be6f574e1f38223db58f9b3df91cda954b3397209a97ccc4c6cc50205834afb80560459e9fa4a8041d5be118aec98f2e86d6064a01386f6eb28869692a91154427d47156880a2069d5fb47cf0b7f7dccf982cd8afebab9d1c203081ee92e1361693baceca4ccbfc19a0045cbc242beca493225b33e8f23a585fd450e6f8026cd8162f55d2158979a8d18f68c7fabaaaafbaf95b146e4b6c722359b52c29575af7ff2f93c705a7792d6647e3f6d95e54f02dde26d0a469164274fd705645769c969d6d510752c67f5e00c0db68a4ff8db412f9f2a4f552b36acfd5cde9f5bdd19dcbbb3e6e4191e37784dc13db3e8760dff7c644054b8bd8460ed60dd2abcd1771dfc76e9ad97c928174c7c3bd97ff2b6ffcac2581a0673562b6d0e04e1ea2a833ce2d3ba7c4b2b1d04ff1b146beabfc03b7286e24631ff03fe7ecd4988345ebf664661845d111ec9170c629b6ac025175e0338fbbdf8acbcbefc1ff6e2b55cd60aa6b151a77dc6250e38956605e4f3162b3d4b7c529de1c6fb773f89ad2fd7d92fb38ec144dad6b11f36162793bbd5dfb2f226528a61cdba5a395cdbbcbdab90de22274c226e710ca2539f153433a22b68ed92b993306a9b277daf4b214d590f9a3ff9e5efabfccedc238fb05fd54f3a0dc43b8b6263c8d1b146b669af29908582d32b0c3381ec786e5b348bc14c0dba203a3acca9219599e6c5d6e2872cc71dbef5bf809be35144397aed9d5d60ed189709e2609253c5d398afcf87a0c58e773f0779f2c4eb13ec174b237fd30352caac40baff0011273d0dad22cd11c2ff584fb8e329e0e2122a05f2b792be0f5a387400c9cfd9bd45d439f052f233eb45e386b6515834e036624b5a391912bc4aa709a1c64be873418df25e58ed9ab49cf87670dbea20faa1fe22dc8fee523c5e5eaf36fd8ff9b348883a89a040b9a800fcb32448ae5cabcba2b6a208675b3a8aa513abad2506dc40330fab71894348950b6714d9368552f2059c6d48718ee018a342c0f33775125082cb2232ff3186a3d19d03215de4f9fd55eaa7d3351459d38b34188572f1ea490fad0aaef62037fc8cac1977ab2620b46cfe650444776d7bcafaa063cac62c487994108052f4c72a57ee6c19578df949a5dfa5655ad698a0d0a7de32c948ef21c0ea732ac3dab01c2e8560279f191e489f8aceebd5b688d0fed4b4f838e19d66731766d0e14e90867835ebe97667a2e55c20b52c2c7226a244ae490e6c5fa83761cf595f1b033d40878adc5c4297139145", 0x1000}], 0x2, 0x0, 0x0, 0x4000}, {&(0x7f0000001840)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000002f80)=[{&(0x7f00000018c0)="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", 0x1000}, {&(0x7f00000028c0)="7def2d310f28db1e4d776e53dbd34a7fac8e6e23371b91039cbd07d482442fba690fabd7f660a7c55d1e79c9a1a4d540f85428ec601075ba7b304cffdb7b1d12cfb8814066762f021feac0f96979c0", 0x4f}, {&(0x7f0000002940)="4028eabfe5c60f72f0a4f132c09890d3423c72c9eb4531bddda36aa884869cc5202f738d5250fcb6dff13ce8a1821036bb593b7a7a2d90a9a3195348da42878b6a9bf25ae8c3212343877e8c2b1f8a5abfa3e0aacda594a7f556239c8aa70de7a298659335288d8619ff8ed6b050a319d6753b05f3f09d180b1eeac6b525031ff17015f424174a3ad4c6afe625954b7056026bf2b289a878d7e98db9d80c432d7afc039519e740a75773cf16f8f5a392e330c21b1cc078b90502736229e60d511852e121ce61ef2db44a", 0xca}, {&(0x7f0000002a40)="f806d2ef8f74b8b12d4e24fa0230e938d6d15fe4f144c30490242d564f6135893ea8054e80783458c033c6b1443e307842d45051124a1d89229ed68faf445f543f1725505181d4a95ee7381d8ba22841257dfc15692556d0851cad632477095e643061a359a4255df044a111d8fbcc0b54a3c5928a1333cd3eaec4f6939f1663e837d0d8b07a32c611030c0e4c310a0a61a9a6fafcda8abeec635237fd8b3cbfd4ba885f8e5aa49ee236e22081cb64d4234cbeeed9991c0f95e54c01379d420da115a6127b7ff5abff606de87614", 0xce}, {&(0x7f0000002b40)="c714ce1df014b9730be9978314e5d4588287d27fd72d425c58f790f72b8a8a5a1ba8c80b4fbb652210ed88e39fcf40c5b0698b9a7d5ecaab448041721385136b2d038982eaa4f6d22169e3b548807eeec7a1ccd82269", 0x56}, {&(0x7f0000002bc0)="a5e6ea509d99d5f83c530ccab101553f4cd62f26f07ff6310181603b253bd7990c296b838edf01cd8548876c12d8451cef0c9fd0d2e3aa3429d30cc9cc1b2ea3967705c84d4a57b9594e03691ae0d92091a0ed5318dfda0d2405f8014336ec296fbe600d5fa98cb278f8c26f5ff9d684f3b1007ff1a39b34ece26dc6c6d0f0aa41f6a1a610c25c9adbb7d21badf59b9815d45c6a6ce6e45a08182953144aa03e896654", 0xa3}, {&(0x7f0000002c80)="942c804205d568b8cc23a4f56603402ae6b187b8afc8beba4e1b0140ba1f9e8ce23f241f38120d56d0e272f61fcddbda2d74f21d041142ac033b1b0c73a954f443e4a1daa08ea17614e61847f058391a5edb8305f5759d2e9e4bf952716e208cc11b429dcf6e3b518498fa18b50148923c68dc6d1627e6717a0f444e49914fd78d47495463", 0x85}, {&(0x7f0000002d40)="2b054d5716d85186e6d3bc15bd401d3f266a16f23c8908a8b409191a18cfce5d3f5cf9e6d93a528bf35c08d9c637c2da13a0d2d6df1dcc5bb42a5e374f158b65d4c3b81e02bf619fc0b202c9799718bee10ea17f5328c01621984a5608c3964bed9d0d656dab0475f3bd3d345cf8799e393ca9edd02975c089a9ec922b5d2152f964341c056a", 0x86}, {&(0x7f0000002e00)="650530bc379b79bcd832f126710ea1d48cab84923a87ab1da152feccf6df73466a9fb27adcb1f08cb302f4c183a1ff26ec62cbb72020d792503c53a9b6b7f509eaf71c599539a1d782ce8f5cfbb48fe173aaa1f6092e113a88e27c665643780e48edc175fdb198aa7b29f1433f8ca3ade530e8bcd28d0981679728ed19d21487f6d2e4d2c14cb5cbab46c06b9becbcb3ea5d3f006236f0618f4ecc3abc07f77055d5f13d8213be01e542e43776d4278430b014a37838171a607602fccf", 0xbd}, {&(0x7f0000002ec0)="b5acbf72755163fee1ed24a2919e626c46fa8a358c6f5edad01a414f260c6b4b4a6b571fd5dec4ee8314132dbaf55b2e4c0b419e76d853becbdd9741e8094fcdaeafe5946e930e7c6822952a65136f12355dc79f1c3171fdb08932701814a9d6c06f194a590a77555e97f3a4dcb93b0d222272ce27d14d89a2875f5e2d6a85592e048c1ecb6bc0161bb790d222", 0x8d}], 0xa, 0x0, 0x0, 0x8000}, {&(0x7f0000003040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003200)=[{&(0x7f00000030c0)="259a41692c5969b4c47d2c3bc89d9c04e325b7336825d48253827a1c7148bf1f19b9179f0334f9ff7e90459d730bd2410d16f929d073727438619ce4f33718a4b64b9737ef52b59d90d53c5ae1bf3b5a48c912b3f2a56079d39856fbfdf7e67f08118f609dc73c8ae9b3265faec0944ba72a0ad60a0f417cfc7c684c3903fdf4188536295cb8ca53cb95c8f1c256ca58cec07564658427ed321e20e86a", 0x9d}, {&(0x7f0000003180)="45e9b83725d2786051ecf391a1bcb40e44bd7a2ce6fffb1fd468d1358725548b04d42114ffd75eb8da12809f2fdd5b302f3541211678dce0a4f81463c3049fa951acf94b567e6b48c60b8933905789d4eef42f46c12fea401e64254a38bcfab682f9b127baea348d3b0adef76c9fa6a03efa27ededbe94f05fe11e7e3a94937c", 0x80}], 0x2, &(0x7f0000003c40)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x28, 0x1, 0x1, [r10, r11, r12, r13, r14]}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x10}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @cred={0x20, 0x1, 0x2, r21, r22, r23}, @rights={0x18, 0x1, 0x1, [r24]}, @cred={0x20, 0x1, 0x2, r25, r26, r27}], 0x110, 0x40}], 0x4, 0x4000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r28, 0x8912, 0x400200) r29 = openat$ion(0xffffffffffffff9c, &(0x7f00000034c0)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r29, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = open(&(0x7f0000000080)='./file0\x00', 0x48000, 0x20) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000000c0)=""/179) [ 271.691710] FAULT_INJECTION: forcing a failure. [ 271.691710] name failslab, interval 1, probability 0, space 0, times 0 [ 271.717392] CPU: 0 PID: 11251 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 271.725980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.735339] Call Trace: [ 271.737972] dump_stack+0x244/0x39d 14:49:29 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x208100, 0x0) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) [ 271.741622] ? dump_stack_print_info.cold.1+0x20/0x20 [ 271.746830] should_fail.cold.4+0xa/0x17 [ 271.750894] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.756000] ? lock_release+0xa00/0xa00 [ 271.759998] ? perf_trace_sched_process_exec+0x860/0x860 [ 271.765480] ? graph_lock+0x270/0x270 [ 271.769289] ? find_held_lock+0x36/0x1c0 [ 271.773407] ? __lock_is_held+0xb5/0x140 [ 271.777518] ? mid8250_dma_filter+0x138/0x170 [ 271.782028] ? perf_trace_sched_process_exec+0x860/0x860 [ 271.787486] ? kernfs_activate+0x21a/0x2c0 14:49:29 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) socket(0x10, 0x800, 0x8) prctl$PR_GET_SECUREBITS(0x1b) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) 14:49:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x101, 0x200) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) [ 271.791786] __should_failslab+0x124/0x180 [ 271.796029] should_failslab+0x9/0x14 [ 271.799853] kmem_cache_alloc+0x2c4/0x730 [ 271.804011] ? lock_downgrade+0x900/0x900 [ 271.808174] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 271.813200] __kernfs_new_node+0x127/0x8d0 [ 271.817488] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 271.822265] ? graph_lock+0x270/0x270 [ 271.826086] ? __lock_is_held+0xb5/0x140 [ 271.830154] ? wait_for_completion+0x8a0/0x8a0 [ 271.834757] ? mutex_unlock+0xd/0x10 14:49:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='com.apple.system.Security\x00') [ 271.838491] ? kernfs_activate+0x21a/0x2c0 [ 271.842737] ? kernfs_walk_and_get_ns+0x340/0x340 [ 271.847591] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 271.853139] ? kernfs_link_sibling+0x1d2/0x3b0 [ 271.857737] kernfs_new_node+0x95/0x120 [ 271.861758] __kernfs_create_file+0x5a/0x340 [ 271.866224] sysfs_add_file_mode_ns+0x222/0x530 [ 271.870914] internal_create_group+0x3df/0xd80 [ 271.875513] ? remove_files.isra.1+0x190/0x190 [ 271.880127] ? up_write+0x7b/0x220 [ 271.883675] ? down_write_nested+0x130/0x130 [ 271.888129] ? down_read+0x120/0x120 14:49:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x2, 0x2000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r2, &(0x7f0000000140)=""/196}) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='salsa20-generic\x00') bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 271.891887] ? resched_curr+0x1f0/0x1f0 [ 271.895886] sysfs_create_group+0x1f/0x30 [ 271.900037] lo_ioctl+0x166a/0x22a0 [ 271.903670] ? lo_rw_aio+0x1ed0/0x1ed0 [ 271.907593] ? find_held_lock+0x36/0x1c0 [ 271.911694] ? lo_rw_aio+0x1ed0/0x1ed0 [ 271.915600] blkdev_ioctl+0x988/0x21a0 [ 271.919547] ? blkpg_ioctl+0xc10/0xc10 [ 271.923448] ? lock_downgrade+0x900/0x900 [ 271.927640] ? check_preemption_disabled+0x48/0x280 [ 271.932669] ? kasan_check_read+0x11/0x20 [ 271.936819] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 271.942095] ? rcu_read_unlock_special+0x370/0x370 [ 271.947033] ? __fget+0x4d1/0x740 [ 271.950481] ? ksys_dup3+0x680/0x680 [ 271.954200] block_ioctl+0xee/0x130 [ 271.957816] ? blkdev_fallocate+0x400/0x400 [ 271.962118] do_vfs_ioctl+0x1de/0x1790 [ 271.966012] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 271.971530] ? ioctl_preallocate+0x300/0x300 [ 271.975933] ? __fget_light+0x2e9/0x430 [ 271.979911] ? fget_raw+0x20/0x20 [ 271.983357] ? rcu_read_lock_sched_held+0x14f/0x180 [ 271.988375] ? kmem_cache_free+0x24f/0x290 [ 271.992600] ? putname+0xf7/0x130 [ 271.996051] ? do_syscall_64+0x9a/0x820 [ 272.000006] ? do_syscall_64+0x9a/0x820 [ 272.003960] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 272.008543] ? security_file_ioctl+0x94/0xc0 [ 272.012946] ksys_ioctl+0xa9/0xd0 [ 272.016399] __x64_sys_ioctl+0x73/0xb0 [ 272.020311] do_syscall_64+0x1b9/0x820 [ 272.024177] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.029525] ? syscall_return_slowpath+0x5e0/0x5e0 [ 272.034432] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.039252] ? trace_hardirqs_on_caller+0x310/0x310 [ 272.044303] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 272.049322] ? prepare_exit_to_usermode+0x291/0x3b0 [ 272.054360] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.059234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.064422] RIP: 0033:0x4574e7 [ 272.067638] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.086534] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 272.094222] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 272.101469] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 272.108720] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 272.115968] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 272.123216] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 272.264700] XFS (loop2): Invalid superblock magic number [ 272.323442] XFS (loop2): Invalid superblock magic number 14:49:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs`', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-aesni\x00'}, 0x58) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) 14:49:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="f148a576819450137238edc10e6d54076b45912c46d9b57882943e3068eab9063451587aec341b2ce5eaeb0ad877ffc83076ec274e7737c286ed1b47c38e01ac948c57a75df5edc8d6df10ff8d0ef35bb373e85a621458b278bfd2", 0xfffffffffffffe8f) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0xfffffffffffffffe, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:29 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 272.428368] FAULT_INJECTION: forcing a failure. [ 272.428368] name failslab, interval 1, probability 0, space 0, times 0 [ 272.443711] CPU: 1 PID: 11315 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 272.452298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.461655] Call Trace: [ 272.464255] dump_stack+0x244/0x39d [ 272.467894] ? dump_stack_print_info.cold.1+0x20/0x20 [ 272.473101] should_fail.cold.4+0xa/0x17 14:49:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) fstatfs(r0, &(0x7f0000000000)=""/129) 14:49:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@tipc=@id, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/83, 0x53}, {&(0x7f0000000180)=""/194, 0xc2}, {&(0x7f0000000280)=""/253, 0xfd}, {&(0x7f0000000400)=""/148, 0x94}], 0x4}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 272.477178] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.482289] ? lock_release+0xa00/0xa00 [ 272.486261] ? perf_trace_sched_process_exec+0x860/0x860 [ 272.491720] ? graph_lock+0x270/0x270 [ 272.495536] ? find_held_lock+0x36/0x1c0 [ 272.499603] ? __lock_is_held+0xb5/0x140 [ 272.503683] ? perf_trace_sched_process_exec+0x860/0x860 [ 272.509143] ? kernfs_activate+0x21a/0x2c0 [ 272.513382] __should_failslab+0x124/0x180 [ 272.517600] should_failslab+0x9/0x14 [ 272.521388] kmem_cache_alloc+0x2c4/0x730 [ 272.525516] ? lock_downgrade+0x900/0x900 [ 272.529659] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 272.534660] __kernfs_new_node+0x127/0x8d0 [ 272.538879] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 272.543622] ? graph_lock+0x270/0x270 [ 272.547410] ? __lock_is_held+0xb5/0x140 [ 272.551463] ? wait_for_completion+0x8a0/0x8a0 [ 272.556032] ? mutex_unlock+0xd/0x10 [ 272.559735] ? kernfs_activate+0x21a/0x2c0 [ 272.563967] ? kernfs_walk_and_get_ns+0x340/0x340 [ 272.568808] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 272.574340] ? kernfs_link_sibling+0x1d2/0x3b0 [ 272.578932] kernfs_new_node+0x95/0x120 [ 272.582909] __kernfs_create_file+0x5a/0x340 [ 272.587329] sysfs_add_file_mode_ns+0x222/0x530 [ 272.592017] internal_create_group+0x3df/0xd80 [ 272.596624] ? remove_files.isra.1+0x190/0x190 [ 272.601200] ? up_write+0x7b/0x220 [ 272.604745] ? down_write_nested+0x130/0x130 [ 272.609153] ? down_read+0x120/0x120 [ 272.612869] ? resched_curr+0x1f0/0x1f0 [ 272.616835] sysfs_create_group+0x1f/0x30 [ 272.620969] lo_ioctl+0x166a/0x22a0 [ 272.624601] ? lo_rw_aio+0x1ed0/0x1ed0 [ 272.628478] ? find_held_lock+0x36/0x1c0 [ 272.632537] ? lo_rw_aio+0x1ed0/0x1ed0 [ 272.636425] blkdev_ioctl+0x988/0x21a0 [ 272.640302] ? blkpg_ioctl+0xc10/0xc10 [ 272.644196] ? lock_downgrade+0x900/0x900 [ 272.648340] ? check_preemption_disabled+0x48/0x280 [ 272.653392] ? kasan_check_read+0x11/0x20 [ 272.657534] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 272.662807] ? rcu_read_unlock_special+0x370/0x370 [ 272.667745] ? __fget+0x4d1/0x740 [ 272.671204] ? ksys_dup3+0x680/0x680 [ 272.674951] block_ioctl+0xee/0x130 [ 272.678582] ? blkdev_fallocate+0x400/0x400 [ 272.682907] do_vfs_ioctl+0x1de/0x1790 [ 272.686782] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 272.692306] ? ioctl_preallocate+0x300/0x300 [ 272.696722] ? __fget_light+0x2e9/0x430 [ 272.700686] ? fget_raw+0x20/0x20 [ 272.704148] ? rcu_read_lock_sched_held+0x14f/0x180 [ 272.709149] ? kmem_cache_free+0x24f/0x290 [ 272.713376] ? putname+0xf7/0x130 [ 272.716832] ? do_syscall_64+0x9a/0x820 [ 272.720803] ? do_syscall_64+0x9a/0x820 [ 272.724778] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 272.729357] ? security_file_ioctl+0x94/0xc0 [ 272.733753] ksys_ioctl+0xa9/0xd0 [ 272.737192] __x64_sys_ioctl+0x73/0xb0 [ 272.741064] do_syscall_64+0x1b9/0x820 [ 272.744938] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.750302] ? syscall_return_slowpath+0x5e0/0x5e0 [ 272.755230] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.760072] ? trace_hardirqs_on_caller+0x310/0x310 [ 272.765090] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 272.770104] ? prepare_exit_to_usermode+0x291/0x3b0 [ 272.775130] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.779962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.785135] RIP: 0033:0x4574e7 [ 272.788323] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.807229] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 272.814936] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 272.822197] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 14:49:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000080)={0x41, 0x1, 0x3}, 0x10) [ 272.829476] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 272.836735] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 272.844002] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x121000, 0x0) accept(r0, &(0x7f0000000080)=@hci={0x1f, 0x0}, &(0x7f0000000100)=0x80) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000180)={r3, 0x1, 0x6, @remote}, 0x10) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:30 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x3, 0x80, 0xc9ae}) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x75) 14:49:30 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="2e2fd6209276ef8c98122dc288b76b2ad84a665f1ddd8b690b7379d49d9f0d60a1ffd34284ec71c9fa68d720865c5a1eadaec5957a46647b01bd4ceb8c26fefc4e02685e16eaf4c665f275ea25854f852a996426b7aaf763", 0x58) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x4e21, @empty}], 0x10) 14:49:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) [ 273.116323] FAULT_INJECTION: forcing a failure. [ 273.116323] name failslab, interval 1, probability 0, space 0, times 0 [ 273.149756] CPU: 0 PID: 11356 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 273.158387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.167747] Call Trace: [ 273.170346] dump_stack+0x244/0x39d [ 273.174023] ? dump_stack_print_info.cold.1+0x20/0x20 [ 273.179216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.179242] should_fail.cold.4+0xa/0x17 [ 273.179261] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 273.188845] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.188862] ? wake_up_klogd+0x11a/0x180 [ 273.188878] ? console_device+0xc0/0xc0 [ 273.188896] ? __down_trylock_console_sem+0x151/0x1f0 [ 273.199514] ? graph_lock+0x270/0x270 14:49:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) syslog(0xf, &(0x7f0000000000)=""/224, 0xe0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000080)={0x1, 0x0, [0x100000001, 0xe61b, 0x8, 0x5, 0x100000000, 0x6, 0x2, 0x6]}) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r2, 0xc00c55ca) [ 273.199529] ? vprintk_emit+0x293/0x990 [ 273.199553] ? find_held_lock+0x36/0x1c0 [ 273.207582] ? __lock_is_held+0xb5/0x140 [ 273.207616] ? perf_trace_sched_process_exec+0x860/0x860 [ 273.207633] ? vprintk_default+0x28/0x30 [ 273.216598] __should_failslab+0x124/0x180 [ 273.216623] should_failslab+0x9/0x14 [ 273.216640] kmem_cache_alloc_trace+0x2db/0x740 [ 273.216708] kobject_uevent_env+0x2f3/0x101e [ 273.224703] ? resched_curr+0x1f0/0x1f0 [ 273.224724] kobject_uevent+0x1f/0x24 [ 273.224741] lo_ioctl+0x16f1/0x22a0 [ 273.224761] ? lo_rw_aio+0x1ed0/0x1ed0 [ 273.270556] ? find_held_lock+0x36/0x1c0 [ 273.274615] ? lo_rw_aio+0x1ed0/0x1ed0 [ 273.278489] blkdev_ioctl+0x988/0x21a0 [ 273.282367] ? blkpg_ioctl+0xc10/0xc10 [ 273.286237] ? lock_downgrade+0x900/0x900 [ 273.290373] ? check_preemption_disabled+0x48/0x280 [ 273.295374] ? kasan_check_read+0x11/0x20 [ 273.299508] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 273.304763] ? rcu_read_unlock_special+0x370/0x370 [ 273.309677] ? __fget+0x4d1/0x740 [ 273.313113] ? ksys_dup3+0x680/0x680 [ 273.316812] block_ioctl+0xee/0x130 [ 273.320417] ? blkdev_fallocate+0x400/0x400 [ 273.324717] do_vfs_ioctl+0x1de/0x1790 [ 273.328587] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 273.334104] ? ioctl_preallocate+0x300/0x300 [ 273.338507] ? __fget_light+0x2e9/0x430 [ 273.342460] ? fget_raw+0x20/0x20 [ 273.345908] ? rcu_read_lock_sched_held+0x14f/0x180 [ 273.350903] ? kmem_cache_free+0x24f/0x290 [ 273.355117] ? putname+0xf7/0x130 [ 273.358569] ? do_syscall_64+0x9a/0x820 [ 273.362536] ? do_syscall_64+0x9a/0x820 [ 273.366493] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 273.371053] ? security_file_ioctl+0x94/0xc0 [ 273.375441] ksys_ioctl+0xa9/0xd0 [ 273.378874] __x64_sys_ioctl+0x73/0xb0 [ 273.382756] do_syscall_64+0x1b9/0x820 [ 273.386637] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 273.391997] ? syscall_return_slowpath+0x5e0/0x5e0 [ 273.396904] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.401741] ? trace_hardirqs_on_caller+0x310/0x310 [ 273.406746] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 273.411750] ? prepare_exit_to_usermode+0x291/0x3b0 [ 273.416799] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.421639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.426815] RIP: 0033:0x4574e7 [ 273.429993] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.448902] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 273.456589] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 14:49:30 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7, 0x800) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x0, 0x0, 0xb2, 0x8000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000, 0x1ff}, 0x0, 0x0, r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000006c0)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000100)=""/80, 0x50}, {&(0x7f0000000180)=""/152, 0x98}, {&(0x7f0000000240)=""/228, 0xe4}, {&(0x7f0000000340)=""/64, 0x40}, {&(0x7f0000000400)=""/149, 0x95}, {&(0x7f00000004c0)=""/74, 0x4a}], 0x6, &(0x7f00000005c0)=""/201, 0xc9}, 0x10000) setsockopt$inet6_int(r1, 0x29, 0x49, &(0x7f0000000740)=0xc0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000700)=0xffffffffffffffff, 0x4) [ 273.463842] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 273.471089] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 273.478359] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 273.485607] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000080)='morus1280-generic\x00'}, 0x30) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:30 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fcntl$dupfd(r1, 0x0, r0) write$P9_RREADDIR(r2, &(0x7f0000000180)={0xe4, 0x29, 0x2, {0x3, [{{0x4}, 0xb293, 0x2, 0x7, './file0'}, {{0x0, 0x2}, 0x1f, 0x4, 0x7, './file0'}, {{0xa, 0x3, 0x7}, 0x7ff, 0x0, 0x7, './file0'}, {{0x20}, 0x5, 0x6, 0x7, './file0'}, {{0x84, 0x4, 0x2}, 0x2, 0x10000, 0x7, './file0'}, {{0x3a, 0x2, 0x3}, 0x100, 0x4, 0x7, './file0'}, {{0x20, 0x2}, 0x1, 0x3, 0x7, './file0'}]}}, 0xe4) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r3, 0xc00c55ca) [ 273.655856] FAULT_INJECTION: forcing a failure. [ 273.655856] name failslab, interval 1, probability 0, space 0, times 0 [ 273.678305] CPU: 1 PID: 11395 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 273.686929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.696281] Call Trace: [ 273.698876] dump_stack+0x244/0x39d 14:49:31 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200000, 0x0) setsockopt$packet_int(r2, 0x107, 0x1b, &(0x7f0000000040)=0x3, 0x4) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000200)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000010}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYRESOCT=r0, @ANYRES16=r3, @ANYRESHEX=r3], 0x3}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 273.702515] ? dump_stack_print_info.cold.1+0x20/0x20 [ 273.707727] should_fail.cold.4+0xa/0x17 [ 273.711803] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 273.716931] ? lock_release+0xa00/0xa00 [ 273.720891] ? perf_trace_sched_process_exec+0x860/0x860 [ 273.726325] ? graph_lock+0x270/0x270 [ 273.730122] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 273.735153] ? find_held_lock+0x36/0x1c0 [ 273.739313] ? __lock_is_held+0xb5/0x140 [ 273.743365] ? put_dec+0x3b/0xf0 [ 273.746712] ? perf_trace_sched_process_exec+0x860/0x860 [ 273.752159] ? graph_lock+0x270/0x270 [ 273.755964] __should_failslab+0x124/0x180 [ 273.760211] should_failslab+0x9/0x14 [ 273.764008] kmem_cache_alloc_node+0x273/0x730 [ 273.768571] ? find_held_lock+0x36/0x1c0 [ 273.772624] __alloc_skb+0x119/0x770 [ 273.776325] ? netdev_alloc_frag+0x1f0/0x1f0 [ 273.780737] ? kasan_check_read+0x11/0x20 [ 273.784866] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 273.790137] ? rcu_read_unlock_special+0x370/0x370 [ 273.795064] ? netlink_has_listeners+0x2cb/0x4a0 [ 273.799802] ? netlink_tap_init_net+0x3d0/0x3d0 [ 273.804461] alloc_uevent_skb+0x84/0x1da [ 273.808503] kobject_uevent_env+0xa52/0x101e [ 273.812889] ? resched_curr+0x1f0/0x1f0 [ 273.816845] kobject_uevent+0x1f/0x24 [ 273.820628] lo_ioctl+0x16f1/0x22a0 [ 273.824239] ? lo_rw_aio+0x1ed0/0x1ed0 [ 273.828124] ? find_held_lock+0x36/0x1c0 [ 273.832173] ? lo_rw_aio+0x1ed0/0x1ed0 [ 273.836074] blkdev_ioctl+0x988/0x21a0 [ 273.839956] ? blkpg_ioctl+0xc10/0xc10 [ 273.843827] ? lock_downgrade+0x900/0x900 [ 273.847965] ? check_preemption_disabled+0x48/0x280 [ 273.852977] ? kasan_check_read+0x11/0x20 [ 273.857106] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 273.862386] ? rcu_read_unlock_special+0x370/0x370 [ 273.867313] ? __fget+0x4d1/0x740 [ 273.870757] ? ksys_dup3+0x680/0x680 [ 273.874470] block_ioctl+0xee/0x130 [ 273.878094] ? blkdev_fallocate+0x400/0x400 [ 273.882417] do_vfs_ioctl+0x1de/0x1790 [ 273.886284] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 273.891802] ? ioctl_preallocate+0x300/0x300 [ 273.896189] ? __fget_light+0x2e9/0x430 [ 273.900154] ? fget_raw+0x20/0x20 [ 273.903610] ? rcu_read_lock_sched_held+0x14f/0x180 [ 273.908613] ? kmem_cache_free+0x24f/0x290 [ 273.912830] ? putname+0xf7/0x130 [ 273.916266] ? do_syscall_64+0x9a/0x820 [ 273.920231] ? do_syscall_64+0x9a/0x820 [ 273.924277] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 273.928860] ? security_file_ioctl+0x94/0xc0 [ 273.933248] ksys_ioctl+0xa9/0xd0 [ 273.936683] __x64_sys_ioctl+0x73/0xb0 [ 273.940551] do_syscall_64+0x1b9/0x820 [ 273.944420] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 273.949766] ? syscall_return_slowpath+0x5e0/0x5e0 [ 273.954677] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.959503] ? trace_hardirqs_on_caller+0x310/0x310 [ 273.964504] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 273.969531] ? prepare_exit_to_usermode+0x291/0x3b0 [ 273.974576] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.979404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.984593] RIP: 0033:0x4574e7 [ 273.987768] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:49:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f00000001c0)=0x9) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x121080) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x3, 0x0, 0x1, 0x4}}, 0x2e) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0xfffffffffffffc4f) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000200)=0x4) [ 274.006803] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 274.014502] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 274.021767] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 274.029018] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 274.036270] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 274.043522] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 274.120142] XFS (loop2): Invalid superblock magic number [ 274.219104] XFS (loop2): Invalid superblock magic number 14:49:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:31 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0xa0400, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfffffffffffffff7) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x2000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xffff, 0x2) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000080)={0x101ff, 0x0, &(0x7f0000ffb000/0x3000)=nil}) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:31 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x18100, 0x0) r2 = geteuid() lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, r4, 0xd, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x400}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffeff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2aa0c0f3}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8040}, 0x4000894) sendmsg$nl_xfrm(r1, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)=@updpolicy={0x1a4, 0x19, 0x400, 0x70bd2d, 0xfff, {{@in=@remote, @in6=@dev={0xfe, 0x80, [], 0x1c}, 0x4e20, 0x0, 0x4e21, 0x0, 0xa, 0xa0, 0x80, 0x3a, 0x0, r2}, {0x6, 0x10001, 0x7, 0x9, 0xff, 0xfffffffffffffffb, 0x4, 0x4}, {0x3f, 0x9, 0x1}, 0x5, 0x6e6bb1, 0x0, 0x1, 0x2, 0x3}, [@ipv6_hthresh={0x8, 0x4, {0x58, 0x2}}, @sa={0xe4, 0x6, {{@in=@loopback, @in=@remote, 0x4e21, 0x49f5, 0x4e23, 0x1, 0xa, 0x20, 0xa0, 0x7f, 0x0, r3}, {@in6=@loopback, 0x4d3, 0x2b}, @in=@broadcast, {0x309c8804, 0x0, 0x9, 0x4, 0x800, 0x100000001, 0x9, 0xdc9f}, {0x2, 0x1, 0x0, 0xd4b}, {0x1c, 0x7, 0x5aa}, 0x70bd26, 0x3506, 0xa, 0x3, 0x0, 0x52}}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x8000}, 0x800) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 14:49:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) syncfs(r0) 14:49:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) write$uinput_user_dev(r1, &(0x7f0000000180)={'syz1\x00', {0x400, 0x1, 0xfffffffffffff083, 0x6}, 0x19, [0x1, 0xffffffffffff0001, 0x2, 0x3, 0x7, 0x81, 0x4047, 0x3, 0x9, 0x3f, 0x100000001, 0x8, 0x40, 0x9, 0x7ff, 0x7, 0x2, 0x28cc0800, 0x6, 0x80, 0x2, 0x7fffffff, 0xe5a, 0xd38, 0x3ff, 0xd7, 0x401, 0x6, 0x8dcb, 0x6, 0x1, 0x6, 0x7fffffff, 0x4b4, 0x8, 0x9, 0x8, 0x0, 0x1fffc000000000, 0x7f, 0x7, 0xe402, 0x100000001, 0x4, 0x3, 0x1c1c, 0x7, 0xffffffff, 0x1, 0x8, 0x3f, 0x1, 0x5, 0x2, 0x1, 0xffff, 0xfffffffffffffffe, 0x6, 0x8, 0x1ff, 0x4, 0x8, 0x7, 0x7936], [0x1191, 0x8001, 0xffffffff, 0x5, 0x8, 0x6c3, 0xb4, 0x8, 0x8001, 0x8000, 0xffff, 0x6, 0x80000000, 0x2, 0x6, 0x32, 0x3ff, 0xfffffffffffffff7, 0x10001, 0x6e, 0x1c77, 0x10000, 0x2, 0x75c, 0x80000000, 0x10001, 0x6, 0x3, 0x2, 0x7, 0x9, 0x5, 0x7f, 0x81, 0x0, 0x7c79, 0x5862, 0x4, 0x8, 0x9, 0x9, 0x559, 0x9, 0x100, 0x3, 0x1ff, 0xfffffffffffffff8, 0x2, 0x1, 0x7617, 0x1, 0x10001, 0x80000001, 0x6, 0x100000000, 0x5, 0x8, 0x5, 0x290, 0x7, 0x515a, 0x100000000, 0x3ff, 0xffffffff], [0x4, 0x1f, 0x9, 0x200, 0x0, 0x80000001, 0x9, 0xffffffff, 0x7ff, 0xf856, 0x1f, 0x3, 0x7d1a, 0x7ff, 0x3, 0x80000000, 0x9, 0x1, 0xc5, 0xfffffffffffffff7, 0x0, 0xe67, 0x0, 0x8, 0x5, 0xb5, 0x3, 0x20, 0xb16, 0x8001, 0x0, 0x1, 0x8, 0x12, 0x81, 0xf13, 0xfffffffffffffff7, 0x28c9, 0xfffffffffffeffff, 0x8, 0x1, 0x800, 0xd7, 0x21, 0x6, 0x7, 0x20, 0x86, 0x1, 0x6, 0x1000, 0x1, 0x1a2, 0x5, 0xffffffffffffff60, 0x80000000, 0x100, 0x7f, 0x740a, 0x2, 0x8, 0xd707, 0x3ff, 0xd8], [0x3ff, 0x5, 0x0, 0xaf7e, 0x8001, 0xffffffff, 0xfffffffffffffffa, 0xfff, 0x2, 0x3292, 0x1, 0x3f, 0x9, 0x1, 0x3, 0x1, 0x7, 0x4, 0x3, 0x8, 0x3f, 0x81, 0x80000000, 0xa6, 0x8, 0x1, 0xff, 0x100000000, 0x1, 0x0, 0x6, 0xc7c, 0x200, 0x9, 0x7, 0xfa9d, 0x8001, 0x1, 0xb9, 0x4, 0x8, 0x3, 0x0, 0x6, 0x2, 0xaa96, 0x4, 0xffffffff, 0x8, 0x27e, 0x4, 0xfffffffffffffffe, 0x5, 0xd3, 0x10001, 0x1, 0xfffffffffffffff9, 0x3, 0xdd90000000, 0x3f, 0x9, 0x6, 0x7fffffff, 0x6]}, 0x45c) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000b40)={0x2, r1}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000009c0)={0x7, &(0x7f0000000980)=[{}, {}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000ac0)={r3, &(0x7f0000000a00)=""/133}) getresgid(&(0x7f0000000600)=0x0, &(0x7f0000000640), &(0x7f0000000680)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000007c0)=0xe8) write$P9_RSTATu(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="c20000007d01000000a1007f00010400008e000000000100000000000000000088000700000008000000070000000000000001005c0c002f6465762f75696e70757400530093656d30656d316b657972696e677b6b657972696e6773656c696e75786264657673656375726974796b657972696e676566315e73797374656d706f7369785f61636c5f616363657373ed73656375726974790e006367726f75702e6576656e7473000c002f6465762f75696e70757400", @ANYRES32=r2, @ANYRES32=r4, @ANYRES32=r5], 0xc2) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000900)={{0x7, 0x7f, 0x8, 0x2b}, 'syz0\x00', 0x3f}) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r6, 0x40045567, 0x0) mlockall(0x2) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$UI_DEV_CREATE(r6, 0xc00c55ca) [ 274.366105] FAULT_INJECTION: forcing a failure. [ 274.366105] name failslab, interval 1, probability 0, space 0, times 0 [ 274.386713] CPU: 1 PID: 11434 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 274.395292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.404626] Call Trace: [ 274.407192] dump_stack+0x244/0x39d [ 274.410816] ? dump_stack_print_info.cold.1+0x20/0x20 [ 274.416005] ? is_bpf_text_address+0xd3/0x170 [ 274.420483] should_fail.cold.4+0xa/0x17 [ 274.424524] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.429610] ? graph_lock+0x270/0x270 [ 274.433416] ? save_stack+0x43/0xd0 [ 274.437018] ? kasan_kmalloc+0xcb/0xd0 [ 274.440880] ? kmem_cache_alloc_trace+0x154/0x740 [ 274.445697] ? kobject_uevent_env+0x2f3/0x101e [ 274.450255] ? kobject_uevent+0x1f/0x24 [ 274.454208] ? lo_ioctl+0x16f1/0x22a0 [ 274.458001] ? find_held_lock+0x36/0x1c0 [ 274.462043] ? __lock_is_held+0xb5/0x140 [ 274.466086] ? perf_trace_sched_process_exec+0x860/0x860 [ 274.471539] __should_failslab+0x124/0x180 [ 274.475753] should_failslab+0x9/0x14 [ 274.479530] __kmalloc+0x2e4/0x760 [ 274.483059] ? kobject_uevent_env+0x2f3/0x101e [ 274.487634] ? rcu_read_lock_sched_held+0x14f/0x180 [ 274.492633] ? kobject_get_path+0xc2/0x1b0 [ 274.496872] ? kmem_cache_alloc_trace+0x356/0x740 [ 274.501706] kobject_get_path+0xc2/0x1b0 [ 274.505745] kobject_uevent_env+0x314/0x101e [ 274.510131] ? resched_curr+0x1f0/0x1f0 [ 274.514088] kobject_uevent+0x1f/0x24 [ 274.517874] lo_ioctl+0x16f1/0x22a0 [ 274.521486] ? lo_rw_aio+0x1ed0/0x1ed0 [ 274.525360] ? find_held_lock+0x36/0x1c0 [ 274.529401] ? lo_rw_aio+0x1ed0/0x1ed0 [ 274.533266] blkdev_ioctl+0x988/0x21a0 [ 274.537133] ? blkpg_ioctl+0xc10/0xc10 [ 274.540997] ? lock_downgrade+0x900/0x900 [ 274.545156] ? check_preemption_disabled+0x48/0x280 [ 274.550167] ? kasan_check_read+0x11/0x20 [ 274.554292] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 274.559545] ? rcu_read_unlock_special+0x370/0x370 [ 274.564457] ? __fget+0x4d1/0x740 [ 274.567892] ? ksys_dup3+0x680/0x680 [ 274.571592] block_ioctl+0xee/0x130 [ 274.575198] ? blkdev_fallocate+0x400/0x400 [ 274.579498] do_vfs_ioctl+0x1de/0x1790 [ 274.583365] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 274.588899] ? ioctl_preallocate+0x300/0x300 [ 274.593287] ? __fget_light+0x2e9/0x430 [ 274.597241] ? fget_raw+0x20/0x20 [ 274.600676] ? rcu_read_lock_sched_held+0x14f/0x180 [ 274.605689] ? kmem_cache_free+0x24f/0x290 [ 274.609940] ? putname+0xf7/0x130 [ 274.613376] ? do_syscall_64+0x9a/0x820 [ 274.617334] ? do_syscall_64+0x9a/0x820 [ 274.621293] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 274.625860] ? security_file_ioctl+0x94/0xc0 [ 274.630254] ksys_ioctl+0xa9/0xd0 [ 274.633692] __x64_sys_ioctl+0x73/0xb0 [ 274.637561] do_syscall_64+0x1b9/0x820 [ 274.641432] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 274.646799] ? syscall_return_slowpath+0x5e0/0x5e0 [ 274.651712] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.656556] ? trace_hardirqs_on_caller+0x310/0x310 [ 274.661557] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 274.666565] ? prepare_exit_to_usermode+0x291/0x3b0 [ 274.671569] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.676401] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.681585] RIP: 0033:0x4574e7 [ 274.684762] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.703646] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:49:32 executing program 3: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0xe0200, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x29b4) 14:49:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1ff, 0x101000) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 274.711333] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 274.718587] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 274.725836] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 274.733095] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 274.740345] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0xd42) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f00000000c0)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, r2, 0x0, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5c5cb1ad}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0xb03b}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004804}, 0x24000080) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) 14:49:32 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 274.932284] XFS (loop2): Invalid superblock magic number [ 274.955493] FAULT_INJECTION: forcing a failure. [ 274.955493] name failslab, interval 1, probability 0, space 0, times 0 [ 274.967577] CPU: 0 PID: 11481 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 274.976175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.985521] Call Trace: [ 274.988093] dump_stack+0x244/0x39d [ 274.991704] ? dump_stack_print_info.cold.1+0x20/0x20 [ 274.996920] should_fail.cold.4+0xa/0x17 [ 275.000980] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.006062] ? __save_stack_trace+0x8d/0xf0 [ 275.010373] ? graph_lock+0x270/0x270 [ 275.014177] ? save_stack+0xa9/0xd0 [ 275.017787] ? save_stack+0x43/0xd0 [ 275.021400] ? find_held_lock+0x36/0x1c0 [ 275.025441] ? __lock_is_held+0xb5/0x140 [ 275.029486] ? graph_lock+0x270/0x270 [ 275.033300] ? perf_trace_sched_process_exec+0x860/0x860 [ 275.038739] ? check_preemption_disabled+0x48/0x280 [ 275.043764] __should_failslab+0x124/0x180 [ 275.047985] should_failslab+0x9/0x14 [ 275.051771] kmem_cache_alloc_node_trace+0x277/0x740 [ 275.056878] ? __alloc_skb+0x119/0x770 [ 275.060762] __kmalloc_node_track_caller+0x3c/0x70 [ 275.065679] __kmalloc_reserve.isra.38+0x41/0xe0 [ 275.070419] __alloc_skb+0x155/0x770 [ 275.074127] ? netdev_alloc_frag+0x1f0/0x1f0 [ 275.078549] ? kasan_check_read+0x11/0x20 [ 275.082684] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 275.087945] ? rcu_read_unlock_special+0x370/0x370 [ 275.092863] ? netlink_has_listeners+0x2cb/0x4a0 [ 275.097602] ? netlink_tap_init_net+0x3d0/0x3d0 [ 275.102262] alloc_uevent_skb+0x84/0x1da [ 275.106309] kobject_uevent_env+0xa52/0x101e [ 275.110703] ? resched_curr+0x1f0/0x1f0 [ 275.114682] kobject_uevent+0x1f/0x24 [ 275.118469] lo_ioctl+0x16f1/0x22a0 [ 275.122088] ? lo_rw_aio+0x1ed0/0x1ed0 [ 275.125966] ? find_held_lock+0x36/0x1c0 [ 275.130013] ? lo_rw_aio+0x1ed0/0x1ed0 [ 275.134012] blkdev_ioctl+0x988/0x21a0 [ 275.137899] ? blkpg_ioctl+0xc10/0xc10 [ 275.141773] ? lock_downgrade+0x900/0x900 [ 275.145909] ? check_preemption_disabled+0x48/0x280 [ 275.150929] ? kasan_check_read+0x11/0x20 [ 275.155075] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 275.160336] ? rcu_read_unlock_special+0x370/0x370 [ 275.165265] ? __fget+0x4d1/0x740 [ 275.168707] ? ksys_dup3+0x680/0x680 [ 275.172444] block_ioctl+0xee/0x130 [ 275.176058] ? blkdev_fallocate+0x400/0x400 [ 275.180371] do_vfs_ioctl+0x1de/0x1790 [ 275.184260] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 275.189782] ? ioctl_preallocate+0x300/0x300 [ 275.194174] ? __fget_light+0x2e9/0x430 [ 275.198134] ? fget_raw+0x20/0x20 [ 275.201633] ? rcu_read_lock_sched_held+0x14f/0x180 [ 275.206653] ? kmem_cache_free+0x24f/0x290 [ 275.210873] ? putname+0xf7/0x130 [ 275.214312] ? do_syscall_64+0x9a/0x820 [ 275.218270] ? do_syscall_64+0x9a/0x820 [ 275.222226] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 275.226794] ? security_file_ioctl+0x94/0xc0 [ 275.231205] ksys_ioctl+0xa9/0xd0 [ 275.234643] __x64_sys_ioctl+0x73/0xb0 [ 275.238520] do_syscall_64+0x1b9/0x820 [ 275.242392] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.247741] ? syscall_return_slowpath+0x5e0/0x5e0 [ 275.252656] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.257482] ? trace_hardirqs_on_caller+0x310/0x310 [ 275.262489] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 275.267503] ? prepare_exit_to_usermode+0x291/0x3b0 [ 275.272507] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.277336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.282513] RIP: 0033:0x4574e7 [ 275.285704] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.304584] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 275.312272] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 275.319519] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 275.326769] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 275.334016] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 275.341279] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:32 executing program 5: r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x112) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000380)={r1, 0x587000}, &(0x7f00000003c0)=0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="1b2d5adec3b13b36c70b3d8cada842c2ed74434876b5abaca8366018249c620b561ef4eccf6ecda21daea7a4244908a4394d7de367be3e619d3d1413c7d11c6d9210ae4ec3c4a4ad2226d5244a36e1cb1f34511f3b9a44402c1c2d2782e398d7caeee74b0f88b88d5d9a1d0acd4279d55e846941771642f701d755380b6c8e425e565abb95cee5ac4af9f09c480af2bde7c8e9bb38f51d82472bbcb6d6789a42bb3a474a9f8e60ebeb2b690bd8944ead3156a6329917ceda536e86ff58687f61b5dbc91e", 0xc4, 0xfffffffffffffffc) keyctl$setperm(0x5, r3, 0x80020) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = getpid() prlimit64(r4, 0xe, 0x0, 0x0) exit_group(0x200) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) r6 = dup(r5) write$P9_RCREATE(r6, &(0x7f0000000000)={0x18, 0x73, 0x1, {{0x18, 0x0, 0x1}, 0x7f}}, 0x18) ioctl$UI_DEV_CREATE(r5, 0xc00c55ca) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r6, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000280)=0x4) 14:49:32 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f00000000c0)=0xcdc, 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x10, @tick=0x7, 0x9, {0xfffffffffffffbff, 0xfd}, 0x80, 0x0, 0x5}) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000100)='.dead\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="c2c5d3e15273f84530de297d2528db99fe6349634b1c28955a1aba6948eca9627039af085d9fbe5112a48ff579a78d42f1b65c97257a9855b4c4fae454f8680bcef4e98778701840f24818c7771c9f58269571b51e86", 0x56, 0xffffffffffffffff) keyctl$assume_authority(0x10, r1) 14:49:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x1400000002, 0x0, &(0x7f0000004280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x8, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x105000, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000140)) fanotify_mark(r1, 0x40, 0x20, r1, &(0x7f0000000100)='./file0\x00') prctl$PR_MCE_KILL_GET(0x22) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000000c0)=0x7e00000, 0x8) ioctl$LOOP_CLR_FD(r1, 0x4c01) bind$alg(r1, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0xffffffffffffff3d) 14:49:32 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 275.471328] XFS (loop2): Invalid superblock magic number 14:49:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x50000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x3f, @dev={0xfe, 0x80, [], 0x17}, 0x3}, @in6={0xa, 0x4e20, 0x9, @loopback, 0x80000000}], 0x48) recvmmsg(r0, &(0x7f00000036c0)=[{{&(0x7f0000000300)=@sco, 0x80, &(0x7f0000001540)=[{&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/166, 0xa6}, {&(0x7f00000014c0)=""/70, 0x46}], 0x3, &(0x7f0000001580)=""/244, 0xf4}, 0x80000000}, {{&(0x7f0000001680)=@l2, 0x80, &(0x7f0000002b00)=[{&(0x7f0000001700)=""/217, 0xd9}, {&(0x7f0000001800)=""/223, 0xdf}, {&(0x7f0000001900)=""/135, 0x87}, {&(0x7f00000019c0)=""/174, 0xae}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/116, 0x74}], 0x6, &(0x7f0000002b80)=""/141, 0x8d}, 0x7fffffff}, {{&(0x7f0000002c40)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000003100)=[{&(0x7f0000002cc0)=""/56, 0x38}, {&(0x7f0000002d00)=""/214, 0xd6}, {&(0x7f0000002e00)=""/181, 0xb5}, {&(0x7f0000002ec0)=""/231, 0xe7}, {&(0x7f0000002fc0)=""/29, 0x1d}, {&(0x7f0000003000)=""/218, 0xda}], 0x6, &(0x7f0000003180)=""/33, 0x21}}, {{&(0x7f00000031c0)=@l2, 0x80, &(0x7f0000003580)=[{&(0x7f0000003240)=""/150, 0x96}, {&(0x7f0000003300)=""/215, 0xd7}, {&(0x7f0000003400)=""/139, 0x8b}, {&(0x7f00000034c0)=""/169, 0xa9}], 0x4, &(0x7f00000035c0)=""/228, 0xe4}, 0x200}], 0x4, 0x40000003, &(0x7f00000037c0)={0x0, 0x1c9c380}) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) write$P9_RWALK(r1, &(0x7f0000000280)={0x4a, 0x6f, 0x1, {0x5, [{0x60, 0x0, 0x2}, {0x80, 0x2, 0x1}, {0x12, 0x0, 0x3}, {0x81, 0x2, 0x5}, {0x4, 0x3, 0x1}]}}, 0x4a) ioctl$RTC_PIE_ON(r1, 0x7005) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4408}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0xc08, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) [ 275.565263] FAULT_INJECTION: forcing a failure. [ 275.565263] name failslab, interval 1, probability 0, space 0, times 0 [ 275.586147] CPU: 1 PID: 11505 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 275.594758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.604194] Call Trace: [ 275.606795] dump_stack+0x244/0x39d [ 275.610473] ? dump_stack_print_info.cold.1+0x20/0x20 14:49:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x3) ioctl$UI_DEV_CREATE(r2, 0xc00c55ca) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x1, 0x3, 0x40000080000001, 0x81, r3}) 14:49:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x20200, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = msgget(0x2, 0x0) msgctl$IPC_RMID(r1, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 275.615693] should_fail.cold.4+0xa/0x17 [ 275.619787] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.624905] ? __save_stack_trace+0x8d/0xf0 [ 275.629268] ? graph_lock+0x270/0x270 [ 275.633085] ? save_stack+0xa9/0xd0 [ 275.636735] ? save_stack+0x43/0xd0 [ 275.640392] ? find_held_lock+0x36/0x1c0 [ 275.644471] ? __lock_is_held+0xb5/0x140 [ 275.648536] ? graph_lock+0x270/0x270 [ 275.652331] ? perf_trace_sched_process_exec+0x860/0x860 [ 275.657781] ? check_preemption_disabled+0x48/0x280 [ 275.662791] __should_failslab+0x124/0x180 [ 275.667023] should_failslab+0x9/0x14 [ 275.670819] kmem_cache_alloc_node_trace+0x277/0x740 [ 275.675909] ? __alloc_skb+0x119/0x770 [ 275.679803] __kmalloc_node_track_caller+0x3c/0x70 [ 275.684718] __kmalloc_reserve.isra.38+0x41/0xe0 [ 275.689465] __alloc_skb+0x155/0x770 [ 275.693181] ? netdev_alloc_frag+0x1f0/0x1f0 [ 275.697594] ? kasan_check_read+0x11/0x20 [ 275.701745] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 275.707017] ? rcu_read_unlock_special+0x370/0x370 [ 275.711948] ? netlink_has_listeners+0x2cb/0x4a0 [ 275.716691] ? netlink_tap_init_net+0x3d0/0x3d0 [ 275.721346] alloc_uevent_skb+0x84/0x1da [ 275.725403] kobject_uevent_env+0xa52/0x101e [ 275.729810] ? resched_curr+0x1f0/0x1f0 [ 275.733806] kobject_uevent+0x1f/0x24 [ 275.737602] lo_ioctl+0x16f1/0x22a0 [ 275.741221] ? lo_rw_aio+0x1ed0/0x1ed0 [ 275.745130] ? find_held_lock+0x36/0x1c0 [ 275.749174] ? lo_rw_aio+0x1ed0/0x1ed0 [ 275.753044] blkdev_ioctl+0x988/0x21a0 [ 275.756912] ? blkpg_ioctl+0xc10/0xc10 [ 275.760781] ? lock_downgrade+0x900/0x900 [ 275.764911] ? check_preemption_disabled+0x48/0x280 [ 275.769915] ? kasan_check_read+0x11/0x20 [ 275.774052] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 275.779341] ? rcu_read_unlock_special+0x370/0x370 [ 275.784275] ? __fget+0x4d1/0x740 [ 275.787727] ? ksys_dup3+0x680/0x680 [ 275.791435] block_ioctl+0xee/0x130 [ 275.795048] ? blkdev_fallocate+0x400/0x400 [ 275.799391] do_vfs_ioctl+0x1de/0x1790 [ 275.803284] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 275.808833] ? ioctl_preallocate+0x300/0x300 [ 275.813253] ? __fget_light+0x2e9/0x430 [ 275.817228] ? fget_raw+0x20/0x20 [ 275.820682] ? rcu_read_lock_sched_held+0x14f/0x180 [ 275.825696] ? kmem_cache_free+0x24f/0x290 [ 275.829926] ? putname+0xf7/0x130 [ 275.833380] ? do_syscall_64+0x9a/0x820 [ 275.837374] ? do_syscall_64+0x9a/0x820 [ 275.841380] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 275.845982] ? security_file_ioctl+0x94/0xc0 [ 275.850399] ksys_ioctl+0xa9/0xd0 [ 275.853877] __x64_sys_ioctl+0x73/0xb0 [ 275.857767] do_syscall_64+0x1b9/0x820 [ 275.861649] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.867029] ? syscall_return_slowpath+0x5e0/0x5e0 [ 275.871943] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.876772] ? trace_hardirqs_on_caller+0x310/0x310 [ 275.881776] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 275.886789] ? prepare_exit_to_usermode+0x291/0x3b0 [ 275.891799] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.896634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.901806] RIP: 0033:0x4574e7 [ 275.904998] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.923928] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 275.931663] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 275.938926] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 275.946204] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 275.953468] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 275.960728] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:33 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 276.154304] XFS (loop2): Invalid superblock magic number [ 276.174805] FAULT_INJECTION: forcing a failure. [ 276.174805] name failslab, interval 1, probability 0, space 0, times 0 [ 276.186939] CPU: 0 PID: 11544 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 276.195524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.204895] Call Trace: [ 276.207483] dump_stack+0x244/0x39d [ 276.211101] ? dump_stack_print_info.cold.1+0x20/0x20 [ 276.216285] ? lock_downgrade+0x900/0x900 [ 276.220436] should_fail.cold.4+0xa/0x17 [ 276.224496] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.229593] ? rcu_softirq_qs+0x20/0x20 [ 276.233574] ? unwind_dump+0x190/0x190 [ 276.237507] ? is_bpf_text_address+0xd3/0x170 [ 276.242002] ? graph_lock+0x270/0x270 [ 276.245786] ? __kernel_text_address+0xd/0x40 [ 276.250264] ? unwind_get_return_address+0x61/0xa0 [ 276.255178] ? find_held_lock+0x36/0x1c0 [ 276.259222] ? __lock_is_held+0xb5/0x140 [ 276.263272] ? kobject_uevent+0x1f/0x24 [ 276.267227] ? perf_trace_sched_process_exec+0x860/0x860 [ 276.272657] ? do_vfs_ioctl+0x1de/0x1790 [ 276.276699] ? ksys_ioctl+0xa9/0xd0 [ 276.280302] ? __x64_sys_ioctl+0x73/0xb0 [ 276.284345] ? do_syscall_64+0x1b9/0x820 [ 276.288399] __should_failslab+0x124/0x180 [ 276.292620] should_failslab+0x9/0x14 [ 276.296402] kmem_cache_alloc+0x2c4/0x730 [ 276.300535] skb_clone+0x1bb/0x500 [ 276.304089] ? skb_split+0x11e0/0x11e0 [ 276.308006] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 276.313037] ? netlink_trim+0x1b4/0x380 [ 276.317018] ? netlink_skb_destructor+0x210/0x210 [ 276.321873] netlink_broadcast_filtered+0x110f/0x1680 [ 276.327050] ? __netlink_sendskb+0xd0/0xd0 [ 276.331270] ? kasan_check_read+0x11/0x20 [ 276.335396] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 276.340656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.346176] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 276.351624] ? refcount_dec_checked+0x70/0x70 [ 276.356133] ? netlink_has_listeners+0x2cb/0x4a0 [ 276.360867] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 276.365865] netlink_broadcast+0x3a/0x50 [ 276.369922] kobject_uevent_env+0xa83/0x101e [ 276.374358] ? resched_curr+0x1f0/0x1f0 [ 276.378327] kobject_uevent+0x1f/0x24 [ 276.382124] lo_ioctl+0x16f1/0x22a0 [ 276.385763] ? lo_rw_aio+0x1ed0/0x1ed0 [ 276.389652] ? find_held_lock+0x36/0x1c0 [ 276.393726] ? lo_rw_aio+0x1ed0/0x1ed0 [ 276.397590] blkdev_ioctl+0x988/0x21a0 [ 276.401470] ? blkpg_ioctl+0xc10/0xc10 [ 276.405360] ? lock_downgrade+0x900/0x900 [ 276.409500] ? check_preemption_disabled+0x48/0x280 [ 276.414511] ? kasan_check_read+0x11/0x20 [ 276.418637] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 276.423889] ? rcu_read_unlock_special+0x370/0x370 [ 276.428827] ? __fget+0x4d1/0x740 [ 276.432262] ? ksys_dup3+0x680/0x680 [ 276.435974] block_ioctl+0xee/0x130 [ 276.439615] ? blkdev_fallocate+0x400/0x400 [ 276.443935] do_vfs_ioctl+0x1de/0x1790 [ 276.447818] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 276.453376] ? ioctl_preallocate+0x300/0x300 [ 276.457799] ? __fget_light+0x2e9/0x430 [ 276.461783] ? fget_raw+0x20/0x20 [ 276.465237] ? rcu_read_lock_sched_held+0x14f/0x180 [ 276.470252] ? kmem_cache_free+0x24f/0x290 [ 276.474489] ? putname+0xf7/0x130 [ 276.477956] ? do_syscall_64+0x9a/0x820 [ 276.481931] ? do_syscall_64+0x9a/0x820 [ 276.485913] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 276.490499] ? security_file_ioctl+0x94/0xc0 [ 276.494913] ksys_ioctl+0xa9/0xd0 [ 276.498377] __x64_sys_ioctl+0x73/0xb0 [ 276.502270] do_syscall_64+0x1b9/0x820 [ 276.506174] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 276.511538] ? syscall_return_slowpath+0x5e0/0x5e0 [ 276.516468] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.521313] ? trace_hardirqs_on_caller+0x310/0x310 [ 276.526332] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 276.531378] ? prepare_exit_to_usermode+0x291/0x3b0 [ 276.536420] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.541273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.546462] RIP: 0033:0x4574e7 [ 276.549656] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.568586] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 276.576329] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 276.583621] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 276.590873] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 276.598126] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 276.605394] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) r2 = socket(0x3, 0xa, 0x6) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x200, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0xff}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4004001) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:34 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) fcntl$getown(r0, 0x9) 14:49:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) get_thread_area(&(0x7f0000000000)={0xffff, 0x20000000, 0x4000, 0x5, 0x6, 0x66, 0x1, 0x0, 0x224, 0x9}) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:34 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000009200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000003388884f923df42f00000800000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000080a36a7b73e6b122840fdc5c26b1cddea8beba39405ed95529afff53748581b30996fafa88f04888c7cfd92ad4f47460aabe7602e1a9d7f4edc398f0b97c253eecda2747da5af9b079e3517aac7a913ea9b1d8fdcbd0eaa4dc283454868ee64520bc5644113fddb45ecd11426dca848f184d8163c6fcb22e3a49804a1900dbf840fda06c5d0a271fdcc4b8d550f66d959e9576d0610c60af325d8ca9e1982efed1d2cdacc39e86482c8b4092265e7d324019e7cbc4921e6848bfd6"], 0x119) close(r0) r1 = socket$key(0xf, 0x3, 0x2) accept4(r1, &(0x7f0000000000)=@hci, &(0x7f0000000080)=0x80, 0x80000) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0xf3e29356ed2542a0) bind$alg(r2, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x9, &(0x7f0000000540)=[{&(0x7f0000000180)="9e9e92f31d039e6ad6a1cdfa258f56c5d6cbf4ffb02e8a52bf57786b0bedb21d404386b00aa8ea2d916d15c00ec93346e13f71a2790f4d5c9ac8fc7a69e7e20832b9f74b9db75de3588f22eb4836e7f7276bd89df0d7aabdbe4d21eca1c9e16a08b76a3f0bc7d4f37ffe98e97708c7f94fb4e4cd8a002db92270010669b0635837963e5a6cacf7cb72d714864c0318e6b7ae6a9c1efc14c2ff60dd64eff7c080d8acccd562de5882bb02d555a972f845f7ff673adde1e224c07ab5e820d2758bc4fb9562d0f08c1fbb81d566146f8943af22d4b17db95a0f7f80b379160ed6e3487b080c71", 0xe5, 0x34}, {&(0x7f00000000c0)="42beb88eb37495b74c8e3485422277b7c87744e1b34048f432d58d1132f0", 0x1e, 0x7}, {&(0x7f0000000100)=';s', 0x2, 0xfc00000}, {&(0x7f0000000280)="5ba8888aa237a1594925911bc65d207b860331860e2847e6be8bb614e2a8a41c538b076011ab79abba57dad0f96762601d0d91a47003d43cdb618c7f83e8766a55abfc78daf35ede4ff53ab8141ea7ed4075f35f0ade85f76d7c754126c85160d354e686b3e338a1067fab24fc9fe9532f2e257c9a8be959927f5c99330d637981c8f19a0419cdeca0a38bf19bae57418b0094f6474a073726b8aa6f5000a4fd8220641d5ff2ca05a7e37c", 0xab, 0x4}, {&(0x7f0000000340)="9f6f3d2ed05385f30a13db", 0xb, 0x9}, {&(0x7f0000000380)="e47499879bc43510f556bb6683f65b03cb1b1b16a52bbbc860e3b7a708e79f52dde41942dadb2eff540b7aebb66ea5373e25505d503890d494b99d0d5a642ab1a3c4de47c470aa238ca93882f7b14239f2189c87f01fb120fd9a2983c5f0c05483ee2b7582ae69550d7f991749937a92138583af148c22403e5f4d00ffb000aea70f6eaadda95cb20edaae4d3649abada665461e35c86045a6c7", 0x9a, 0xac}, {&(0x7f0000000440)="1764823c840a5a0e32a045", 0xb, 0x6}, {&(0x7f0000000480)="03f9150bdfa71b0d2779c233f76e42e9b46aa5cf1b048ae55a66e171aed68c3ac28f2cba7c185ff9f63f9fbd1b3d8635bea2217717faf4b167edee1d8dacec76a9eae5587070a365f4650c1c35f9432b9a7a5717f333bbc043c31597f83799e778282508b5d794124fcb", 0x6a, 0xffffffff818a0a81}, {&(0x7f0000000500)="aea66f217c34bf08dabd8fc44fd2c9973ee64cd07628cb450cde259fa5431efc4d2f2f16a86bfed35d", 0x29, 0x1}], 0x1008064, &(0x7f0000000640)='#.keyringeth0\x00') r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:34 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x900, 0x0) r2 = shmget(0x1, 0x1000, 0x1000, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000040)=0x3f) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="7c32fe8f46033bf238bf38342d315c4a2f3d2f453c8ad0c3abaff878c26c98955729fc21a38cfa448a48e32d9927da58602894632218fa841cf71b2082fecda7d70c0e0c7e3d1ee5bfa5782b0a767c792d934bc360cb7a8ad4a6347654c92b1b4e2cf8114a11716f15da94596aba2fcf370d26098b075a529df1fb095b5d090d2eeda900dda23d26c089d4f7465865ee4f158aa09fc33565eead4d6720c76e8182ba8bbc0219a9b568dd7bfc9841426b5f7f3edd4b", 0xb5) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000280)=""/249, &(0x7f0000000100)=0xf9) [ 276.841035] FAULT_INJECTION: forcing a failure. [ 276.841035] name failslab, interval 1, probability 0, space 0, times 0 [ 276.857841] CPU: 0 PID: 11577 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 276.866436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.875792] Call Trace: [ 276.878400] dump_stack+0x244/0x39d [ 276.882042] ? dump_stack_print_info.cold.1+0x20/0x20 [ 276.887257] ? lo_rw_aio+0x1ed0/0x1ed0 [ 276.891191] should_fail.cold.4+0xa/0x17 [ 276.895259] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.900371] ? blkpg_ioctl+0xc10/0xc10 [ 276.904261] ? lock_downgrade+0x900/0x900 [ 276.908426] ? check_preemption_disabled+0x48/0x280 [ 276.913465] ? kasan_check_read+0x11/0x20 [ 276.917623] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 276.922908] ? rcu_read_unlock_special+0x370/0x370 [ 276.927877] ? find_held_lock+0x36/0x1c0 [ 276.931953] ? vxlan_fdb_info+0xa78/0x1120 [ 276.936222] ? perf_trace_sched_process_exec+0x860/0x860 [ 276.941678] ? block_ioctl+0xee/0x130 [ 276.945483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.951039] __should_failslab+0x124/0x180 [ 276.955288] should_failslab+0x9/0x14 [ 276.959091] kmem_cache_alloc+0x2c4/0x730 [ 276.963241] ? fget_raw+0x20/0x20 [ 276.966711] getname_flags+0xd0/0x590 [ 276.970513] do_mkdirat+0xc5/0x310 [ 276.974069] ? __ia32_sys_mknod+0xb0/0xb0 [ 276.978215] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.983585] ? trace_hardirqs_off_caller+0x310/0x310 [ 276.988718] ? ksys_ioctl+0x81/0xd0 [ 276.992398] __x64_sys_mkdir+0x5c/0x80 [ 276.996289] do_syscall_64+0x1b9/0x820 [ 277.000175] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 277.005539] ? syscall_return_slowpath+0x5e0/0x5e0 [ 277.010470] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.015314] ? trace_hardirqs_on_caller+0x310/0x310 [ 277.020333] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 277.025369] ? prepare_exit_to_usermode+0x291/0x3b0 [ 277.030396] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.035250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.040443] RIP: 0033:0x456a97 [ 277.043642] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.062549] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 277.070259] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 277.077545] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 277.084836] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 14:49:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000000)="c23de464b3a17f9af4a100347639b2ec7b80073bff0c65421a14bb42566c4e2cdd7984cdf8bb54677e254bf90f8d61ed6aab276b2ce878c4d94806f357d210fdeb57381046b64cb59effe602557cc0c7fffe453b053d82e299f37c77df354d3e7f6615c945f0dfa8ee965a181316e22337d9fe8a6a9a4d5e6af70ab43156b016e0313556ba267b37af813ff2fac3579c32111d159b2921cb86c6e856dd88564fda65e4dfbb15aec35d0a4e97af83b07fba6025c59d25", 0xb6) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x19d, 0x0, 0x0}) 14:49:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0xfefd) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x102c, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r1, 0xfffffffffffffffa, 0xfffffffffffffbd2, 0x8, 0x9f}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000140)) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f00000000c0)) [ 277.092107] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 277.099384] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 277.128275] XFS (loop2): Invalid superblock magic number 14:49:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TCGETA(r2, 0x5405, &(0x7f00000001c0)) ioctl$VIDIOC_G_FBUF(r2, 0x8030560a, &(0x7f0000000180)={0x8, 0x8, &(0x7f0000000040)="277a1076ef43ddb8d32413c5ee6cb9e0b6d36b955502211423ec0a45486b6022dd23f49bc7cf12295f4547e645619a04babdfb2f7e8fda03bf698e89b8394c291ebad809fc9ea210e26a2c521778dea529fd9256ad1780353b804dbd72fdf7ae18ba1c2a2115409947752f0accc7392484f631871739c3dc759037fe4a4bb9c7dcf0955860f56f856e8cfb64b526e892ecfcd079ba583b69863530881174ab3b5cbc8c8ec2844eef46c676c6ff9db9ce202e20247e6e819e97d607a8d564b0e2dd61942d15126fdc24bbc8d40ec0034a26e88aa71aacda414b6ca57b3444d5eaab", {0x4, 0x2, 0x7156575b, 0x7, 0x1, 0x100, 0x5, 0xfffffffffffffff8}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f0000000300)={{0x8000, 0x100000000}, {0x6, 0x2}, 0x6, 0x2, 0xffffffffffffffff}) setxattr$trusted_overlay_origin(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x2) 14:49:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x101100) write$P9_RWSTAT(r1, &(0x7f0000000040)={0x7, 0x7f, 0x1}, 0x7) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:34 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) fchmod(r0, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r2, 0xc00c55ca) 14:49:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0417d79ec8752a748ffb96da405be17caee075b16682ba1e5a09dca2a0746104c3d6705869d65dceceb54f0000000000000068a66dede5a259cfef53e2ad07f4a28512fd2d651b87750844c7ce2e66db0b55ec957f4d4e9013ecd90cc16926aefca8b524bd011bf9fd4beeefc813823e1539f9ea1b4f060be6dea586fb0bae46ab7e2299b2d7744c86660d6d695fdcdf792c5b0a3d07c3b9ea825cb659869ec06c307318bd672a626c300aa5082d9185101bd4a48ccfb0ec8e6a98c256a8e9cd1d02505de114ec6f181517c12bc280d20e025ec4ab4a3306a47fab92453a8bbeb4dc8beca2", 0xe5) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x8000, 0x0) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000340)) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f0000000280)={{0x0, @multicast1, 0x4e23, 0x2, 'lblc\x00', 0x36, 0x7fffffff, 0x5d}, {@broadcast, 0x4e24, 0x0, 0x73c8, 0x10001}}, 0x44) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="8c000000", @ANYRES16=r4, @ANYBLOB="080727bd7000ffdbdf25026d0cb3bdd5e0796d000600fe80000000000000000000000000001031000200697064647030000000000000000000000800030003000000080007004e24000014000200697036677265746170300000000000002800020014000100ff01000000000000000000000000000108000b00020000000800040003000000"], 0x8c}, 0x1, 0x0, 0x0, 0x41}, 0x4004000) 14:49:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx2\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f00000000c0)) [ 277.375941] Unknown ioctl -2120175988 [ 277.380453] FAULT_INJECTION: forcing a failure. [ 277.380453] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 277.392275] CPU: 1 PID: 11616 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 277.400856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.410208] Call Trace: [ 277.412810] dump_stack+0x244/0x39d [ 277.416464] ? dump_stack_print_info.cold.1+0x20/0x20 [ 277.421669] ? wake_up_q+0xb3/0x100 [ 277.425327] should_fail.cold.4+0xa/0x17 [ 277.429421] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.434548] ? __kasan_slab_free+0x119/0x150 [ 277.438971] ? kobject_uevent_env+0xf76/0x101e [ 277.443575] ? mark_held_locks+0x130/0x130 [ 277.447833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.453389] ? lo_ioctl+0x1e9/0x22a0 [ 277.457128] ? lo_rw_aio+0x1ed0/0x1ed0 [ 277.461032] ? find_held_lock+0x36/0x1c0 [ 277.465118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.470670] ? should_fail+0x22d/0xd01 [ 277.474588] ? blkdev_ioctl+0x1ef/0x21a0 [ 277.478660] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.483777] ? blkpg_ioctl+0xc10/0xc10 [ 277.487667] ? lock_downgrade+0x900/0x900 [ 277.491825] __alloc_pages_nodemask+0x366/0xec0 [ 277.496511] ? kasan_check_read+0x11/0x20 [ 277.500663] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 277.505946] ? __alloc_pages_slowpath+0x2e00/0x2e00 [ 277.510991] ? find_held_lock+0x36/0x1c0 [ 277.515067] ? crypto_dump_reportstat+0x88/0x350 [ 277.519843] ? trace_hardirqs_off+0xb8/0x310 [ 277.524263] cache_grow_begin+0xa5/0x8c0 [ 277.528328] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 277.533891] ? check_preemption_disabled+0x48/0x280 [ 277.538917] kmem_cache_alloc+0x66a/0x730 [ 277.543076] ? fget_raw+0x20/0x20 [ 277.546547] getname_flags+0xd0/0x590 [ 277.550385] do_mkdirat+0xc5/0x310 [ 277.553929] ? __ia32_sys_mknod+0xb0/0xb0 [ 277.558074] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.563434] ? trace_hardirqs_off_caller+0x310/0x310 [ 277.568538] ? ksys_ioctl+0x81/0xd0 [ 277.572165] __x64_sys_mkdir+0x5c/0x80 [ 277.576055] do_syscall_64+0x1b9/0x820 [ 277.579937] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 277.585317] ? syscall_return_slowpath+0x5e0/0x5e0 [ 277.590255] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.595130] ? trace_hardirqs_on_caller+0x310/0x310 [ 277.600146] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 277.605164] ? prepare_exit_to_usermode+0x291/0x3b0 [ 277.610199] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.615044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.620231] RIP: 0033:0x456a97 [ 277.623423] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.642361] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 277.650073] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 277.657340] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 277.664617] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 14:49:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x400000) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000080)={0x5, {{0xa, 0x4e24, 0x3, @mcast1}}}, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r2, 0xc00c55ca) 14:49:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000100)={0x55, ""/85}) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 277.671897] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 277.679164] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) io_setup(0x0, &(0x7f0000000080)=0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x131081, 0x0) io_cancel(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f00000000c0)="d9c7eb1f8836bb3d308514af355dedd3686e432f55379134faccdae68443dc892c6375d98c69e0dc43f954d55bd9fd127cfa360b4ca3a8baefb1bed86c8d185d83d5574e9cb2013a25f76d102bac1f7ba5530c852ef181593dd5976a894774a6b2c632a48cf9b606bab0c65b5d3024583b92c960bac05eaf83f0d3f6bdabbc11feb7fb61bcde5e004776cfa27c286589a65efdb13c10f9cf8dbfd6b785fd15adde6a347d851668c389bb886d65b07f2ff30f0970f05c40e6abed67effccf0b5497a7be046999ab57f4b7788e21412ac06f7056f090fc751ac1f71aab18", 0xdd, 0x168, 0x0, 0x1, r2}, &(0x7f0000000240)) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 277.767466] Unknown ioctl -2120175988 14:49:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x3, 0x22000) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000240)={0x2, 0xffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) geteuid() r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x400000, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000100)="c237758c412fed3425ecc264080524589d972befbb1472dfa3f7bdd3de4792eb85bef5627978261d2424a2a557d9986d3e77febd72810c0571f24b7d8aeff044a354de1729054edc777c5d140376f1f30d932ffbe851a113cad547a050d4290de662e7c88bf2a387b6fcaa013c29a898cfc4d621f51f4326bc301ad790e0cbaf9c6925470addc02485bef550d5a73c6b474c38c2460202950230d4b85b394148b6519a74889b560cdfdac1448b6aac6bf4435bf857f634fac7a5bb31d859bd451687899015bdaa863497723984", 0xcd) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x202000, 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x2000000081) ioctl$KDDELIO(r1, 0x4b35, 0x4) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x3}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r2, 0x401, 0xffffffffffffffe1}, &(0x7f0000000180)=0xc) syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x3, 0x80) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r3, 0x4) 14:49:35 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 277.858758] XFS (loop2): Invalid superblock magic number [ 277.962239] XFS (loop2): Invalid superblock magic number 14:49:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfsH', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256-generic\x00'}, 0x58) 14:49:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$VIDIOC_G_AUDOUT(r3, 0x80345631, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:35 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f0000000000)=""/84, &(0x7f0000000100)=0x54) 14:49:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x7fffffff, 0x7, &(0x7f00000014c0)=[{&(0x7f00000000c0)="9ecce9c607334aa37634ed8e46855a35e1d241d5d08c2682747aa44b616a58d4ed55497e4312ab02ab", 0x29, 0x4a37}, {&(0x7f0000000180)="562eb36b22cde78441c4a0d18b71ff97058e8bc28733ad657a6db484b2ddc72e65e5d83c7369c3d35ff76394a6461208e95bc38ec3ebd165df56abcf0a8d816ffec4b0be3937d1673e984d4a86bb0ea4f81ecaffe9397af34730d57426c9fa1d05856e21fd88de17edc81076590389cf7f0a75e86396a1c0f6e761c9b1cc41392612573a29c425eb87c1ad4d9e3412e8d8a2aa49521b11fd172f300220b38f38d37dcc91210a094e22c37dbb38f8c66681cfaeb0f5e7e2c1cc4a08b2aab7d22351c45d780b70a49ec6c6c0f5383ab88d8ebe", 0xd2, 0x8ee1}, {&(0x7f0000000280)="4d73f834b211f3ff2842c73c93bba4e18f79a61ceec2eee2ba216b86489b20faeb5d3e895b772d3f2f0a23f8fb181340f882a0122999b76537d9c72c5dd1c84b4ea5f7064777402d2d03c86a04520feb934f7504f21f9acca02340ebbff059d346042e466f918131e563e85fd40713bcf9ab0e1cea3a59a81e8f42d7e1fd41af92d7439d3c49657941506e2603f018373b61f2559e6de64a229194ef81db604216e5ac6c5524f169c8d1f9e9a58ed1ea2e00014200d0e6fe7896ee83c6a8f91e145cdd2de481d0e8f85f2ffa645f5f18c81e8e0b3045447ae23c6bdca3c17e78ec5cbb363e777df0d226231aae5d821700c3a2a0b0bf2249ec7d7a94a5bfbdc9fbc1fee89f80070390ff3428676440629e42aa01552af870a413834d46897a782f74c265ac3289d3095de8ae4832fd6e2f12ab1853fe92c45d5cb99b5ab9bfb84803914b0d53de8a58b44707f28670943514ad2a50eaee741bbb494ec43a34e12c6920022b74931570eb85aa4493ddaf1dc44840f1723c81facf2c602d1d9f005dcc013cd0565c2790a3d10677b389b3ae2addd229ffd19826a7cadbdb88a3f6fe69c7d82ddbe0500ef5f08b521681a6551ece082fe4e7dc3a2eb1509574985e6b9efec5f3be091ecfdfd587d0102fb52cb855fcf8e36a0962eba75fcfd8852912e624137a5242cd59fa2933ed1a1a8101bbdbc6ac26db1391931c0b7c780e4e593aeab4f7ebe8e76ed7053c41f25df1dce399a092e8d223148d1663596985f4f1d61528cee64c0279f23546cb01c2733f96f591145c2870b5cb2a33b7faddb44052637076cc0a0369fc23805b50f1f971d692500c949f649cab7eb54668b0bd072d485f3c44ea16b7e3f7dd0a681bc35bd3850ec51a564e36db71cd45658ec90c5b4ea3b81fb16c8b1ec72778405d9883fedf2ad687bb940057cf2ed840fed758a531244a692cfe9cef11cf2eea733745746eb9f7c7a780744ee1af7cace9c8ab83643d99b115cc40228e8657a931920a7abae9004c6728ae11b7b68512bfc28d705591465d5dac59d012aa50e810c08a053bc281619c655eedeaab0f4d5c3066ae2831ea9d8fa3e58b7dc2994d633d4e5a7dea84dee9617d5d5bcbe53a10714eba117d2162d0cb8244877bc2b8814d1380e2466d12612e3ee5cfd8074979aecffacc3409914cfb97d8e6d9903911de78e2f2142f9815f681e490c93f191aecbb6fbe31d113982f63d0d4e51a87ca4f00b12f9d8934b58f293a303d6684e14a371d3832414eed60ac1e8aba0043d3bedbb774a2a14ae30fc945b921e038f9a69b1549ec7eb4111348475ec1b548d433ec05d0810f38de47bae53dd60962cc9fa06577992d8bdc176cf9f92643595b078cf3c355b0d633109b6c83bba3f7aa8e5e0bb68a3f5d73f7cb7f182f690ec66eec6a427e9018f6835324acee32f3de0f2951dd689e61b1ab5a4e793dc190f4b14f35b65815d17acad296db133631accfdb4d2070a98efcb94152e52cdb14f03d29a3b709618c6c33b62aa3575447e1943337935d98b0dfba296819bcf321cb7b6aabc1795be4a4de8eb3e362519f876a196297e9ff187f84ce8620d2bb9d0bf6d05410511aa437adbd79342d4f9f7bbb2515dafd84d5372f825f80fc3e28f720e02daf4c8e69bfa22cd75141b4def814103e28ea6eab4e4d0becc51571d2316b7c2e6655811d18aebfc6fda5296506dc6134650cc6fa4f952ab1c2473f2526287326743cb384d913f3dec73f8bd2236763db967b746142bf2e6394fcfc018f2d8c3d368d11faf1734f9aaef06f68e61e131e8f8ce8bd16927365f4dad8a62a2483980bd42f46e226fa3cfef5e9ab599f35b472500a2b9ebaed601c33bc68c4b649963621bc10b6aacbf8096a3e9bd67dad7f35fd67be39c604c8d5f33f64086c996efa14be35153ea7141328094f52312a92dcab17eb888a690c767cb0b4dcd6c5964d1cc7e97afde22952050dcc0e59b1e1d231b4eb6fbaf145f4f7e5d0ed8f3c085b4710e504761451388746b8d7c71bad62b9dddb64577b12b0e27bc6bd71f60253588384a1cf319cb6052e8bbfeddb3a5f3869194d7c7f93ab182cf3b4068e90d2ef417b8979cf5bef29cc206f5e46ab58b68ba0e586327d98c7825e90fe1ed87d38c658710c04e7847534f5a72b43d62ab441230e39bbad5c6339439bd224e49f9ec4c605d177b13bfe3da545cb8afa3139600c5d4f1ff362424f44b2e692f90a23263d3b3927701cc02a66f622c20021757f3008812ae32773790409c3e7effec6155d428cebb0b707e71e7331be77d7987670e0708d2151d4b9fe01a266e1ebf27d91b55a20441facae5d84b823e507f7aac4a2bb50c7552d1afd0938fd68eb33be201e25e4949c483fc76521c6cf65f4f8f09f2ede2d0d2ba911344272dc27bd9e82b9f30a5f7502810231d6d48eec527003087056526e71a23a829041eb8b7adca1c60bf6b4c0fbb7a8afda1c688e57c478aa0cd850582d52c441508cf6f7e6204b43115d84bf4da67b72a03d47c3ebe315a67cf9cafdf64766602359aa2cabd15ad2cd00b85385c83f20fd0789f06699145c2f823af87a2363ceb8f1ff37e5bd3920512de732ed1472ab16c129757f8569fd699cbb6c18c1ba948360f88d337071a4571cd8d496dc5f231ce1767ce7842cefb5f2df8a90ad1243f7cac94c07de5996daac8b163b7f129d3756d931f51d1b4ca2bb3d77dc147213cd4f5906c408606e6eb35a3194c8f07ab6b8336653f2f7e622eeb988dcad4733ff90c1e424290d2e4743f156177bfb435ed54f873ea8260c23ff81db26b75dd8f66d22aab33beb00ea99a8587b3db1933372141c40654b5bb850eaaba5cba537ebe377b09f3cc9efbf5d11d79ee6298b5cfeeeafd5c285a2be240d663a1363ec69a3909f466f85e4d819afd02c8207533b5eb9e296c51fd75160acd17f797d46ae8eda7832e1228d2b8b7163c59b93c1146449b5c386a3c052cfc5aeb54ba570caee3e613bd7f67501512130a10d69e6d8598aaccf577fab6005783b0eda78324700811541ae89fe67662edec735f3ddcdf1fb02ac143ca8b6ce0ece657f32f8303060fc583359547413d7fea2430b95d6cd70cf86f410e29951daceaa98d1b461a6b6f97cb03584d2d3a5c170fa2079f276675a5b95097ebc6894c60f157d9da93fc04105d05e812d681f2d8a833b16fcdc74195478dea651b2eed6727847e9919c5d48da6084713f4cec33eb6c31c6fdbb496ba88fdcf8cded6b3c81af1a6bfe3925ab4d577c78ad1e9a10e73d443ac1f78fe20f4978f53b2a8720736605979527ea33be378c2acd0520a78827285862161d313dab8c2e657ce39fb589dce44d0b5c30d50ec9b51dd68e135531be46ae11b12944507e736ecc4f1878086e8d3f8286367e2a294cab1958fd044efa7539d0f1e7ae550ab980a25fa9012b04accfcc29e1c0e6348ed59d00fce2d82b48b959a5df82c130c3f12f80efc05dd78ef5ce5aa43ff79968fe712671aa0abcee95d8239d7ea9a0ea76b15d366f823e1743bcc26e39b52ce42a487fd04522b3b4f48371b55f201d003c6be0fb42fd97086555e33821b5e74c5aace4839e63f3fda1c402b13ad247a660f9d5c9e132a03056bfa06d95b6be243bbf4382b87df278404dc1635474649f782ef9c0c745163ba8e3a1431efb4a638fe383035e24fa390aa9442a980a92447bb8b1c6732d5e143bdac6bc6e079a4b8c77548286df1439e23cbb31f25bb188d92a3dc826b91e27e93eb0f799ca35568c1d9c7b9b7f5baaecf9651cfc9d017bad57ead8768194a903144924c9d0e23645f206244495ed18101982ec6764a6875d9b4cb6478849f637f8bae0b778373215136021fc2943b0e8807a29fbbfa2f96e76ad344c223c03ef16ed644b07a70851a490256b63600b093fbf6f82755de2b23916e54f771be3e45580c9e9b87591141369823f4e936dd5d624692d3298809e347a8f1c701754a458be7e616f56197a05ba45c401ac93a6bd19fc029f347a8dd0855397351b9cb8018fc634b2f59107985c8443035b12171cfdf6bcfca19c157eb9f67ba50e8bd567f11f8a1d7bd29168ec9c33a4f45cd084466f4c4bff6839f7b3d531a04b127308e709896fd45fa6733b24056bf3df1f7921c04111c07081143e0fe1a017f1d1d62c245389c8ce81cefe73009fdaf7bf204686cf56ff48b22892bcae21793b246c4a58fb3119c35eebaea2e706cef707e822ff3136eca5fe642bd8296bb783326fb7f853250b4e12c774b182479776d4e1fe9bba56c028aab14d92516f0f2fd833207f55b7043380b335f9bd7bc0d53d8935028b197c66c1940229e016dd893b307a6460c79b96f1c4a62499d85fad2dc7f63c28025acccbd83b2ac80219ef4f692c52b12e835ec20da0ca764be90f1f2ab7eee651b332fde8949f81db0bc067fa551eaca349fb48f901585a6ea3b04fd8192cf1d2c4dbcc6731cdcfd4d44a1b71f2db250a703b277c796c5224198c60346c3c7ded0e4d8da03402691ba69bc3c0bd3fbb8c754f5304179d34dbda219a1501c52ee6cd4487329471a05eb415d186ddb48d6aa28cc006aa189bc25a5c77df9e3db3adb9f2ee9bb4d55b062eb735b8e0bbca678c78c39bdfc6588515a37c988bb39655a0b9a5fd9feb3317f09b8a1d05c86c9d8c051ab0d692273e8820495b1f88e3fc3e61cfcd6a7d810671f7cdf86aed7bc24b917921b5ff5323c6c509b65a762303c0090d9ef8f247d5db4fc41a2b4143cf0aac715bfea78d280e232f0ed8aec70e113698d9f2f042912fce64a0f3a0a75be2c745666ad3ed1549e1968c6383514423e730c3881dc971c347080e577a9c47eb3ee187acf5cf7b677b07346df47a5985fd0cacd011a16dc0d28deffaa0ef737f16e5ea257806c42dbeb8c0b7793c5d288bcd0dfb92424267af898c348ce3a9b85fac73cec81694bb849a17f529008dd2db8374dbdcb9e7d5cd655fe827ac880c606629bfb9414fe54d31577922cd8ad70d8c02abc1677076e679a9bcdf3d5f242187a4709f8b0d0eb0bcd0a3d51e6ce63e2ead6d84b3a17aad8d93b41bb9fdc09c4c7e7052834ffd78e0eff89c2367684af5a5fadf6a0aa6f934c1aeae9b2f51d3d081507b39df4cb030c2b5e59704f7b55ebfed4f179d57e756508e2e65cc4292e9cdd2af6b03666c579aa27fb924c2a45b488f4aeaca9e841210f1c44aecdb15abd7e822f5281ff00efe4a7f7df614b7161db174f8e86ab6e534871e23feb8480aac77465d8b7de0fc44dee1f2a2a57cfe7a89a753128595b80ede631d85597084ce655501e5f3b788a2b9255ea78584c6de419e9ceadfd7f58cf31b3470c9f958fde02e00d2733602d19b6514bad59a019a2c29d5e8eaa80eef9635ae43d92b12a39fe09d419211fc7a6feac50aa3ab541c1611fe3f23e0369985313fc0f8a645d9c509470efdf18c2cd068c873f0ae370153cb58b2073331c0abc203b0df2ce6d56b526480ad2392c07545033ce8f7d1706c8392297ad6cd368a2283240a12663452158ea0bda04276d8712ba42d1160544a53b5dcfa3364c2871e4105b53bc51148e26eb190a83b6c8714c80bf5e9b4a4c92ff8d178e30b3a408e4f88a3851214c53e9c060c99c4bee24f2d34345021fc9cbad78c59e280f0e4863dd56aebe2694d77bc9cf41b221c9130a8406c89340deb2fc7c52cfbc5df1d556d4ae5660b73d410190366e70c63816d74ba6ed5a5280e829cc1a40126fd728ad994d1bb84261232ed03a6a369", 0x1000}, {&(0x7f0000001280)="390d36e12204f11c9d300752947e6a4f1f23e42ca5bac4bdf72cc386be119b7b1a20b57ff01ddc635174537cf0d5d356d8f7ba951a3eff398aaae3784ddbbd6c2e9297d3c3db6627cd4e9fb2a4275d709c4110f890a1d937a7700ba88e696339bfd3b906b6084d4b34f792926feb407a8fd0a6cea2b355da235c5eaa85aa4fabe1bff1b3ec15abc569e91a22441adec66a041f030e4481a8a5c11fd893463d01450064dcdbf4ee", 0xa7, 0x44}, {&(0x7f0000000100)="1df4ac08bd3ef8b17c236f9eaaff79c63372b438415a21062c13e1db1c84", 0x1e, 0x2}, {&(0x7f0000001340)="e6b63bfa105f9b4c8101fb84bde7ccf983ba4b1b9381a46b2d0278811d6e6c0d19a1a14604de642d7e11cf350ecd664573995fb148298659ec4753759f6238c716bc79be565665f91903302d60c181168592ba4aeb48f7f6", 0x58, 0x7f80000000000000}, {&(0x7f00000013c0)="34edda6837c56fd4f10520907d05e70e2821e091bc2707d010cd72341555ec63a23c3965bd47d3b28db2520e37b38110d12da24a69860fa81285dc0114b4fada77045f5b055f99777be39cfe80aae7869bce1f625a65d636814d1256339a383d85de2f1d5e2d11af37d787b22d891b4ede30e3a3fc9d59a4369715f27d999531d8c2c417ec48812772684762e4b8725d730341b1a3603b3ed87c5522e9d2025c72b328aae6126d0abc2a4b28b1d0c9c1753b9fae23ef07141049fb84d3051d7f09fde2afd9a07d24751ed746f867fb22912b8b1c3a9869f33983858902398e", 0xdf, 0x2}], 0x0, &(0x7f0000001580)='+{mime_type-\x00') ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) [ 278.010606] FAULT_INJECTION: forcing a failure. [ 278.010606] name failslab, interval 1, probability 0, space 0, times 0 [ 278.022210] CPU: 1 PID: 11660 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 278.030821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.040189] Call Trace: [ 278.042800] dump_stack+0x244/0x39d [ 278.046453] ? dump_stack_print_info.cold.1+0x20/0x20 [ 278.051677] should_fail.cold.4+0xa/0x17 [ 278.055770] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 278.060895] ? mark_held_locks+0x130/0x130 [ 278.065145] ? find_held_lock+0x36/0x1c0 [ 278.069223] ? is_bpf_text_address+0xac/0x170 [ 278.073761] ? lock_downgrade+0x900/0x900 [ 278.077948] ? check_preemption_disabled+0x48/0x280 [ 278.082979] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 278.088272] ? rcu_read_unlock_special+0x370/0x370 [ 278.093208] ? rcu_softirq_qs+0x20/0x20 [ 278.097183] ? unwind_dump+0x190/0x190 [ 278.101098] ? graph_lock+0x270/0x270 [ 278.104913] __should_failslab+0x124/0x180 14:49:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x200200, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0)={@empty, 0x0}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c000076451b2b5581002c00200027bd7000fbdbdf2500000000", @ANYRES32=r2, @ANYBLOB="000007000b000a0000000f0008000b0007000000080005005700000008000b000100000008000b00ffffffff0800050006800000"], 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x4000) [ 278.109171] should_failslab+0x9/0x14 [ 278.113012] kmem_cache_alloc+0x47/0x730 [ 278.117091] ? __es_tree_search.isra.12+0x1ba/0x220 [ 278.122153] ? find_held_lock+0x36/0x1c0 [ 278.126226] __es_insert_extent+0x30c/0x1120 [ 278.130658] ? ext4_es_free_extent+0x790/0x790 [ 278.135251] ? kasan_check_write+0x14/0x20 [ 278.139493] ? do_raw_write_lock+0x14f/0x310 [ 278.143928] ? do_raw_read_unlock+0x70/0x70 [ 278.148283] ? __lock_is_held+0xb5/0x140 [ 278.153106] ext4_es_insert_extent+0x357/0xbd0 14:49:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x100) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000080)={0x6, "49a6c1ad1d5f1b67f46ffa7d3d1cccd55fb698c79f1203bc2eb5f2abe923356a", 0x1, 0x9, 0x5, 0x3000000, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) [ 278.157714] ? ext4_es_scan_clu+0x50/0x50 [ 278.161883] ? __lock_is_held+0xb5/0x140 [ 278.165965] ? rcu_read_lock_sched_held+0x14f/0x180 [ 278.171000] ext4_ext_put_gap_in_cache+0x15f/0x1f0 [ 278.175947] ? ext4_rereserve_cluster+0x240/0x240 [ 278.180856] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 278.186448] ext4_ext_map_blocks+0x1da1/0x48f0 [ 278.191086] ? kasan_check_write+0x14/0x20 [ 278.195368] ? ext4_ext_release+0x10/0x10 [ 278.199525] ? graph_lock+0x270/0x270 [ 278.203340] ? graph_lock+0x270/0x270 [ 278.207156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.212699] ? check_preemption_disabled+0x48/0x280 [ 278.217737] ? lock_acquire+0x1ed/0x520 [ 278.221740] ? ext4_map_blocks+0x487/0x1b50 [ 278.226081] ? lock_release+0xa00/0xa00 [ 278.230057] ? perf_trace_sched_process_exec+0x860/0x860 [ 278.235509] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 278.240178] ? kasan_check_read+0x11/0x20 [ 278.244332] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 278.249632] ? down_read+0x8d/0x120 [ 278.253262] ? ext4_map_blocks+0x487/0x1b50 [ 278.257583] ? __down_interruptible+0x700/0x700 [ 278.262270] ? kernel_text_address+0x79/0xf0 [ 278.266691] ext4_map_blocks+0xe2d/0x1b50 [ 278.270878] ? __save_stack_trace+0x8d/0xf0 [ 278.275235] ? ext4_issue_zeroout+0x190/0x190 [ 278.279736] ? save_stack+0x43/0xd0 [ 278.283371] ? __kasan_slab_free+0x102/0x150 [ 278.287798] ? kasan_slab_free+0xe/0x10 [ 278.291826] ? kmem_cache_free+0x83/0x290 [ 278.296025] ext4_getblk+0x10e/0x630 [ 278.299759] ? ext4_iomap_begin+0x1390/0x1390 [ 278.304275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.309863] ? __dquot_initialize+0x629/0xdd0 [ 278.314411] ext4_bread+0x95/0x2b0 [ 278.317988] ? ext4_getblk+0x630/0x630 [ 278.321887] ? dquot_get_next_dqblk+0x180/0x180 [ 278.326555] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 278.331481] ? common_perm+0x1f6/0x7b0 [ 278.335386] ext4_append+0x14e/0x370 [ 278.339118] ext4_mkdir+0x532/0xe60 [ 278.342774] ? ext4_init_dot_dotdot+0x510/0x510 [ 278.347459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.352996] ? security_inode_permission+0xd2/0x100 [ 278.358018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.363552] ? security_inode_mkdir+0xe8/0x120 [ 278.368157] vfs_mkdir+0x42e/0x6b0 [ 278.371709] do_mkdirat+0x27a/0x310 [ 278.375345] ? __ia32_sys_mknod+0xb0/0xb0 [ 278.379502] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.384886] ? trace_hardirqs_off_caller+0x310/0x310 [ 278.390008] ? ksys_ioctl+0x81/0xd0 [ 278.393641] __x64_sys_mkdir+0x5c/0x80 [ 278.397531] do_syscall_64+0x1b9/0x820 [ 278.401439] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 278.406825] ? syscall_return_slowpath+0x5e0/0x5e0 [ 278.411773] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.416657] ? trace_hardirqs_on_caller+0x310/0x310 [ 278.421693] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 278.426748] ? prepare_exit_to_usermode+0x291/0x3b0 [ 278.431776] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.436635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.441832] RIP: 0033:0x456a97 14:49:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x88000, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000040)={0xadf, 0x80, 0x5cc5}) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) statx(r1, &(0x7f0000000140)='./file0\x00', 0x4000, 0x1, &(0x7f0000000180)) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:35 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x14000, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000040)=0x401) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r2 = semget(0x1, 0x0, 0x82) semop(r2, &(0x7f0000000100)=[{0x2, 0xfffffffffffffff9, 0x1000}, {0x5, 0x0, 0x1000}, {0x0, 0x100, 0x800}, {0x4, 0x0, 0x1800}, {0x1, 0x1ff, 0x800}, {0x3, 0x8001, 0x1000}], 0x6) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000080)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 14:49:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740), 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) [ 278.445042] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.463946] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 278.471653] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 278.478952] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 278.486222] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 278.493490] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 278.500756] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:36 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="786673e4", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:36 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) dup3(r1, r2, 0x0) 14:49:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x880, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x3eec) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) 14:49:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x480, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000440)={0x2, 0x101}, 0xc) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)=""/70, 0x46}, {&(0x7f0000000300)=""/83, 0x53}, {&(0x7f0000000100)=""/33, 0x21}], 0x3, &(0x7f0000000380)=""/123, 0x7b}, 0x40) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x4, 0x40000) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x41, 0x0) ioctl$VIDIOC_S_CTRL(r3, 0xc008561c, &(0x7f0000000480)={0x1d6e, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400201) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:36 executing program 5: socketpair$unix(0x1, 0x2000000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) r2 = dup2(r1, r0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000180)=""/251) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@generic={0x2, 0x4800000000, 0x8}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:36 executing program 3: 14:49:36 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0xba, "9e657da8852016b90ea10dfc5cbb85e2f14357e709f281252eb5084905e2a04fb61fb0775402c8b2161de185fd76ed09224dc9f9b9c326a812840ce593448ac8eb1fb41b1525d87e2bc16723261277aadfa1ebc784fdd37f6327f45dbc023c57598cc4053d9061c1f1715e81a5ae671b08f9204a1bbc23340e714243922867fdf0ac250d3df30f00098762b102823f03a07c152d7ef97704b1fe97c4e2aeca62730cc909906001cdf2e1e0920b35c1aa58355c9eb47b7ac50dc4"}, &(0x7f0000000040)=0xc2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={r1, @in={{0x2, 0x4e21, @multicast1}}, 0x1ff, 0x3, 0x6, 0x102, 0x4}, &(0x7f00000002c0)=0x98) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r2, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:36 executing program 3: 14:49:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_SECUREBITS(0x1b) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) [ 279.290045] FAULT_INJECTION: forcing a failure. [ 279.290045] name failslab, interval 1, probability 0, space 0, times 0 [ 279.310405] CPU: 0 PID: 11734 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 279.318988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.328333] Call Trace: [ 279.330928] dump_stack+0x244/0x39d [ 279.334574] ? dump_stack_print_info.cold.1+0x20/0x20 [ 279.339796] ? perf_trace_sched_process_exec+0x860/0x860 [ 279.345257] ? lock_downgrade+0x900/0x900 [ 279.349436] should_fail.cold.4+0xa/0x17 [ 279.353507] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.358605] ? block_commit_write+0x30/0x30 [ 279.362931] ? print_usage_bug+0xc0/0xc0 [ 279.366992] ? __ext4_handle_dirty_metadata+0x1e0/0x5a0 [ 279.372381] ? kasan_check_write+0x14/0x20 [ 279.376638] ? graph_lock+0x270/0x270 [ 279.380459] ? __lock_is_held+0xb5/0x140 [ 279.384531] ? perf_trace_sched_process_exec+0x860/0x860 [ 279.389999] ? __lock_acquire+0x62f/0x4c20 [ 279.394235] __should_failslab+0x124/0x180 [ 279.398484] should_failslab+0x9/0x14 [ 279.402288] __kmalloc+0x2e4/0x760 [ 279.405827] ? ext4_find_extent+0x757/0x9b0 [ 279.410173] ext4_find_extent+0x757/0x9b0 [ 279.414331] ext4_ext_map_blocks+0x291/0x48f0 [ 279.418834] ? kasan_check_write+0x14/0x20 [ 279.423113] ? ext4_ext_release+0x10/0x10 [ 279.427267] ? graph_lock+0x270/0x270 [ 279.431073] ? graph_lock+0x270/0x270 [ 279.434881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.440423] ? check_preemption_disabled+0x48/0x280 [ 279.445453] ? lock_acquire+0x1ed/0x520 [ 279.449429] ? ext4_map_blocks+0x487/0x1b50 [ 279.453756] ? lock_release+0xa00/0xa00 [ 279.457729] ? perf_trace_sched_process_exec+0x860/0x860 [ 279.463178] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 279.467853] ? kasan_check_read+0x11/0x20 [ 279.472001] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 279.477299] ? down_read+0x8d/0x120 [ 279.480934] ? ext4_map_blocks+0x487/0x1b50 [ 279.485254] ? __down_interruptible+0x700/0x700 [ 279.489923] ? kernel_text_address+0x79/0xf0 [ 279.494346] ext4_map_blocks+0xe2d/0x1b50 [ 279.498522] ? __save_stack_trace+0x8d/0xf0 [ 279.502851] ? ext4_issue_zeroout+0x190/0x190 [ 279.507348] ? save_stack+0x43/0xd0 [ 279.510980] ? __kasan_slab_free+0x102/0x150 [ 279.515397] ? kasan_slab_free+0xe/0x10 [ 279.519390] ? kmem_cache_free+0x83/0x290 [ 279.523538] ext4_getblk+0x10e/0x630 [ 279.527257] ? ext4_iomap_begin+0x1390/0x1390 [ 279.531788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.537326] ? __dquot_initialize+0x629/0xdd0 [ 279.541848] ext4_bread+0x95/0x2b0 [ 279.545394] ? ext4_getblk+0x630/0x630 [ 279.549276] ? dquot_get_next_dqblk+0x180/0x180 [ 279.553979] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 279.558900] ? common_perm+0x1f6/0x7b0 [ 279.562787] ext4_append+0x14e/0x370 [ 279.566508] ext4_mkdir+0x532/0xe60 [ 279.570139] ? ext4_init_dot_dotdot+0x510/0x510 [ 279.574810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.580343] ? security_inode_permission+0xd2/0x100 [ 279.585379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.590945] ? security_inode_mkdir+0xe8/0x120 [ 279.595547] vfs_mkdir+0x42e/0x6b0 [ 279.599093] do_mkdirat+0x27a/0x310 [ 279.602727] ? __ia32_sys_mknod+0xb0/0xb0 [ 279.606883] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.612253] ? trace_hardirqs_off_caller+0x310/0x310 [ 279.617384] ? ksys_ioctl+0x81/0xd0 [ 279.621024] __x64_sys_mkdir+0x5c/0x80 [ 279.624920] do_syscall_64+0x1b9/0x820 [ 279.628816] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 279.634189] ? syscall_return_slowpath+0x5e0/0x5e0 [ 279.639130] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.643985] ? trace_hardirqs_on_caller+0x310/0x310 [ 279.649007] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 279.654029] ? prepare_exit_to_usermode+0x291/0x3b0 [ 279.659074] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.663932] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.669119] RIP: 0033:0x456a97 [ 279.672313] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.691236] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 279.698950] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 279.706220] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 279.713491] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 279.720763] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 279.728052] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:37 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r1, 0xc00c55ca) 14:49:37 executing program 3: 14:49:37 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffffffff0001, 0x100) r3 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) write$P9_ROPEN(r3, &(0x7f00000002c0)={0x18, 0x71, 0x1, {{0x52, 0x4, 0x4}, 0x8}}, 0x18) getsockopt$inet6_mreq(r3, 0x29, 0x1d, &(0x7f00000001c0)={@remote, 0x0}, &(0x7f0000000200)=0x14) fallocate(r0, 0x40000000000a, 0x285, 0x40) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000280)=0x8, 0x4) bind$can_raw(r3, &(0x7f0000000240)={0x1d, r4}, 0x10) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000100)={0x0, r3}) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000140)={{0x2f, @loopback, 0x4e21, 0x3, 'wrr\x00', 0x20, 0x1, 0x37}, {@multicast1, 0x4e23, 0x10000, 0x1, 0xcb0f, 0x80000001}}, 0x44) 14:49:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x1, 0x28110, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:37 executing program 3: 14:49:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x1) 14:49:37 executing program 3: [ 279.968268] FAULT_INJECTION: forcing a failure. [ 279.968268] name failslab, interval 1, probability 0, space 0, times 0 [ 279.979603] CPU: 0 PID: 11758 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 279.988187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.998038] Call Trace: [ 280.000656] dump_stack+0x244/0x39d [ 280.004289] ? dump_stack_print_info.cold.1+0x20/0x20 [ 280.009504] should_fail.cold.4+0xa/0x17 [ 280.013584] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.018726] ? mark_held_locks+0x130/0x130 [ 280.018754] ? find_held_lock+0x36/0x1c0 [ 280.027051] ? is_bpf_text_address+0xac/0x170 [ 280.031556] ? lock_downgrade+0x900/0x900 [ 280.031574] ? check_preemption_disabled+0x48/0x280 [ 280.031596] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 280.040739] ? rcu_read_unlock_special+0x370/0x370 [ 280.040755] ? rcu_softirq_qs+0x20/0x20 [ 280.040769] ? unwind_dump+0x190/0x190 [ 280.040792] ? graph_lock+0x270/0x270 [ 280.054961] __should_failslab+0x124/0x180 [ 280.054979] should_failslab+0x9/0x14 [ 280.055000] kmem_cache_alloc+0x47/0x730 [ 280.062674] ? __es_tree_search.isra.12+0x1ba/0x220 [ 280.062688] ? find_held_lock+0x36/0x1c0 [ 280.062709] __es_insert_extent+0x30c/0x1120 [ 280.088217] ? ext4_es_free_extent+0x790/0x790 [ 280.092811] ? kasan_check_write+0x14/0x20 [ 280.097062] ? do_raw_write_lock+0x14f/0x310 [ 280.101475] ? do_raw_read_unlock+0x70/0x70 [ 280.105799] ? __lock_is_held+0xb5/0x140 [ 280.109888] ext4_es_insert_extent+0x357/0xbd0 [ 280.114488] ? ext4_es_scan_clu+0x50/0x50 [ 280.118653] ? __lock_is_held+0xb5/0x140 [ 280.122740] ? rcu_read_lock_sched_held+0x14f/0x180 [ 280.127762] ext4_ext_put_gap_in_cache+0x15f/0x1f0 [ 280.132689] ? ext4_rereserve_cluster+0x240/0x240 [ 280.137544] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 280.143101] ext4_ext_map_blocks+0x1da1/0x48f0 [ 280.147697] ? kasan_check_write+0x14/0x20 [ 280.152169] ? ext4_ext_release+0x10/0x10 [ 280.156325] ? graph_lock+0x270/0x270 [ 280.160150] ? graph_lock+0x270/0x270 [ 280.163954] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.169491] ? check_preemption_disabled+0x48/0x280 [ 280.174524] ? lock_acquire+0x1ed/0x520 [ 280.178516] ? ext4_map_blocks+0x487/0x1b50 [ 280.182869] ? lock_release+0xa00/0xa00 [ 280.186861] ? perf_trace_sched_process_exec+0x860/0x860 [ 280.192315] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 280.196985] ? kasan_check_read+0x11/0x20 [ 280.201127] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 280.206416] ? down_read+0x8d/0x120 [ 280.210041] ? ext4_map_blocks+0x487/0x1b50 [ 280.214412] ? __down_interruptible+0x700/0x700 [ 280.219082] ? kernel_text_address+0x79/0xf0 [ 280.223529] ext4_map_blocks+0xe2d/0x1b50 [ 280.227682] ? __save_stack_trace+0x8d/0xf0 [ 280.232051] ? ext4_issue_zeroout+0x190/0x190 [ 280.236560] ? save_stack+0x43/0xd0 [ 280.240189] ? __kasan_slab_free+0x102/0x150 [ 280.244596] ? kasan_slab_free+0xe/0x10 [ 280.248589] ? kmem_cache_free+0x83/0x290 [ 280.252746] ext4_getblk+0x10e/0x630 [ 280.256485] ? ext4_iomap_begin+0x1390/0x1390 [ 280.260989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.266534] ? __dquot_initialize+0x629/0xdd0 [ 280.271034] ext4_bread+0x95/0x2b0 [ 280.274580] ? ext4_getblk+0x630/0x630 [ 280.278471] ? dquot_get_next_dqblk+0x180/0x180 [ 280.283155] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 280.288087] ? common_perm+0x1f6/0x7b0 [ 280.291988] ext4_append+0x14e/0x370 [ 280.295709] ext4_mkdir+0x532/0xe60 [ 280.299345] ? ext4_init_dot_dotdot+0x510/0x510 [ 280.304031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.309569] ? security_inode_permission+0xd2/0x100 [ 280.314587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.320178] ? security_inode_mkdir+0xe8/0x120 [ 280.324765] vfs_mkdir+0x42e/0x6b0 [ 280.328367] do_mkdirat+0x27a/0x310 [ 280.332024] ? __ia32_sys_mknod+0xb0/0xb0 [ 280.336188] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.341569] ? trace_hardirqs_off_caller+0x310/0x310 [ 280.346672] ? ksys_ioctl+0x81/0xd0 [ 280.350304] __x64_sys_mkdir+0x5c/0x80 [ 280.354194] do_syscall_64+0x1b9/0x820 [ 280.358082] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 280.363444] ? syscall_return_slowpath+0x5e0/0x5e0 [ 280.368379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.373237] ? trace_hardirqs_on_caller+0x310/0x310 [ 280.378258] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 280.383274] ? prepare_exit_to_usermode+0x291/0x3b0 [ 280.388302] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.393153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.398340] RIP: 0033:0x456a97 [ 280.401557] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:49:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x781, 0x20200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0xb25, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}}}, 0x88) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000000)={0x0, 0x7530}, 0x10) r2 = msgget(0x0, 0x50e) msgctl$MSG_STAT(r2, 0xb, &(0x7f00000000c0)=""/49) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000080)) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r3, 0xc00c55ca) 14:49:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_DUMPABLE(0x3) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000280)) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x4, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, r2, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000680)={0x194, r3, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x45}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000001}]}, @TIPC_NLA_BEARER={0x128, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'irlan0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x100, @remote, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x28000000000000}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'rose0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0xbd4e, @mcast1, 0x3}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xfc, @local, 0x3}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xd0, @remote, 0x6f}}}}]}]}, 0x194}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000) getsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 280.420492] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 280.428222] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 280.435501] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 280.442770] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 280.450033] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 280.457298] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 280.479054] XFS (loop2): Invalid superblock magic number 14:49:37 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:37 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) 14:49:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = dup(r0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000040)=0x200, 0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) 14:49:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000a40)=@updsa={0x154, 0x1a, 0x401, 0x0, 0x0, {{@in=@dev, @in6=@ipv4={[], [], @remote}}, {@in, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in=@remote}}]}, 0x154}}, 0x0) 14:49:38 executing program 3: syz_read_part_table(0xb8450000, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="0200eeffffff01000000ff07000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 14:49:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'rfc3686(ctr(des3_ede))\x00'}, 0xcb6108e3) 14:49:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000001c0)) [ 280.685055] FAULT_INJECTION: forcing a failure. [ 280.685055] name failslab, interval 1, probability 0, space 0, times 0 [ 280.734861] CPU: 1 PID: 11788 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 280.743451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.752814] Call Trace: [ 280.755411] dump_stack+0x244/0x39d [ 280.759042] ? dump_stack_print_info.cold.1+0x20/0x20 [ 280.764243] should_fail.cold.4+0xa/0x17 [ 280.768329] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.773444] ? kernel_text_address+0x79/0xf0 [ 280.777882] ? __kernel_text_address+0xd/0x40 [ 280.782417] ? __save_stack_trace+0x8d/0xf0 [ 280.786780] ? graph_lock+0x270/0x270 [ 280.790609] ? save_stack+0xa9/0xd0 [ 280.794277] ? __lock_is_held+0xb5/0x140 [ 280.798367] ? print_usage_bug+0xc0/0xc0 [ 280.802442] ? trace_hardirqs_off+0xb8/0x310 [ 280.806856] ? trace_hardirqs_on+0x310/0x310 [ 280.811268] ? perf_trace_sched_process_exec+0x860/0x860 [ 280.816726] ? __lock_acquire+0x62f/0x4c20 [ 280.820990] __should_failslab+0x124/0x180 [ 280.825233] should_failslab+0x9/0x14 [ 280.829067] __kmalloc+0x2e4/0x760 [ 280.832617] ? ext4_find_extent+0x757/0x9b0 [ 280.836987] ext4_find_extent+0x757/0x9b0 [ 280.841155] ext4_ext_map_blocks+0x291/0x48f0 [ 280.845654] ? kasan_check_write+0x14/0x20 [ 280.849948] ? ext4_ext_release+0x10/0x10 [ 280.854098] ? graph_lock+0x270/0x270 [ 280.857904] ? graph_lock+0x270/0x270 [ 280.861703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.867252] ? check_preemption_disabled+0x48/0x280 [ 280.872333] ? lock_acquire+0x1ed/0x520 [ 280.876328] ? ext4_map_blocks+0x88f/0x1b50 [ 280.880684] ? lock_release+0xa00/0xa00 [ 280.884663] ? perf_trace_sched_process_exec+0x860/0x860 [ 280.890118] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 280.894803] ? kasan_check_read+0x11/0x20 [ 280.898956] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 280.904253] ? down_write+0x8a/0x130 [ 280.907963] ? ext4_map_blocks+0x88f/0x1b50 [ 280.912284] ? down_read+0x120/0x120 [ 280.916004] ? kernel_text_address+0x79/0xf0 [ 280.920422] ext4_map_blocks+0x8f7/0x1b50 [ 280.924575] ? __save_stack_trace+0x8d/0xf0 [ 280.928926] ? ext4_issue_zeroout+0x190/0x190 [ 280.933440] ? save_stack+0x43/0xd0 [ 280.937081] ? __kasan_slab_free+0x102/0x150 [ 280.941490] ? kasan_slab_free+0xe/0x10 [ 280.945465] ? kmem_cache_free+0x83/0x290 [ 280.949619] ext4_getblk+0x10e/0x630 [ 280.953342] ? ext4_iomap_begin+0x1390/0x1390 [ 280.957856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.963400] ? __dquot_initialize+0x629/0xdd0 [ 280.967948] ext4_bread+0x95/0x2b0 [ 280.971492] ? ext4_getblk+0x630/0x630 [ 280.975384] ? dquot_get_next_dqblk+0x180/0x180 [ 280.980053] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 280.985024] ? common_perm+0x1f6/0x7b0 [ 280.988918] ext4_append+0x14e/0x370 [ 280.992641] ext4_mkdir+0x532/0xe60 [ 280.996266] ? ext4_init_dot_dotdot+0x510/0x510 [ 281.000947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.006483] ? security_inode_permission+0xd2/0x100 [ 281.011516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.017074] ? security_inode_mkdir+0xe8/0x120 [ 281.021681] vfs_mkdir+0x42e/0x6b0 [ 281.025231] do_mkdirat+0x27a/0x310 [ 281.028870] ? __ia32_sys_mknod+0xb0/0xb0 [ 281.033020] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.038396] ? trace_hardirqs_off_caller+0x310/0x310 [ 281.043529] ? ksys_ioctl+0x81/0xd0 [ 281.047171] __x64_sys_mkdir+0x5c/0x80 [ 281.051064] do_syscall_64+0x1b9/0x820 [ 281.054953] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 281.060323] ? syscall_return_slowpath+0x5e0/0x5e0 [ 281.065257] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.070101] ? trace_hardirqs_on_caller+0x310/0x310 [ 281.075137] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 281.080158] ? prepare_exit_to_usermode+0x291/0x3b0 [ 281.085180] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.090027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.095213] RIP: 0033:0x456a97 [ 281.098402] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.117298] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 281.125004] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 14:49:38 executing program 3: 14:49:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4001, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0xe4, r2, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xdc}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x40, @loopback, 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xfffffffffffffc00, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}, 0x9}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9b9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x20000800}, 0x4004) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) [ 281.132771] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 281.140038] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 281.147316] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 281.154628] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:38 executing program 3: 14:49:38 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:38 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'sha256\x00'}, 0x22) ioctl$sock_netdev_private(r1, 0x89ff, &(0x7f0000000380)="19e775a8254ad1f5cb837595534d4b6b03f98d28ab01a4c6183c684977f6b4988f63103e86a6dd9bc72a1807d01a2494ba759e4a790b") ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000000)) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x840, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000002c0)="eebee413dd3ed74d3b0dec4a9e99bceeb4d156024394aa469488c2ca2cb4afe15f670fc56d4fc8b348c5be459fcbc7aac2474a963dad83e45570ade5744671ce15b0f8cacad7136f593af41c7bc234ab61d43b338b9369eea9209c352fc4bd12f647239ca66761b3a491368a09e50e508338d05dc98f514cb357851c3d65919a8bdb2c1821559d9d741ba81ae2cc52c789eefdc0280f095667c1dc9dc5c4b45b8fbda6e2ba91428d39182997a738e0129f", 0xb1) sendmsg$can_raw(r2, &(0x7f0000000500)={&(0x7f00000003c0), 0x10, &(0x7f00000004c0)={&(0x7f0000000480)=@can={{0x3, 0x5e, 0x7, 0x3}, 0x2, 0x3, 0x0, 0x0, "ad3b2965c7131c3b"}, 0x10}}, 0x4000001) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000540)={0x4, 0x2, 0x1000}, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000740)=ANY=[@ANYRES32=0x0, @ANYBLOB="500000009fc5701c3e2071219c21d96f1d47840f30477fd3bf0713998031ed417afa4b0658ad744a75fe2d960b96dc54f97515068b6148ec9c6571ea7158497640dadd125e319bb1e6f9420000000000000000007e000fc506902d6acd69a08987d3f0e81e720c620bf59f635224949d755886fed1ecce74bc8a2c36e2b7429de486f00b7a077f92"], &(0x7f0000000600)=0x58) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vcs\x00', 0x101002, 0x0) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x7) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000640)={r3, 0xfffffffffffffff8}, &(0x7f0000000680)=0x8) readlinkat(r2, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/243, 0xf3) 14:49:38 executing program 3: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @remote}, 0x0, 0x0, 0x0, 0x1}}, 0xffffffffffffff19) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 14:49:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000040)={0x0, 0x0, 0x0}) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2) [ 281.328676] XFS (loop2): Invalid superblock magic number 14:49:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000001c0)) [ 281.459232] FAULT_INJECTION: forcing a failure. [ 281.459232] name failslab, interval 1, probability 0, space 0, times 0 [ 281.479708] CPU: 1 PID: 11831 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 281.488300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.497665] Call Trace: [ 281.500261] dump_stack+0x244/0x39d [ 281.503897] ? dump_stack_print_info.cold.1+0x20/0x20 [ 281.509110] should_fail.cold.4+0xa/0x17 [ 281.513185] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.518307] ? kernel_text_address+0x79/0xf0 [ 281.522722] ? __kernel_text_address+0xd/0x40 [ 281.527231] ? __save_stack_trace+0x8d/0xf0 [ 281.531557] ? graph_lock+0x270/0x270 [ 281.535381] ? save_stack+0xa9/0xd0 [ 281.539022] ? __lock_is_held+0xb5/0x140 [ 281.543096] ? print_usage_bug+0xc0/0xc0 [ 281.547182] ? trace_hardirqs_off+0xb8/0x310 [ 281.551608] ? trace_hardirqs_on+0x310/0x310 [ 281.556019] ? perf_trace_sched_process_exec+0x860/0x860 [ 281.561477] ? __lock_acquire+0x62f/0x4c20 [ 281.565726] __should_failslab+0x124/0x180 [ 281.569974] should_failslab+0x9/0x14 [ 281.573780] __kmalloc+0x2e4/0x760 [ 281.577333] ? ext4_find_extent+0x757/0x9b0 [ 281.581676] ext4_find_extent+0x757/0x9b0 [ 281.585842] ext4_ext_map_blocks+0x291/0x48f0 [ 281.590343] ? kasan_check_write+0x14/0x20 [ 281.594606] ? ext4_ext_release+0x10/0x10 [ 281.598765] ? graph_lock+0x270/0x270 [ 281.602571] ? graph_lock+0x270/0x270 [ 281.606385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.611944] ? check_preemption_disabled+0x48/0x280 [ 281.617011] ? lock_acquire+0x1ed/0x520 [ 281.620993] ? ext4_map_blocks+0x88f/0x1b50 [ 281.625335] ? lock_release+0xa00/0xa00 [ 281.629333] ? perf_trace_sched_process_exec+0x860/0x860 [ 281.634842] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 281.639540] ? kasan_check_read+0x11/0x20 [ 281.643697] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 281.648991] ? down_write+0x8a/0x130 [ 281.652712] ? ext4_map_blocks+0x88f/0x1b50 [ 281.657071] ? down_read+0x120/0x120 [ 281.660826] ? kernel_text_address+0x79/0xf0 [ 281.665275] ext4_map_blocks+0x8f7/0x1b50 [ 281.669431] ? __save_stack_trace+0x8d/0xf0 [ 281.673771] ? ext4_issue_zeroout+0x190/0x190 [ 281.678279] ? save_stack+0x43/0xd0 [ 281.681921] ? __kasan_slab_free+0x102/0x150 [ 281.686346] ? kasan_slab_free+0xe/0x10 [ 281.690332] ? kmem_cache_free+0x83/0x290 [ 281.694511] ext4_getblk+0x10e/0x630 [ 281.698236] ? ext4_iomap_begin+0x1390/0x1390 [ 281.702738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.708308] ? __dquot_initialize+0x629/0xdd0 [ 281.712811] ext4_bread+0x95/0x2b0 [ 281.716389] ? ext4_getblk+0x630/0x630 [ 281.720297] ? dquot_get_next_dqblk+0x180/0x180 [ 281.725002] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 281.729961] ? common_perm+0x1f6/0x7b0 [ 281.733863] ext4_append+0x14e/0x370 [ 281.737615] ext4_mkdir+0x532/0xe60 [ 281.741261] ? ext4_init_dot_dotdot+0x510/0x510 [ 281.745946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.751494] ? security_inode_permission+0xd2/0x100 [ 281.756522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.762098] ? security_inode_mkdir+0xe8/0x120 [ 281.766699] vfs_mkdir+0x42e/0x6b0 [ 281.770254] do_mkdirat+0x27a/0x310 [ 281.773896] ? __ia32_sys_mknod+0xb0/0xb0 [ 281.778056] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.783445] ? trace_hardirqs_off_caller+0x310/0x310 [ 281.788563] ? ksys_ioctl+0x81/0xd0 [ 281.792204] __x64_sys_mkdir+0x5c/0x80 [ 281.796106] do_syscall_64+0x1b9/0x820 [ 281.800011] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 281.805407] ? syscall_return_slowpath+0x5e0/0x5e0 [ 281.810372] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.815229] ? trace_hardirqs_on_caller+0x310/0x310 [ 281.820257] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 281.825288] ? prepare_exit_to_usermode+0x291/0x3b0 [ 281.830325] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.835193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.840394] RIP: 0033:0x456a97 [ 281.843596] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.863109] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 281.870842] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 281.878121] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 281.885397] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 281.892667] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 281.899933] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c1a6285718070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="4e633c8cab2a23eca7ee6a4d253d", 0x0}, 0x28) 14:49:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8000, 0x0) ioctl$VIDIOC_S_TUNER(r2, 0x4054561e, &(0x7f0000000080)={0xfffffffffffffffc, "b5297c4049ec76ead5c020b1f711d6bf117623d6747af2522f7fcb963245f9e6", 0x7, 0x4, 0x2, 0x100, 0x4, 0x6, 0x4c9e, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) dup3(r2, r0, 0x80000) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bond0\x00') ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="637defe6eed1bc66a2734a08d5a52ed7b9ee08d245b9b1e79590c4303e7ac85458103939ed6d9f63708033a729551963bae873eb3d80fb3bc606fe2d9fde671eaeb56303688a2e61deeb38cc5f6823065af408f386b82db9344e846896e2e60b45d25f75b1e86967f1c062426d6a178884097ff53581fa7c7d20cf776968ece49303c6248e038fd47f25e92e959702f87a764b8f3fdfeda314e62f88ba0a37c1a277", 0xa2) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:49:39 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:39 executing program 5: mkdir(&(0x7f0000000680)='./control\x00', 0x0) r0 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000180)='./control\x00', 0x0, 0x0) linkat(r0, &(0x7f00000001c0)='./control\x00', r0, &(0x7f0000000200)='./file0\x00', 0x1400) 14:49:39 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:39 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="0a074332232078f933cb5323f5b005e381", 0x11) 14:49:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x10, 0x800, 0x82, &(0x7f0000000000)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000180)={0x81, 0x0, 0x7, 0x19, &(0x7f0000000080)=""/25, 0x3a, &(0x7f00000000c0)=""/58, 0x0, &(0x7f0000000100)}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) [ 282.069235] FAULT_INJECTION: forcing a failure. [ 282.069235] name failslab, interval 1, probability 0, space 0, times 0 [ 282.080633] CPU: 0 PID: 11862 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 282.089213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.098573] Call Trace: [ 282.098597] dump_stack+0x244/0x39d [ 282.098629] ? dump_stack_print_info.cold.1+0x20/0x20 [ 282.098704] should_fail.cold.4+0xa/0x17 [ 282.098729] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.114144] ? mark_held_locks+0x130/0x130 [ 282.114165] ? find_held_lock+0x36/0x1c0 [ 282.114190] ? is_bpf_text_address+0xac/0x170 [ 282.114206] ? lock_downgrade+0x900/0x900 [ 282.114221] ? check_preemption_disabled+0x48/0x280 [ 282.114240] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 282.114256] ? rcu_read_unlock_special+0x370/0x370 [ 282.123572] ? rcu_softirq_qs+0x20/0x20 [ 282.123584] ? unwind_dump+0x190/0x190 [ 282.123603] ? graph_lock+0x270/0x270 [ 282.123644] __should_failslab+0x124/0x180 [ 282.123675] should_failslab+0x9/0x14 [ 282.123690] kmem_cache_alloc+0x47/0x730 [ 282.123710] ? __es_tree_search.isra.12+0x1ba/0x220 [ 282.123726] ? find_held_lock+0x36/0x1c0 [ 282.132282] __es_insert_extent+0x30c/0x1120 [ 282.132307] ? ext4_es_free_extent+0x790/0x790 [ 282.132326] ? kasan_check_write+0x14/0x20 [ 282.132341] ? do_raw_write_lock+0x14f/0x310 [ 282.132365] ? do_raw_read_unlock+0x70/0x70 [ 282.132383] ? __lock_is_held+0xb5/0x140 [ 282.146798] ext4_es_insert_extent+0x357/0xbd0 [ 282.146823] ? ext4_es_scan_clu+0x50/0x50 [ 282.146844] ? __lock_is_held+0xb5/0x140 [ 282.146872] ? rcu_read_lock_sched_held+0x14f/0x180 [ 282.146894] ext4_ext_put_gap_in_cache+0x15f/0x1f0 [ 282.146915] ? ext4_rereserve_cluster+0x240/0x240 [ 282.210512] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 282.210537] ext4_ext_map_blocks+0x1da1/0x48f0 [ 282.210553] ? kasan_check_write+0x14/0x20 [ 282.210577] ? ext4_ext_release+0x10/0x10 [ 282.210597] ? graph_lock+0x270/0x270 [ 282.219298] ? graph_lock+0x270/0x270 [ 282.219313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.219328] ? check_preemption_disabled+0x48/0x280 [ 282.219368] ? lock_acquire+0x1ed/0x520 [ 282.219381] ? ext4_map_blocks+0x487/0x1b50 [ 282.219399] ? lock_release+0xa00/0xa00 [ 282.286995] ? perf_trace_sched_process_exec+0x860/0x860 [ 282.292451] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 282.297142] ? kasan_check_read+0x11/0x20 [ 282.301287] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 282.306590] ? down_read+0x8d/0x120 [ 282.310216] ? ext4_map_blocks+0x487/0x1b50 [ 282.314538] ? __down_interruptible+0x700/0x700 [ 282.319240] ? kernel_text_address+0x79/0xf0 [ 282.323668] ext4_map_blocks+0xe2d/0x1b50 [ 282.327814] ? __save_stack_trace+0x8d/0xf0 [ 282.332168] ? ext4_issue_zeroout+0x190/0x190 [ 282.336682] ? save_stack+0x43/0xd0 [ 282.340325] ? __kasan_slab_free+0x102/0x150 [ 282.344770] ? kasan_slab_free+0xe/0x10 [ 282.348743] ? kmem_cache_free+0x83/0x290 [ 282.352917] ext4_getblk+0x10e/0x630 [ 282.356674] ? ext4_iomap_begin+0x1390/0x1390 [ 282.361206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.366762] ? __dquot_initialize+0x629/0xdd0 [ 282.371275] ext4_bread+0x95/0x2b0 [ 282.374852] ? ext4_getblk+0x630/0x630 [ 282.378754] ? dquot_get_next_dqblk+0x180/0x180 [ 282.383423] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 282.388364] ? common_perm+0x1f6/0x7b0 [ 282.392261] ext4_append+0x14e/0x370 [ 282.395982] ext4_mkdir+0x532/0xe60 [ 282.399625] ? ext4_init_dot_dotdot+0x510/0x510 [ 282.404298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.409843] ? security_inode_permission+0xd2/0x100 [ 282.414922] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.420491] ? security_inode_mkdir+0xe8/0x120 [ 282.425107] vfs_mkdir+0x42e/0x6b0 [ 282.428656] do_mkdirat+0x27a/0x310 [ 282.432299] ? __ia32_sys_mknod+0xb0/0xb0 [ 282.436452] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.441817] ? trace_hardirqs_off_caller+0x310/0x310 [ 282.446950] ? ksys_ioctl+0x81/0xd0 [ 282.450620] __x64_sys_mkdir+0x5c/0x80 [ 282.454516] do_syscall_64+0x1b9/0x820 [ 282.458408] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.463789] ? syscall_return_slowpath+0x5e0/0x5e0 [ 282.468720] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.473566] ? trace_hardirqs_on_caller+0x310/0x310 [ 282.478589] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 282.483619] ? prepare_exit_to_usermode+0x291/0x3b0 [ 282.488648] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.493499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.498708] RIP: 0033:0x456a97 [ 282.501917] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:49:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{}, {0x20, 'loGPL]vboxnet0+,ppp0'}, {0x20, '/dev/ion\x00'}, {0x20, '/dev/ion\x00'}, {0x20, '/dev/ion\x00'}], 0xa, "27ff2dd747488d08ff271b131ff14386273f4d5976548f7bde8e52bc"}, 0x5b) 14:49:39 executing program 5: msgget$private(0x0, 0x0) 14:49:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000700)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000740)=0x1c, 0x800) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000780), 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000007c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0xfffffffffffffdb4) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x100, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f00000008c0)={&(0x7f0000ff8000/0x7000)=nil, 0x7000}, &(0x7f0000000900)=0x10) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000840)='./file0\x00', 0x80000, 0x60) renameat2(r2, &(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000880)='./file0\x00', 0x1) recvmmsg(r1, &(0x7f0000000640)=[{{&(0x7f0000000000)=@hci, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)=""/20, 0x14}, {&(0x7f0000000140)=""/146, 0x92}, {&(0x7f0000000200)=""/169, 0xa9}, {&(0x7f00000002c0)=""/126, 0x7e}], 0x4, &(0x7f0000000400)=""/39, 0x27}, 0x5}, {{&(0x7f0000000440)=@un=@abs, 0x80, &(0x7f0000000600)=[{&(0x7f00000004c0)=""/30, 0x1e}, {&(0x7f0000000500)=""/2, 0x2}, {&(0x7f0000000540)=""/180, 0xb4}], 0x3}, 0x3ff}], 0x2, 0x40000041, &(0x7f00000006c0)) [ 282.520844] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 282.528597] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 282.535869] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 282.543137] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 282.550420] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 282.557701] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:40 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x40) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:49:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x800000, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpgrp(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000003c0)=[{{&(0x7f0000000140)=@xdp, 0x3e6, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/204, 0x473}}], 0x1500, 0x0, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x40, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) msgget(0xffffffffffffffff, 0x0) 14:49:40 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 282.676955] XFS (loop2): Invalid superblock magic number [ 282.739275] FAULT_INJECTION: forcing a failure. [ 282.739275] name failslab, interval 1, probability 0, space 0, times 0 [ 282.750593] CPU: 0 PID: 11904 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 282.759182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.768532] Call Trace: [ 282.768555] dump_stack+0x244/0x39d [ 282.768579] ? dump_stack_print_info.cold.1+0x20/0x20 [ 282.768609] should_fail.cold.4+0xa/0x17 [ 282.768632] ? kasan_slab_free+0xe/0x10 [ 282.788065] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.788079] ? ext4_mkdir+0x532/0xe60 [ 282.788102] ? mark_held_locks+0x130/0x130 [ 282.788116] ? trace_hardirqs_on+0x310/0x310 [ 282.788134] ? ext4_es_delayed_clu+0x37e/0x420 [ 282.788152] ? graph_lock+0x270/0x270 [ 282.814092] ? mark_held_locks+0xc7/0x130 [ 282.818250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.823799] ? check_preemption_disabled+0x48/0x280 [ 282.828852] ? __lock_is_held+0xb5/0x140 [ 282.832932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.838481] ? ext4_ext_map_blocks+0xeeb/0x48f0 [ 282.843157] __should_failslab+0x124/0x180 [ 282.847411] should_failslab+0x9/0x14 [ 282.851221] kmem_cache_alloc+0x47/0x730 [ 282.855294] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 282.860317] ? ext4_es_can_be_merged+0x23d/0x2a0 [ 282.865087] ? __es_tree_search.isra.12+0x1ba/0x220 [ 282.870118] __es_insert_extent+0x30c/0x1120 [ 282.874540] ? ext4_es_free_extent+0x790/0x790 [ 282.879134] ? do_raw_write_lock+0x14f/0x310 [ 282.883566] ? do_raw_read_unlock+0x70/0x70 [ 282.887893] ? __lock_is_held+0xb5/0x140 [ 282.891984] ext4_es_insert_extent+0x357/0xbd0 [ 282.896580] ? ext4_es_scan_clu+0x50/0x50 [ 282.900741] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 282.906064] ? down_write+0x8a/0x130 [ 282.909789] ? ext4_map_blocks+0x88f/0x1b50 [ 282.914116] ? down_read+0x120/0x120 [ 282.917844] ? kernel_text_address+0x79/0xf0 [ 282.922260] ext4_map_blocks+0xb0c/0x1b50 [ 282.926423] ? __save_stack_trace+0x8d/0xf0 [ 282.930758] ? ext4_issue_zeroout+0x190/0x190 [ 282.935264] ? save_stack+0x43/0xd0 [ 282.938893] ? __kasan_slab_free+0x102/0x150 [ 282.943299] ? kasan_slab_free+0xe/0x10 [ 282.947275] ? kmem_cache_free+0x83/0x290 [ 282.951428] ext4_getblk+0x10e/0x630 [ 282.955162] ? ext4_iomap_begin+0x1390/0x1390 [ 282.959670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.965209] ? __dquot_initialize+0x629/0xdd0 [ 282.969717] ext4_bread+0x95/0x2b0 [ 282.973263] ? ext4_getblk+0x630/0x630 [ 282.977151] ? dquot_get_next_dqblk+0x180/0x180 [ 282.981826] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 282.986757] ? common_perm+0x1f6/0x7b0 [ 282.990668] ext4_append+0x14e/0x370 [ 282.994432] ext4_mkdir+0x532/0xe60 [ 282.998247] ? ext4_init_dot_dotdot+0x510/0x510 [ 283.002934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.008490] ? security_inode_permission+0xd2/0x100 [ 283.013512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.019073] ? security_inode_mkdir+0xe8/0x120 [ 283.023661] vfs_mkdir+0x42e/0x6b0 [ 283.027223] do_mkdirat+0x27a/0x310 [ 283.030864] ? __ia32_sys_mknod+0xb0/0xb0 [ 283.035012] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.040396] ? trace_hardirqs_off_caller+0x310/0x310 [ 283.045502] ? ksys_ioctl+0x81/0xd0 [ 283.049158] __x64_sys_mkdir+0x5c/0x80 [ 283.053057] do_syscall_64+0x1b9/0x820 [ 283.056963] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 283.062360] ? syscall_return_slowpath+0x5e0/0x5e0 [ 283.067292] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.072140] ? trace_hardirqs_on_caller+0x310/0x310 [ 283.077208] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 283.082238] ? prepare_exit_to_usermode+0x291/0x3b0 [ 283.087265] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.092121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.097313] RIP: 0033:0x456a97 [ 283.100513] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.119432] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 283.127151] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 283.134607] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 283.141897] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 283.149165] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 283.156447] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:40 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="7866730e", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200100, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xc0, r3, 0x504, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8a9}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0x70, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x185}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4000000000000000}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7338}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 14:49:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 283.248001] [ 283.253429] ********************************************************** 14:49:40 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 283.289348] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 283.303777] ** ** [ 283.310717] ** trace_printk() being used. Allocating extra memory. ** [ 283.342584] ** ** [ 283.385050] ** This means that this is a DEBUG kernel and it is ** [ 283.393128] FAULT_INJECTION: forcing a failure. [ 283.393128] name failslab, interval 1, probability 0, space 0, times 0 [ 283.404515] CPU: 0 PID: 11936 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 283.413102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.422452] Call Trace: [ 283.425048] dump_stack+0x244/0x39d [ 283.428710] ? dump_stack_print_info.cold.1+0x20/0x20 [ 283.433944] should_fail.cold.4+0xa/0x17 [ 283.438008] ? kasan_slab_free+0xe/0x10 [ 283.441987] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.447102] ? ext4_mkdir+0x532/0xe60 [ 283.450944] ? mark_held_locks+0x130/0x130 [ 283.455299] ? trace_hardirqs_on+0x310/0x310 [ 283.459769] ? ext4_es_delayed_clu+0x37e/0x420 [ 283.464379] ? graph_lock+0x270/0x270 [ 283.468197] ? mark_held_locks+0xc7/0x130 [ 283.472379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.477965] ? check_preemption_disabled+0x48/0x280 [ 283.483004] ? __lock_is_held+0xb5/0x140 [ 283.487079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.492641] ? ext4_ext_map_blocks+0xeeb/0x48f0 [ 283.497336] __should_failslab+0x124/0x180 [ 283.501586] should_failslab+0x9/0x14 [ 283.505476] kmem_cache_alloc+0x47/0x730 [ 283.509545] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 283.514567] ? ext4_es_can_be_merged+0x23d/0x2a0 [ 283.519403] ? __es_tree_search.isra.12+0x1ba/0x220 [ 283.524443] __es_insert_extent+0x30c/0x1120 [ 283.528894] ? ext4_es_free_extent+0x790/0x790 [ 283.533499] ? do_raw_write_lock+0x14f/0x310 [ 283.537909] ? do_raw_read_unlock+0x70/0x70 [ 283.542230] ? __lock_is_held+0xb5/0x140 [ 283.546304] ext4_es_insert_extent+0x357/0xbd0 [ 283.550904] ? ext4_es_scan_clu+0x50/0x50 [ 283.555068] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 283.560370] ? down_write+0x8a/0x130 [ 283.564095] ? ext4_map_blocks+0x88f/0x1b50 [ 283.568437] ? down_read+0x120/0x120 [ 283.572152] ? kernel_text_address+0x79/0xf0 [ 283.576564] ext4_map_blocks+0xb0c/0x1b50 [ 283.580711] ? __save_stack_trace+0x8d/0xf0 [ 283.585090] ? ext4_issue_zeroout+0x190/0x190 [ 283.589643] ? save_stack+0x43/0xd0 [ 283.589657] ? __kasan_slab_free+0x102/0x150 [ 283.589667] ? kasan_slab_free+0xe/0x10 [ 283.589682] ? kmem_cache_free+0x83/0x290 [ 283.601652] ext4_getblk+0x10e/0x630 [ 283.601671] ? ext4_iomap_begin+0x1390/0x1390 [ 283.601688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.601705] ? __dquot_initialize+0x629/0xdd0 [ 283.614035] ext4_bread+0x95/0x2b0 [ 283.614052] ? ext4_getblk+0x630/0x630 [ 283.614065] ? dquot_get_next_dqblk+0x180/0x180 [ 283.614081] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 283.614093] ? common_perm+0x1f6/0x7b0 [ 283.614111] ext4_append+0x14e/0x370 [ 283.624168] ext4_mkdir+0x532/0xe60 [ 283.624192] ? ext4_init_dot_dotdot+0x510/0x510 [ 283.624211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.624227] ? security_inode_permission+0xd2/0x100 [ 283.667595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.673142] ? security_inode_mkdir+0xe8/0x120 [ 283.677759] vfs_mkdir+0x42e/0x6b0 [ 283.681360] do_mkdirat+0x27a/0x310 [ 283.684995] ? __ia32_sys_mknod+0xb0/0xb0 [ 283.689144] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.694533] ? trace_hardirqs_off_caller+0x310/0x310 [ 283.699656] ? ksys_ioctl+0x81/0xd0 [ 283.703293] __x64_sys_mkdir+0x5c/0x80 [ 283.707192] do_syscall_64+0x1b9/0x820 [ 283.711083] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 283.716453] ? syscall_return_slowpath+0x5e0/0x5e0 [ 283.721403] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.726288] ? trace_hardirqs_on_caller+0x310/0x310 [ 283.731318] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 283.736333] ? prepare_exit_to_usermode+0x291/0x3b0 [ 283.741368] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.746231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.751419] RIP: 0033:0x456a97 [ 283.754612] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.773546] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 14:49:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000280)={0x0, 0x1000, "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"}, &(0x7f0000000040)=0x1008) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000080)={r3, 0x95, "701870eb3190b0e8f6d4428bbc5249bb12522c3354db4dd65aaf0c1a7361c1fd4839e028cbb7436d7ecc5b572f6ae6b80e875d57bcda855fe18fd51fc357144ee910db4664e2f2d80ca538bfa26da6f53cbad8cb7343490c3a1a4199957875fefb614354eb50d9d5749d1127e21eae8273657b0c08bbc6791ff8a70ae03388b3f5fdb160b86531db0a7492e2d44d388b6777210056"}, &(0x7f0000000180)=0x9d) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) [ 283.781253] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456a97 [ 283.788529] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 283.795805] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 283.803080] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 283.810363] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 283.823986] ** unsafe for production use. ** [ 283.830983] ** ** [ 283.842326] ** If you see this message and you are not debugging ** [ 283.850935] ** the kernel, report this immediately to your vendor! ** [ 283.859327] ** ** [ 283.866713] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 283.875064] ********************************************************** 14:49:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 14:49:41 executing program 3: syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000100)={0x0, "410ce956deef40d9df0aee36e32bae24e8a7e22c4d2935028267fc957db3fac4"}) 14:49:43 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x40) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:49:43 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)="7374617475730042236739c16d17f90dc22322c94f133520785e91ea85ae107cc3819819c263540b1de1ba201e6de4b75a50115091eed530aa482e36594601ceb5d169c5baf41b35d8a5a09a82496613d86023865b57ef269f90d304969f687df53b611b40a44291b5a882208fbb835e54a41310a3b481d5bdbb0981742909a63b7cd1a18d405e5b011bfbe5a4d5bf299447e4c0dd4b63a367211c0078238b509d614100d33a5584aa3b3cb9b99e6e5f84719294d41b27117c47fb4f2b2be475eb25d501000000cf8422cade570c087b03f6b1818bc97077db23") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setgroups(0x0, 0x0) sendfile(r1, r0, 0x0, 0x1) 14:49:43 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:43 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000480)={0xffffffffffffff9c}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000004c0)={0x4, [0x9, 0x341aa470, 0x0, 0xffffffff]}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dlm-monitor\x00', 0x301882, 0x0) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f00000006c0)={0x34, 0x0, &(0x7f0000000680)}) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x2000, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f0000000540)='[\x00', 0x2) ioctl$ION_IOC_HEAP_QUERY(r4, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) r6 = dup2(r2, r4) setsockopt$inet_MCAST_JOIN_GROUP(r5, 0x0, 0x2a, &(0x7f0000000580)={0x8d5, {{0x2, 0x4e24, @multicast2}}}, 0x88) sendmmsg$unix(r6, &(0x7f0000000440)=[{&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000180)="4238464bfa979140d7a94429b8e81d75a6e8236a0a54a44d6d79b30e371dca1eb16bbc5dc80cf541fd54445bf57104af8bbb0f05e06d2891deb8445b652db2ca161ddeddc902eb7f3cada1d77bcba5c5de25bd20ebe2075e3216fae17fb274072f8aa7798ec4b50cfd064d9c161e82b48065be685e122d89f828cc1ce4d6eab6026441a2fa74ab125d436119165925a56b5c0dff82acce729a", 0x99}, {&(0x7f0000000280)="0f6b29e96cc606f93f144a4c16351e3e1753142158b76f3362ddf9cbb47adb3cdefa4102c18ae2b10b880b7dc4aea3851bf385028dc654313d48f2a9af580748a7bb673cc88c15d250cf8334cb95ea488a572f336efacf1bce5dff13b01acbb215aeabfc49af3b39284444126f93008ee69ad977563f2aa8b2b28fd33e3310b0c6d630e21f02c4d605d2121cca12be1c057cf552d22d23daedc3898129e5eab473655c35403ba406d922f9e5e4277456ad926007a564f3398dd61c5fe1fdabea115cf4717d22923ced463937c919ce0869dd0a31e2b4e9890963e47964125536acf164e797733dcb0d96d1cff79f1e09", 0xf0}, {&(0x7f0000000380)="5df94c707cbc3b0e408ad2415d7b59ad11f64431819d93d4b091494817568b7731a5334025f1e61e2b809ee9143bc8b3cd87899279a7f5bfcd18ed0642b300fb98fedef6ea1f540bd7a8ff209243f06582a4837169d0e570b3d6f36b0467cdbb69aed4ffc5821f87d85cd38968071934f905d7116c0ad7246dc0270e40dead5996c2f47823070307d6eb2a6ba1977c7b05e399b5390d610f8f268994e1d6b8da2c", 0xa1}], 0x3, &(0x7f00000000c0)=[@rights={0x28, 0x1, 0x1, [r1, r1, r1, r4, r1]}], 0x28, 0x40}], 0x1, 0x8840) setsockopt$packet_int(r6, 0x107, 0x13, &(0x7f0000000100)=0x4010000008, 0x4) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000500)={0x32, @rand_addr=0x5, 0x4e22, 0x0, 'sed\x00', 0x10, 0x5, 0x74}, 0x2c) 14:49:43 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:43 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x8, 0x800000000004, 0x4, 0x9}, 0x2c) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r1, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000400), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r0, &(0x7f0000000140)}, 0x10) 14:49:43 executing program 3: r0 = socket$inet6(0xa, 0x803, 0xa) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x2007) r2 = socket$inet6(0xa, 0x1000000006, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf32(r2, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r3 = accept4(r1, 0x0, 0x0, 0x0) recvfrom$inet(r3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd1f) [ 285.742817] FAULT_INJECTION: forcing a failure. [ 285.742817] name failslab, interval 1, probability 0, space 0, times 0 14:49:43 executing program 4: ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x20000, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 285.786317] CPU: 1 PID: 11961 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 285.794952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.804314] Call Trace: [ 285.806933] dump_stack+0x244/0x39d [ 285.810584] ? dump_stack_print_info.cold.1+0x20/0x20 [ 285.815798] ? __kernel_text_address+0xd/0x40 [ 285.820327] ? unwind_get_return_address+0x61/0xa0 [ 285.825305] should_fail.cold.4+0xa/0x17 [ 285.829392] ? fault_create_debugfs_attr+0x1f0/0x1f0 14:49:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) [ 285.834516] ? save_stack+0x43/0xd0 [ 285.838168] ? kasan_kmalloc+0xcb/0xd0 [ 285.842070] ? __kmalloc_track_caller+0x159/0x750 [ 285.846923] ? memdup_user+0x2c/0xa0 [ 285.850656] ? do_syscall_64+0x1b9/0x820 [ 285.854734] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.860111] ? graph_lock+0x270/0x270 [ 285.863936] ? graph_lock+0x270/0x270 [ 285.867779] ? find_held_lock+0x36/0x1c0 [ 285.871882] ? tcp_time_wait+0x898/0xb20 [ 285.875975] ? perf_trace_sched_process_exec+0x860/0x860 [ 285.881458] ? lock_release+0xa00/0xa00 14:49:43 executing program 0: socketpair$unix(0x1, 0x100000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f00000000c0)={0x80000000, 0x1, 'client0\x00', 0x2, "d23929fe4591fb4b", "79cb42f2a590f6e0781791e085447e70e10381e2699462a060f2542719d6ed3a", 0x100, 0x1c00000000000000}) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x8, 0x6, 0x80000001}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000340)={r2, 0x80000000}, &(0x7f0000000380)=0x8) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f00000001c0)={0x6, 0x6, 0x8, 0x1, 0x9}) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000080)={0x20, 0x2e536e56, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'teql0\x00'}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) [ 285.885457] ? perf_trace_sched_process_exec+0x860/0x860 [ 285.890939] __should_failslab+0x124/0x180 [ 285.895201] should_failslab+0x9/0x14 [ 285.899012] __kmalloc_track_caller+0x2d5/0x750 [ 285.903734] ? strncpy_from_user+0x5a0/0x5a0 [ 285.908188] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 285.913749] ? strndup_user+0x77/0xd0 [ 285.917574] memdup_user+0x2c/0xa0 [ 285.921130] strndup_user+0x77/0xd0 [ 285.924765] ksys_mount+0x73/0x140 [ 285.928312] __x64_sys_mount+0xbe/0x150 [ 285.932288] do_syscall_64+0x1b9/0x820 14:49:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) signalfd(r0, &(0x7f0000000000)={0xb5a}, 0x8) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) [ 285.936214] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 285.941626] ? syscall_return_slowpath+0x5e0/0x5e0 [ 285.946566] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.951447] ? trace_hardirqs_on_caller+0x310/0x310 [ 285.956471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.962015] ? prepare_exit_to_usermode+0x291/0x3b0 [ 285.967041] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.971896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.977083] RIP: 0033:0x45a0ea [ 285.977097] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 285.977104] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 285.977122] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 285.977131] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 285.977140] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 14:49:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0xa) accept4$llc(r2, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x80000) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) [ 285.977148] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 285.977155] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 286.062784] XFS (loop2): Invalid superblock magic number [ 286.139083] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 286.148539] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 286.170851] attempt to access beyond end of device [ 286.183827] loop4: rw=12288, want=8200, limit=20 [ 286.194574] attempt to access beyond end of device [ 286.207595] loop4: rw=12288, want=12296, limit=20 [ 286.223089] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 286.244524] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 286.263986] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 286.272727] attempt to access beyond end of device [ 286.283758] loop4: rw=12288, want=8200, limit=20 [ 286.289483] attempt to access beyond end of device [ 286.295107] loop4: rw=12288, want=12296, limit=20 [ 286.300706] F2FS-fs (loop4): Failed to get valid F2FS checkpoint 14:49:46 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x40) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:49:46 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfsL', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:46 executing program 0: getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) r2 = accept4(r0, 0x0, &(0x7f0000000000), 0x800) connect$nfc_llcp(r2, &(0x7f00000001c0)={0x27, 0x0, 0x2, 0x3, 0x139d, 0x6b7d301d, "1cf8c790150d3231ddef75aa7bb4d3916bd3bbf97bf4b21ee58a24a2d06fd848b0f897eb9ab7e87dce606fe46fc561d2fa953c0b339c4109568db67877e8fc", 0x19}, 0x60) r3 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x300, 0x90) setns(r3, 0x20000000) write$selinux_attr(r3, &(0x7f0000000180)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25) setns(r3, 0x0) 14:49:46 executing program 4: ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x20000, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 14:49:46 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = pkey_alloc(0x0, 0xf7ffffdffffffffc) pkey_free(r3) r4 = dup3(r2, 0xffffffffffffffff, 0x80000) futimesat(r4, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x0, 0x7530}}) flock(0xffffffffffffffff, 0x2) flock(0xffffffffffffffff, 0x100000000000001) r5 = gettid() gettid() syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xc0, 0x80) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)=0x0) timer_settime(r7, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000040000)={{0x0, 0x0}}) tkill(r5, 0x1000000000015) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0xffffffff, 0x4) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) futimesat(r9, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x77359400}, {0x77359400}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f2, &(0x7f0000000580)='ip6_vti0\x00') setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0xd}}, 0xf0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.SMACK64IPOUT\x00', &(0x7f0000000340)='/dev/amidi#\x00', 0xc, 0x2) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) setsockopt$RDS_CANCEL_SENT_TO(r6, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}, 0xc95920e5537317c) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x8, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f00000003c0), &(0x7f0000000c80)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYBLOB="86b9f14edc5b6b74123242afc9ee066ade1bbd8615f79567f4b3077970d6b9bd5873848e07c5fe81884bd79c057b58c8117fa7a6c1153d3d165284b670dbb873b6f10a15860b4b70aa7fc9bce6dae9542a5738b3786680c97b3e301ce0e73ae40a2ab963f8a1328a5f71701a6910408cda92c9acaff46ae81ba4122e6dba4ecf", @ANYRESOCT=r8, @ANYRES32=0x0]]}, 0x80) [ 288.845742] FAULT_INJECTION: forcing a failure. [ 288.845742] name failslab, interval 1, probability 0, space 0, times 0 [ 288.889047] CPU: 0 PID: 12018 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 288.897667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.907018] Call Trace: [ 288.909609] dump_stack+0x244/0x39d [ 288.913265] ? dump_stack_print_info.cold.1+0x20/0x20 [ 288.918458] ? __kernel_text_address+0xd/0x40 [ 288.922970] ? unwind_get_return_address+0x61/0xa0 [ 288.927930] should_fail.cold.4+0xa/0x17 [ 288.931996] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.937105] ? save_stack+0x43/0xd0 [ 288.940737] ? kasan_kmalloc+0xcb/0xd0 [ 288.944634] ? __kmalloc_track_caller+0x159/0x750 [ 288.949475] ? memdup_user+0x2c/0xa0 [ 288.953189] ? do_syscall_64+0x1b9/0x820 [ 288.957247] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.962646] ? graph_lock+0x270/0x270 [ 288.966452] ? graph_lock+0x270/0x270 [ 288.970261] ? find_held_lock+0x36/0x1c0 [ 288.974384] ? perf_trace_sched_process_exec+0x860/0x860 [ 288.979874] ? lock_release+0xa00/0xa00 [ 288.983845] ? perf_trace_sched_process_exec+0x860/0x860 [ 288.989299] __should_failslab+0x124/0x180 [ 288.993533] should_failslab+0x9/0x14 [ 288.997334] __kmalloc_track_caller+0x2d5/0x750 [ 289.002061] ? strncpy_from_user+0x5a0/0x5a0 [ 289.006478] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 289.012032] ? strndup_user+0x77/0xd0 [ 289.015974] memdup_user+0x2c/0xa0 [ 289.019534] strndup_user+0x77/0xd0 [ 289.023167] ksys_mount+0x73/0x140 [ 289.026711] __x64_sys_mount+0xbe/0x150 [ 289.030711] do_syscall_64+0x1b9/0x820 [ 289.034645] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.040036] ? syscall_return_slowpath+0x5e0/0x5e0 [ 289.044988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.049869] ? trace_hardirqs_on_caller+0x310/0x310 [ 289.054909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.060457] ? prepare_exit_to_usermode+0x291/0x3b0 [ 289.065507] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.070375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.075576] RIP: 0033:0x45a0ea [ 289.078776] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 289.097682] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 289.105414] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 289.112692] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 289.119968] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 289.127253] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:49:46 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x40) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:49:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40300, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000040)={[0x2, 0x100000, 0x100000, 0x2], 0x6, 0x44, 0xa9d}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f00000000c0)={0x347, 0x0, 0x0}) [ 289.134541] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 289.160692] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 289.197019] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 14:49:46 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 289.235172] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 289.259703] attempt to access beyond end of device [ 289.274930] loop4: rw=12288, want=8200, limit=20 [ 289.292173] attempt to access beyond end of device 14:49:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) r3 = geteuid() fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r3, r4) [ 289.313671] loop4: rw=12288, want=12296, limit=20 [ 289.326136] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 289.334512] FAULT_INJECTION: forcing a failure. [ 289.334512] name failslab, interval 1, probability 0, space 0, times 0 [ 289.353286] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 289.361093] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 289.371532] CPU: 0 PID: 12040 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 289.380120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.389474] Call Trace: [ 289.392070] dump_stack+0x244/0x39d [ 289.395709] ? dump_stack_print_info.cold.1+0x20/0x20 [ 289.400923] ? filename_lookup+0x39a/0x520 [ 289.405189] ? user_path_at_empty+0x40/0x50 [ 289.409527] ? do_mount+0x180/0x1ff0 [ 289.413234] ? ksys_mount+0x12d/0x140 [ 289.417033] ? do_syscall_64+0x1b9/0x820 [ 289.421116] should_fail.cold.4+0xa/0x17 [ 289.425187] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.430289] ? mntput+0x74/0xa0 [ 289.433578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.439128] ? graph_lock+0x270/0x270 [ 289.442956] ? find_held_lock+0x36/0x1c0 [ 289.447055] ? perf_trace_sched_process_exec+0x860/0x860 [ 289.452509] ? lock_downgrade+0x900/0x900 [ 289.455603] attempt to access beyond end of device [ 289.456669] __should_failslab+0x124/0x180 [ 289.456686] should_failslab+0x9/0x14 [ 289.456702] kmem_cache_alloc_trace+0x2db/0x740 [ 289.456720] ? kasan_check_write+0x14/0x20 [ 289.456738] vfs_new_fs_context+0x5e/0x77c [ 289.456764] do_mount+0x1816/0x1ff0 [ 289.461976] loop4: rw=12288, want=8200, limit=20 [ 289.465934] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 289.465969] ? copy_mount_string+0x40/0x40 [ 289.466003] ? copy_mount_options+0x5f/0x430 [ 289.466020] ? kmem_cache_alloc_trace+0x356/0x740 14:49:46 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = pkey_alloc(0x0, 0xf7ffffdffffffffc) pkey_free(r3) r4 = dup3(r2, 0xffffffffffffffff, 0x80000) futimesat(r4, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x0, 0x7530}}) flock(0xffffffffffffffff, 0x2) flock(0xffffffffffffffff, 0x100000000000001) r5 = gettid() gettid() syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xc0, 0x80) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)=0x0) timer_settime(r7, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000040000)={{0x0, 0x0}}) tkill(r5, 0x1000000000015) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0xffffffff, 0x4) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) futimesat(r9, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x77359400}, {0x77359400}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f2, &(0x7f0000000580)='ip6_vti0\x00') setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0xd}}, 0xf0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.SMACK64IPOUT\x00', &(0x7f0000000340)='/dev/amidi#\x00', 0xc, 0x2) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) setsockopt$RDS_CANCEL_SENT_TO(r6, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}, 0xc95920e5537317c) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x8, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f00000003c0), &(0x7f0000000c80)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYBLOB="86b9f14edc5b6b74123242afc9ee066ade1bbd8615f79567f4b3077970d6b9bd5873848e07c5fe81884bd79c057b58c8117fa7a6c1153d3d165284b670dbb873b6f10a15860b4b70aa7fc9bce6dae9542a5738b3786680c97b3e301ce0e73ae40a2ab963f8a1328a5f71701a6910408cda92c9acaff46ae81ba4122e6dba4ecf", @ANYRESOCT=r8, @ANYRES32=0x0]]}, 0x80) [ 289.466038] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 289.466053] ? _copy_from_user+0xdf/0x150 [ 289.466072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.466085] ? copy_mount_options+0x315/0x430 [ 289.466103] ksys_mount+0x12d/0x140 [ 289.466120] __x64_sys_mount+0xbe/0x150 [ 289.466139] do_syscall_64+0x1b9/0x820 [ 289.466153] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.466170] ? syscall_return_slowpath+0x5e0/0x5e0 [ 289.466187] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.476477] attempt to access beyond end of device [ 289.478862] ? trace_hardirqs_on_caller+0x310/0x310 [ 289.478879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.478895] ? prepare_exit_to_usermode+0x291/0x3b0 [ 289.478914] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.478935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.478947] RIP: 0033:0x45a0ea [ 289.478960] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 289.478973] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 289.493703] loop4: rw=12288, want=12296, limit=20 [ 289.497078] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 289.497087] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 289.497095] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 289.497103] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 289.497111] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='\x00\x00\x00\x00\x00') r4 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r4, 0x8200) r5 = open(&(0x7f0000000080)='./bus\x00', 0x101002, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r5, 0x0) r6 = openat$cgroup_ro(r3, &(0x7f00000005c0)="6d656d0001792e737761532e63757272656e7400be17f2fa6ed4b92368a1f45ebbe17a587c413dfa97683784f478a317c8e05928fe70f88aca27b4030000002277dd8bd1a34dc92ff6be6b49377743c2cd25d0a4d07bbf0d365ec092242cc68d2d98872f3f75a8daef56bdc233e84f7c65165aa90539c58b63a86bcced16e14fa848d6a967867fde772a10b57187cf53c2531300b47accb778f871d2bd21734385ee577794c7afbdc8b3d401bd5d84f0877c2980", 0x0, 0x0) preadv(r6, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x20001000) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) [ 289.513835] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 289.649039] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 14:49:47 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = pkey_alloc(0x0, 0xf7ffffdffffffffc) pkey_free(r3) r4 = dup3(r2, 0xffffffffffffffff, 0x80000) futimesat(r4, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x0, 0x7530}}) flock(0xffffffffffffffff, 0x2) flock(0xffffffffffffffff, 0x100000000000001) r5 = gettid() gettid() syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xc0, 0x80) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)=0x0) timer_settime(r7, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000040000)={{0x0, 0x0}}) tkill(r5, 0x1000000000015) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0xffffffff, 0x4) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) futimesat(r9, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x77359400}, {0x77359400}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f2, &(0x7f0000000580)='ip6_vti0\x00') setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0xd}}, 0xf0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.SMACK64IPOUT\x00', &(0x7f0000000340)='/dev/amidi#\x00', 0xc, 0x2) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) setsockopt$RDS_CANCEL_SENT_TO(r6, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}, 0xc95920e5537317c) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x8, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f00000003c0), &(0x7f0000000c80)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYBLOB="86b9f14edc5b6b74123242afc9ee066ade1bbd8615f79567f4b3077970d6b9bd5873848e07c5fe81884bd79c057b58c8117fa7a6c1153d3d165284b670dbb873b6f10a15860b4b70aa7fc9bce6dae9542a5738b3786680c97b3e301ce0e73ae40a2ab963f8a1328a5f71701a6910408cda92c9acaff46ae81ba4122e6dba4ecf", @ANYRESOCT=r8, @ANYRES32=0x0]]}, 0x80) 14:49:47 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:47 executing program 4: ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x20000, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 289.798285] FAULT_INJECTION: forcing a failure. [ 289.798285] name failslab, interval 1, probability 0, space 0, times 0 [ 289.850768] XFS (loop2): Invalid superblock magic number [ 289.885835] CPU: 1 PID: 12055 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 289.894438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.903799] Call Trace: [ 289.906414] dump_stack+0x244/0x39d [ 289.910063] ? dump_stack_print_info.cold.1+0x20/0x20 [ 289.915276] ? __kernel_text_address+0xd/0x40 [ 289.919796] ? unwind_get_return_address+0x61/0xa0 [ 289.924752] should_fail.cold.4+0xa/0x17 [ 289.928830] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.933965] ? kasan_kmalloc+0xcb/0xd0 [ 289.937859] ? __kmalloc_track_caller+0x159/0x750 [ 289.942710] ? memdup_user+0x2c/0xa0 [ 289.946436] ? graph_lock+0x270/0x270 [ 289.950249] ? do_syscall_64+0x1b9/0x820 [ 289.954322] ? graph_lock+0x270/0x270 [ 289.958161] ? graph_lock+0x270/0x270 [ 289.961977] ? find_held_lock+0x36/0x1c0 [ 289.966073] ? perf_trace_sched_process_exec+0x860/0x860 [ 289.971558] ? lock_release+0xa00/0xa00 [ 289.975540] ? perf_trace_sched_process_exec+0x860/0x860 [ 289.980996] ? usercopy_warn+0x110/0x110 [ 289.985076] __should_failslab+0x124/0x180 [ 289.989324] should_failslab+0x9/0x14 [ 289.993169] kmem_cache_alloc_trace+0x2db/0x740 [ 289.997953] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.003500] ? _copy_from_user+0xdf/0x150 [ 290.007688] copy_mount_options+0x5f/0x430 [ 290.011956] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.017504] ksys_mount+0xd0/0x140 [ 290.021071] __x64_sys_mount+0xbe/0x150 [ 290.025055] do_syscall_64+0x1b9/0x820 [ 290.028953] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 290.034343] ? syscall_return_slowpath+0x5e0/0x5e0 [ 290.039288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.044149] ? trace_hardirqs_on_caller+0x310/0x310 [ 290.049177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.054757] ? prepare_exit_to_usermode+0x291/0x3b0 [ 290.059795] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.064654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.069850] RIP: 0033:0x45a0ea [ 290.073081] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 290.091996] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:49:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x58, r2, 0x5, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x400c000}, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) 14:49:47 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = pkey_alloc(0x0, 0xf7ffffdffffffffc) pkey_free(r3) r4 = dup3(r2, 0xffffffffffffffff, 0x80000) futimesat(r4, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x0, 0x7530}}) flock(0xffffffffffffffff, 0x2) flock(0xffffffffffffffff, 0x100000000000001) r5 = gettid() gettid() syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xc0, 0x80) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)=0x0) timer_settime(r7, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000040000)={{0x0, 0x0}}) tkill(r5, 0x1000000000015) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0xffffffff, 0x4) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000880)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) futimesat(r9, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x77359400}, {0x77359400}}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f2, &(0x7f0000000580)='ip6_vti0\x00') setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0xd}}, 0xf0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.SMACK64IPOUT\x00', &(0x7f0000000340)='/dev/amidi#\x00', 0xc, 0x2) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) setsockopt$RDS_CANCEL_SENT_TO(r6, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}, 0xc95920e5537317c) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x8, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f00000003c0), &(0x7f0000000c80)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYBLOB="86b9f14edc5b6b74123242afc9ee066ade1bbd8615f79567f4b3077970d6b9bd5873848e07c5fe81884bd79c057b58c8117fa7a6c1153d3d165284b670dbb873b6f10a15860b4b70aa7fc9bce6dae9542a5738b3786680c97b3e301ce0e73ae40a2ab963f8a1328a5f71701a6910408cda92c9acaff46ae81ba4122e6dba4ecf", @ANYRESOCT=r8, @ANYRES32=0x0]]}, 0x80) [ 290.099712] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 290.106986] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 290.114286] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 290.121606] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 290.128888] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 290.140842] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 290.242015] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 290.259973] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 290.289351] attempt to access beyond end of device [ 290.306153] loop4: rw=12288, want=8200, limit=20 [ 290.317824] attempt to access beyond end of device [ 290.322053] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 290.341851] loop4: rw=12288, want=12296, limit=20 [ 290.360980] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 290.384747] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 290.392100] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 290.401728] attempt to access beyond end of device [ 290.407041] loop4: rw=12288, want=8200, limit=20 [ 290.412597] attempt to access beyond end of device [ 290.420079] loop4: rw=12288, want=12296, limit=20 [ 290.425664] F2FS-fs (loop4): Failed to get valid F2FS checkpoint 14:49:49 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:49 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x40) memfd_create(&(0x7f0000000e40)="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", 0x0) ptrace(0x10, r0) 14:49:49 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000040)=0xce) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) r3 = shmget$private(0x0, 0x1000, 0x2, &(0x7f0000000000/0x1000)=nil) ioctl$sock_netdev_private(r0, 0x89f3, &(0x7f00000000c0)="61a78d09f6882cf3cde5089d258b3456e34a8c2b2cf5d1acaa734bca32fdf37e56fcdf30eff6cb765a407c03de65fb46728d1e8d1c66358b0de0b5b086792e6e5647c3dad1c09925537ded704a467771df8667f679e2f9b8691d663f6c") keyctl$session_to_parent(0x12) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) shmctl$IPC_RMID(r3, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) 14:49:49 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) 14:49:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) 14:49:49 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x1c, 0x0, &(0x7f0000000080)=[@enter_looper, @clear_death={0x400c630f, 0x3}, @increfs={0x40046304, 0x1}], 0x4e, 0x0, &(0x7f00000000c0)="c649fcd263a6b5c236f51fb95bc7c4491b34b867208b51474e616655dd6899f9fed4ad3287f6927a644a2eab064bfac993a10968db95f15b58c67d3a6e1c7d578234a182f48c3a94393c7a90da9c"}) 14:49:49 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x2) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) writev(r3, &(0x7f0000003080)=[{&(0x7f0000000040)=':', 0x1}], 0x1) recvmmsg(r2, &(0x7f0000002d00)=[{{&(0x7f00000002c0), 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 292.254186] FAULT_INJECTION: forcing a failure. [ 292.254186] name failslab, interval 1, probability 0, space 0, times 0 [ 292.343600] CPU: 0 PID: 12080 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 292.352197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.361551] Call Trace: [ 292.364150] dump_stack+0x244/0x39d [ 292.367803] ? dump_stack_print_info.cold.1+0x20/0x20 [ 292.372999] ? __kernel_text_address+0xd/0x40 [ 292.377498] ? unwind_get_return_address+0x61/0xa0 [ 292.382496] should_fail.cold.4+0xa/0x17 [ 292.386567] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.391696] ? kasan_kmalloc+0xcb/0xd0 [ 292.395585] ? __kmalloc_track_caller+0x159/0x750 [ 292.400433] ? memdup_user+0x2c/0xa0 [ 292.404157] ? graph_lock+0x270/0x270 [ 292.407960] ? do_syscall_64+0x1b9/0x820 [ 292.412022] ? graph_lock+0x270/0x270 [ 292.415821] ? graph_lock+0x270/0x270 [ 292.419690] ? find_held_lock+0x36/0x1c0 [ 292.423761] ? ip6_pol_route+0x348/0x1a00 [ 292.427923] ? perf_trace_sched_process_exec+0x860/0x860 [ 292.433392] ? lock_release+0xa00/0xa00 [ 292.437376] ? perf_trace_sched_process_exec+0x860/0x860 14:49:49 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 14:49:49 executing program 3: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0), 0x0, 0x1400}], 0x0, 0x0) 14:49:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 292.442846] ? usercopy_warn+0x110/0x110 [ 292.446921] __should_failslab+0x124/0x180 [ 292.451174] should_failslab+0x9/0x14 [ 292.455003] kmem_cache_alloc_trace+0x2db/0x740 [ 292.459694] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.465235] ? _copy_from_user+0xdf/0x150 [ 292.469398] copy_mount_options+0x5f/0x430 [ 292.473656] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.479199] ksys_mount+0xd0/0x140 [ 292.482761] __x64_sys_mount+0xbe/0x150 [ 292.486758] do_syscall_64+0x1b9/0x820 [ 292.490654] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.496026] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.500962] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.505834] ? trace_hardirqs_on_caller+0x310/0x310 [ 292.510858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.516421] ? prepare_exit_to_usermode+0x291/0x3b0 [ 292.521448] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.526301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.531509] RIP: 0033:0x45a0ea 14:49:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@ng={0x4, 0x4, "140ac9e287"}, 0x7, 0x1) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000240)={0x0, 0x0, 0x0}) [ 292.534723] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 292.553627] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 292.561336] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 292.568623] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 292.575918] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 292.583210] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 292.590488] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 292.653300] XFS (loop2): Invalid superblock magic number 14:49:50 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 292.737897] FAULT_INJECTION: forcing a failure. [ 292.737897] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 292.749712] CPU: 1 PID: 12128 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 292.758295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.767643] Call Trace: [ 292.770231] dump_stack+0x244/0x39d [ 292.773893] ? dump_stack_print_info.cold.1+0x20/0x20 [ 292.779096] should_fail.cold.4+0xa/0x17 [ 292.783168] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.788275] ? __lock_acquire+0x62f/0x4c20 [ 292.792509] ? lock_downgrade+0x900/0x900 [ 292.796658] ? check_preemption_disabled+0x48/0x280 [ 292.801694] ? mark_held_locks+0x130/0x130 [ 292.805964] ? mark_held_locks+0x130/0x130 [ 292.810250] ? is_bpf_text_address+0xd3/0x170 [ 292.814749] ? kernel_text_address+0x79/0xf0 [ 292.819164] ? __kernel_text_address+0xd/0x40 [ 292.823660] ? unwind_get_return_address+0x61/0xa0 [ 292.828628] ? __save_stack_trace+0x8d/0xf0 [ 292.832988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.838553] ? should_fail+0x22d/0xd01 [ 292.842464] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.847576] __alloc_pages_nodemask+0x366/0xec0 [ 292.852245] ? __kmalloc_track_caller+0x159/0x750 [ 292.857196] ? memdup_user+0x2c/0xa0 [ 292.860928] ? __alloc_pages_slowpath+0x2e00/0x2e00 [ 292.865972] ? graph_lock+0x270/0x270 [ 292.869773] ? graph_lock+0x270/0x270 [ 292.873577] ? find_held_lock+0x36/0x1c0 [ 292.877667] ? trace_hardirqs_off+0xb8/0x310 [ 292.882110] cache_grow_begin+0xa5/0x8c0 [ 292.886179] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.891715] ? check_preemption_disabled+0x48/0x280 [ 292.896739] kmem_cache_alloc_trace+0x67b/0x740 [ 292.901413] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.906958] copy_mount_options+0x5f/0x430 [ 292.911193] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.916747] ksys_mount+0xd0/0x140 [ 292.920318] __x64_sys_mount+0xbe/0x150 [ 292.924294] do_syscall_64+0x1b9/0x820 [ 292.928180] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.933675] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.938599] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.943461] ? trace_hardirqs_on_caller+0x310/0x310 [ 292.948497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.954059] ? prepare_exit_to_usermode+0x291/0x3b0 [ 292.959076] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.963924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.969108] RIP: 0033:0x45a0ea [ 292.972348] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 292.991273] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 292.998997] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 293.006265] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 293.013532] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 293.020800] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 293.028079] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:52 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x40) memfd_create(&(0x7f0000000e40)="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", 0x0) ptrace(0x10, r0) 14:49:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:49:52 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x2) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) writev(r3, &(0x7f0000003080)=[{&(0x7f0000000040)=':', 0x1}], 0x1) recvmmsg(r2, &(0x7f0000002d00)=[{{&(0x7f00000002c0), 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 14:49:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) futimesat(r0, 0x0, 0x0) 14:49:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="786673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:52 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 295.349077] FAULT_INJECTION: forcing a failure. [ 295.349077] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 295.360925] CPU: 1 PID: 12137 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 295.369493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.378858] Call Trace: [ 295.381485] dump_stack+0x244/0x39d [ 295.385112] ? dump_stack_print_info.cold.1+0x20/0x20 [ 295.390302] ? mark_held_locks+0x130/0x130 [ 295.394545] ? set_next_entity+0x493/0xc70 [ 295.398796] ? __lock_acquire+0x62f/0x4c20 [ 295.403045] should_fail.cold.4+0xa/0x17 [ 295.407107] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.412212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 295.417747] ? __perf_event_task_sched_out+0x33a/0x1ca0 [ 295.423113] ? mark_held_locks+0x130/0x130 [ 295.427382] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 295.432913] ? graph_lock+0x270/0x270 [ 295.436710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 295.442244] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 295.447437] ? find_held_lock+0x36/0x1c0 [ 295.451493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 295.457025] ? should_fail+0x22d/0xd01 [ 295.460929] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.466055] __alloc_pages_nodemask+0x366/0xec0 [ 295.470725] ? trace_hardirqs_on+0xbd/0x310 [ 295.475087] ? kasan_check_read+0x11/0x20 [ 295.479235] ? __alloc_pages_slowpath+0x2e00/0x2e00 [ 295.484263] ? compat_start_thread+0x80/0x80 [ 295.488716] ? find_held_lock+0x36/0x1c0 [ 295.492778] ? device_matches_zone_sectors+0xd8/0x1b0 [ 295.498073] ? trace_hardirqs_off+0xb8/0x310 [ 295.502582] cache_grow_begin+0xa5/0x8c0 [ 295.506642] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 295.512176] ? check_preemption_disabled+0x48/0x280 [ 295.517190] kmem_cache_alloc+0x66a/0x730 [ 295.521331] ? find_held_lock+0x36/0x1c0 [ 295.525401] getname_flags+0xd0/0x590 [ 295.529197] ? retint_kernel+0x2d/0x2d [ 295.533079] user_path_at_empty+0x2d/0x50 [ 295.537222] do_mount+0x180/0x1ff0 [ 295.540776] ? copy_mount_string+0x40/0x40 [ 295.545025] ? retint_kernel+0x2d/0x2d [ 295.548927] ? copy_mount_options+0x239/0x430 [ 295.553417] ? copy_mount_options+0x23f/0x430 [ 295.557912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 295.563470] ? copy_mount_options+0x315/0x430 [ 295.567966] ksys_mount+0x12d/0x140 [ 295.571594] __x64_sys_mount+0xbe/0x150 [ 295.575573] do_syscall_64+0x1b9/0x820 [ 295.579456] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 295.584822] ? syscall_return_slowpath+0x5e0/0x5e0 [ 295.589747] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.594603] ? trace_hardirqs_on_caller+0x310/0x310 [ 295.599636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 295.605174] ? prepare_exit_to_usermode+0x291/0x3b0 [ 295.610195] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.615045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.620233] RIP: 0033:0x45a0ea [ 295.623424] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 295.642322] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 295.650034] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 295.657301] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 295.664568] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 295.671837] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 295.679108] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:53 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x40) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:49:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 295.696922] audit: type=1326 audit(1544626193.066:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12134 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 14:49:53 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:53 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:49:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 295.840982] FAULT_INJECTION: forcing a failure. [ 295.840982] name failslab, interval 1, probability 0, space 0, times 0 [ 295.926396] CPU: 1 PID: 12155 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 295.935076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.935082] Call Trace: [ 295.935105] dump_stack+0x244/0x39d [ 295.935134] ? dump_stack_print_info.cold.1+0x20/0x20 [ 295.935154] ? kernel_text_address+0x79/0xf0 [ 295.935178] should_fail.cold.4+0xa/0x17 [ 295.935200] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.935225] ? save_stack+0xa9/0xd0 [ 295.960388] ? save_stack+0x43/0xd0 [ 295.976791] ? kmem_cache_alloc_trace+0x154/0x740 [ 295.981638] ? vfs_new_fs_context+0x5e/0x77c [ 295.986049] ? do_mount+0x1816/0x1ff0 [ 295.989849] ? ksys_mount+0x12d/0x140 [ 295.993661] ? __x64_sys_mount+0xbe/0x150 [ 295.997813] ? do_syscall_64+0x1b9/0x820 [ 296.001875] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.007246] ? find_held_lock+0x36/0x1c0 [ 296.011342] ? create_journal+0x5e8/0x23d0 [ 296.015599] ? perf_trace_sched_process_exec+0x860/0x860 [ 296.021055] ? debug_mutex_init+0x2d/0x60 [ 296.025220] __should_failslab+0x124/0x180 [ 296.029465] should_failslab+0x9/0x14 [ 296.033276] kmem_cache_alloc_trace+0x2db/0x740 [ 296.037951] ? rcu_read_lock_sched_held+0x14f/0x180 [ 296.042975] ? kmem_cache_alloc_trace+0x356/0x740 [ 296.047829] legacy_init_fs_context+0x187/0x230 [ 296.052568] ? vfs_dup_fs_context+0x400/0x400 [ 296.057083] vfs_new_fs_context+0x3f4/0x77c [ 296.061415] do_mount+0x1816/0x1ff0 [ 296.065046] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 296.070598] ? copy_mount_string+0x40/0x40 [ 296.074867] ? copy_mount_options+0x5f/0x430 [ 296.079278] ? kmem_cache_alloc_trace+0x356/0x740 [ 296.084175] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 296.089741] ? _copy_from_user+0xdf/0x150 [ 296.093908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.099466] ? copy_mount_options+0x315/0x430 [ 296.103967] ksys_mount+0x12d/0x140 [ 296.107602] __x64_sys_mount+0xbe/0x150 [ 296.111589] do_syscall_64+0x1b9/0x820 [ 296.111603] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 296.111620] ? syscall_return_slowpath+0x5e0/0x5e0 [ 296.111633] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.111652] ? trace_hardirqs_on_caller+0x310/0x310 [ 296.130637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.130653] ? prepare_exit_to_usermode+0x291/0x3b0 [ 296.130673] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.130695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.130706] RIP: 0033:0x45a0ea 14:49:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\r', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:53 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 296.130721] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 296.130729] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 296.130748] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 296.193919] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 296.201214] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 296.208483] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 296.215749] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:53 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 14:49:53 executing program 4: ptrace$peekuser(0x3, 0x0, 0x0) [ 296.280886] audit: type=1326 audit(1544626193.656:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12134 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 14:49:53 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x80000, 0x0) r0 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$peek(0x1, r0, 0x0) 14:49:53 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 14:49:53 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:49:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000005c0)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:49:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x1400000000000000, &(0x7f00000002c0)={0x1, 0x14, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0xc]}, 0x2c) [ 296.508503] FAULT_INJECTION: forcing a failure. [ 296.508503] name failslab, interval 1, probability 0, space 0, times 0 [ 296.520267] CPU: 0 PID: 12194 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 296.528869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.538233] Call Trace: [ 296.540830] dump_stack+0x244/0x39d [ 296.544467] ? dump_stack_print_info.cold.1+0x20/0x20 [ 296.549672] should_fail.cold.4+0xa/0x17 [ 296.553743] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 296.558887] ? kernel_text_address+0x79/0xf0 [ 296.563308] ? __kernel_text_address+0xd/0x40 [ 296.567831] ? __save_stack_trace+0x8d/0xf0 [ 296.572208] ? find_held_lock+0x36/0x1c0 [ 296.576293] ? find_held_lock+0x36/0x1c0 [ 296.580378] ? perf_trace_sched_process_exec+0x860/0x860 [ 296.585861] __should_failslab+0x124/0x180 [ 296.590109] should_failslab+0x9/0x14 [ 296.593920] __kmalloc_track_caller+0x2d5/0x750 [ 296.598657] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 296.604232] ? rcu_pm_notify+0xc0/0xc0 [ 296.608137] ? apparmor_fs_context_parse_param+0x1d9/0x490 [ 296.613771] krealloc+0x65/0xc0 [ 296.617075] apparmor_fs_context_parse_param+0x1d9/0x490 [ 296.622540] security_fs_context_parse_param+0x5a/0xb0 [ 296.627830] vfs_parse_fs_param+0x1ea/0x4d0 [ 296.632164] vfs_parse_fs_string+0x1d5/0x2b0 [ 296.636587] ? vfs_parse_fs_param+0x4d0/0x4d0 [ 296.641104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.646660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.652217] do_mount+0x773/0x1ff0 [ 296.655767] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 296.661319] ? copy_mount_string+0x40/0x40 [ 296.665566] ? copy_mount_options+0x5f/0x430 [ 296.669993] ? kmem_cache_alloc_trace+0x356/0x740 [ 296.674849] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 296.680398] ? _copy_from_user+0xdf/0x150 [ 296.684554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.690094] ? copy_mount_options+0x315/0x430 [ 296.694597] ksys_mount+0x12d/0x140 [ 296.698239] __x64_sys_mount+0xbe/0x150 [ 296.702231] do_syscall_64+0x1b9/0x820 [ 296.706124] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 296.711498] ? syscall_return_slowpath+0x5e0/0x5e0 [ 296.716434] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.721286] ? trace_hardirqs_on_caller+0x310/0x310 [ 296.726311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.731869] ? prepare_exit_to_usermode+0x291/0x3b0 [ 296.736900] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.741758] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.746990] RIP: 0033:0x45a0ea [ 296.750190] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 296.769088] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 296.776817] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 296.784096] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 296.791368] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 296.798642] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 296.805909] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:49:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:56 executing program 4: socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x10) 14:49:56 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:49:56 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:56 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) syz_open_pts(0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) gettid() [ 299.071498] FAULT_INJECTION: forcing a failure. [ 299.071498] name failslab, interval 1, probability 0, space 0, times 0 [ 299.104245] CPU: 0 PID: 12211 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 14:49:56 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=@flushpolicy={0x10, 0x1d, 0x1}, 0x10}}, 0x0) 14:49:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 299.112849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.122201] Call Trace: [ 299.124832] dump_stack+0x244/0x39d [ 299.128507] ? dump_stack_print_info.cold.1+0x20/0x20 [ 299.133716] should_fail.cold.4+0xa/0x17 [ 299.137817] ? unwind_get_return_address+0x61/0xa0 [ 299.142754] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.147974] ? save_stack+0x43/0xd0 [ 299.151650] ? kasan_kmalloc+0xcb/0xd0 [ 299.155575] ? kmem_cache_alloc_trace+0x154/0x740 [ 299.160435] ? apparmor_fs_context_alloc+0x43/0xa0 [ 299.165639] ? security_fs_context_alloc+0x54/0xb0 14:49:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x0, 0x0, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 299.170597] ? find_held_lock+0x36/0x1c0 [ 299.174686] ? perf_trace_sched_process_exec+0x860/0x860 [ 299.180141] ? check_preemption_disabled+0x48/0x280 [ 299.185199] __should_failslab+0x124/0x180 [ 299.189489] should_failslab+0x9/0x14 [ 299.193287] __kmalloc_track_caller+0x2d5/0x750 [ 299.197963] ? __bpf_trace_module_free+0x10/0x10 [ 299.202752] ? apparmor_fs_context_alloc+0x43/0xa0 [ 299.207715] ? rcu_read_lock_sched_held+0x14f/0x180 [ 299.212752] ? vfs_parse_fs_string+0x191/0x2b0 [ 299.217342] kmemdup_nul+0x31/0xa0 14:49:56 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x22, 0x0, 0x0) 14:49:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x0, 0x0, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 299.220910] vfs_parse_fs_string+0x191/0x2b0 [ 299.225322] ? vfs_parse_fs_param+0x4d0/0x4d0 [ 299.229816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.235377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.240947] do_mount+0x773/0x1ff0 [ 299.244503] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 299.250060] ? copy_mount_string+0x40/0x40 [ 299.254302] ? copy_mount_options+0x5f/0x430 [ 299.258714] ? kmem_cache_alloc_trace+0x356/0x740 [ 299.263562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 14:49:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknodat(0xffffffffffffffff, 0x0, 0xd408, 0x0) [ 299.269147] ? _copy_from_user+0xdf/0x150 [ 299.273304] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.278862] ? copy_mount_options+0x315/0x430 [ 299.283403] ksys_mount+0x12d/0x140 [ 299.287051] __x64_sys_mount+0xbe/0x150 [ 299.291064] do_syscall_64+0x1b9/0x820 [ 299.294973] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.300398] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.305333] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.310206] ? trace_hardirqs_on_caller+0x310/0x310 [ 299.315237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:49:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x0, 0x0, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 299.320806] ? prepare_exit_to_usermode+0x291/0x3b0 [ 299.325828] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.330702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.335939] RIP: 0033:0x45a0ea [ 299.339135] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 299.358067] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 299.365788] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 299.373073] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 299.380339] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 299.380348] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 299.380357] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 299.480247] XFS (loop2): Invalid superblock magic number 14:49:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:49:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) sendto$inet(r0, &(0x7f0000000040)="cc", 0x1, 0x1, 0x0, 0x0) [ 299.648942] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 299.799353] XFS (loop2): Invalid superblock magic number 14:49:59 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:49:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:49:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/tcp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 14:49:59 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:49:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) sendto$inet(r0, &(0x7f0000000040)="cc", 0x1, 0x1, 0x0, 0x0) 14:49:59 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) [ 302.161202] FAULT_INJECTION: forcing a failure. [ 302.161202] name failslab, interval 1, probability 0, space 0, times 0 14:49:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) sendto$inet(r0, &(0x7f0000000040)="cc", 0x1, 0x1, 0x0, 0x0) [ 302.221840] CPU: 1 PID: 12279 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 302.230445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.239809] Call Trace: [ 302.242411] dump_stack+0x244/0x39d [ 302.246079] ? dump_stack_print_info.cold.1+0x20/0x20 [ 302.251270] ? is_bpf_text_address+0xd3/0x170 [ 302.255792] should_fail.cold.4+0xa/0x17 [ 302.259874] ? __save_stack_trace+0x8d/0xf0 [ 302.264202] ? fault_create_debugfs_attr+0x1f0/0x1f0 14:49:59 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 302.269316] ? save_stack+0xa9/0xd0 [ 302.272945] ? kasan_kmalloc+0xcb/0xd0 [ 302.276838] ? kmem_cache_alloc_trace+0x154/0x740 [ 302.281679] ? legacy_init_fs_context+0x187/0x230 [ 302.286520] ? vfs_new_fs_context+0x3f4/0x77c [ 302.291026] ? do_mount+0x1816/0x1ff0 [ 302.294826] ? ksys_mount+0x12d/0x140 [ 302.298627] ? __x64_sys_mount+0xbe/0x150 [ 302.302789] ? do_syscall_64+0x1b9/0x820 [ 302.306858] ? find_held_lock+0x36/0x1c0 [ 302.310976] ? check_preemption_disabled+0x48/0x280 [ 302.316000] ? perf_trace_sched_process_exec+0x860/0x860 [ 302.321452] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 302.326987] __should_failslab+0x124/0x180 [ 302.331253] should_failslab+0x9/0x14 [ 302.335063] kmem_cache_alloc_trace+0x2db/0x740 [ 302.339722] ? legacy_init_fs_context+0x187/0x230 [ 302.344597] ? rcu_read_lock_sched_held+0x14f/0x180 [ 302.349618] ? kmem_cache_alloc_trace+0x356/0x740 [ 302.354468] ? rcu_read_lock_sched_held+0x14f/0x180 [ 302.359481] apparmor_fs_context_alloc+0x43/0xa0 [ 302.364252] security_fs_context_alloc+0x54/0xb0 [ 302.369018] vfs_new_fs_context+0x446/0x77c [ 302.373334] do_mount+0x1816/0x1ff0 [ 302.376981] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 302.382514] ? copy_mount_string+0x40/0x40 [ 302.386769] ? copy_mount_options+0x5f/0x430 [ 302.391175] ? kmem_cache_alloc_trace+0x356/0x740 [ 302.396016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.401564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.407104] ? copy_mount_options+0x315/0x430 [ 302.411644] ksys_mount+0x12d/0x140 [ 302.415281] __x64_sys_mount+0xbe/0x150 [ 302.419253] do_syscall_64+0x1b9/0x820 [ 302.423150] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 302.428526] ? syscall_return_slowpath+0x5e0/0x5e0 [ 302.433451] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.438288] ? trace_hardirqs_on_caller+0x310/0x310 [ 302.443301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.448833] ? prepare_exit_to_usermode+0x291/0x3b0 [ 302.453848] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.458737] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.463933] RIP: 0033:0x45a0ea [ 302.467126] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 302.486019] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 302.493716] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 302.501042] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 302.508328] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 302.515588] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:49:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 302.522848] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:49:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 302.589402] XFS (loop2): Invalid superblock magic number 14:50:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, 0x0, 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:00 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:00 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffe, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000140)=""/35) [ 302.700322] FAULT_INJECTION: forcing a failure. [ 302.700322] name failslab, interval 1, probability 0, space 0, times 0 [ 302.729549] CPU: 1 PID: 12323 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 302.738154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.747510] Call Trace: [ 302.750145] dump_stack+0x244/0x39d [ 302.753811] ? dump_stack_print_info.cold.1+0x20/0x20 [ 302.759030] should_fail.cold.4+0xa/0x17 [ 302.763114] ? unwind_get_return_address+0x61/0xa0 [ 302.768065] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.773219] ? save_stack+0x43/0xd0 [ 302.776854] ? kasan_kmalloc+0xcb/0xd0 [ 302.780750] ? kmem_cache_alloc_trace+0x154/0x740 [ 302.785602] ? apparmor_fs_context_alloc+0x43/0xa0 [ 302.790541] ? security_fs_context_alloc+0x54/0xb0 [ 302.795482] ? find_held_lock+0x36/0x1c0 [ 302.799561] ? do_write+0xa68/0x1370 [ 302.803297] ? perf_trace_sched_process_exec+0x860/0x860 [ 302.808755] ? check_preemption_disabled+0x48/0x280 [ 302.813812] __should_failslab+0x124/0x180 [ 302.818061] should_failslab+0x9/0x14 [ 302.821873] __kmalloc_track_caller+0x2d5/0x750 [ 302.826557] ? __bpf_trace_module_free+0x10/0x10 [ 302.831319] ? apparmor_fs_context_alloc+0x43/0xa0 [ 302.836269] ? rcu_read_lock_sched_held+0x14f/0x180 [ 302.841288] ? vfs_parse_fs_string+0x191/0x2b0 [ 302.845893] kmemdup_nul+0x31/0xa0 [ 302.849437] vfs_parse_fs_string+0x191/0x2b0 [ 302.853863] ? vfs_parse_fs_param+0x4d0/0x4d0 [ 302.858381] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.863928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.869499] do_mount+0x773/0x1ff0 [ 302.873058] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 302.878612] ? copy_mount_string+0x40/0x40 [ 302.882854] ? copy_mount_options+0x5f/0x430 [ 302.887273] ? kmem_cache_alloc_trace+0x356/0x740 [ 302.892134] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.897676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.903223] ? copy_mount_options+0x315/0x430 [ 302.907717] ksys_mount+0x12d/0x140 [ 302.911346] __x64_sys_mount+0xbe/0x150 [ 302.915330] do_syscall_64+0x1b9/0x820 [ 302.919272] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 302.924639] ? syscall_return_slowpath+0x5e0/0x5e0 [ 302.929580] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.934438] ? trace_hardirqs_on_caller+0x310/0x310 [ 302.939459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.945009] ? prepare_exit_to_usermode+0x291/0x3b0 [ 302.950059] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.954911] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.960097] RIP: 0033:0x45a0ea [ 302.963293] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 302.982189] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 302.989893] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea 14:50:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, 0x0, 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 302.997203] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 303.004470] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 303.011729] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 303.019021] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:50:01 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x102002700) 14:50:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, 0x0, 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:01 executing program 4: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x100000000000209) 14:50:01 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 304.371920] FAULT_INJECTION: forcing a failure. [ 304.371920] name failslab, interval 1, probability 0, space 0, times 0 [ 304.393281] CPU: 0 PID: 12340 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 304.401870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.411225] Call Trace: [ 304.413861] dump_stack+0x244/0x39d [ 304.413889] ? dump_stack_print_info.cold.1+0x20/0x20 [ 304.413908] ? __x64_sys_mount+0xbe/0x150 [ 304.413932] ? do_syscall_64+0x1b9/0x820 [ 304.413951] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.431072] should_fail.cold.4+0xa/0x17 [ 304.431093] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 304.431120] ? check_preemption_disabled+0x48/0x280 [ 304.450655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.456204] ? check_preemption_disabled+0x48/0x280 [ 304.456228] ? find_held_lock+0x36/0x1c0 [ 304.456263] ? perf_trace_sched_process_exec+0x860/0x860 [ 304.456281] ? rcu_pm_notify+0xc0/0xc0 [ 304.456302] __should_failslab+0x124/0x180 [ 304.478913] should_failslab+0x9/0x14 [ 304.478945] __kmalloc_track_caller+0x2d5/0x750 [ 304.478961] ? vfs_parse_fs_string+0x1fd/0x2b0 [ 304.478994] ? legacy_parse_monolithic+0xde/0x1e0 [ 304.492010] kmemdup+0x24/0x50 [ 304.492027] legacy_parse_monolithic+0xde/0x1e0 [ 304.492040] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 304.492055] do_mount+0x803/0x1ff0 [ 304.492072] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 304.509509] ? copy_mount_string+0x40/0x40 [ 304.509527] ? copy_mount_options+0x5f/0x430 [ 304.509543] ? kmem_cache_alloc_trace+0x356/0x740 [ 304.522861] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 304.522883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.522912] ? copy_mount_options+0x315/0x430 [ 304.522929] ksys_mount+0x12d/0x140 [ 304.522944] __x64_sys_mount+0xbe/0x150 [ 304.543228] do_syscall_64+0x1b9/0x820 [ 304.543243] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 304.543259] ? syscall_return_slowpath+0x5e0/0x5e0 [ 304.543273] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.543290] ? trace_hardirqs_on_caller+0x310/0x310 [ 304.564601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.564616] ? prepare_exit_to_usermode+0x291/0x3b0 [ 304.564642] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.564662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.564673] RIP: 0033:0x45a0ea [ 304.564686] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 304.564693] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 304.564705] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 304.564713] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 304.564721] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 304.564732] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 304.579519] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 304.634439] XFS (loop2): Invalid superblock magic number 14:50:02 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:02 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 14:50:02 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="ff0700e134ac091393d9f15127b492b9143ffc33c0bf9adc99643cc0865907d25b26ca47c697b52e"], 0x28) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000240)) getresgid(&(0x7f0000000740), 0x0, &(0x7f00000007c0)=0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000100)='cgroup.subtree_control\x00') fstat(0xffffffffffffffff, 0x0) pause() getgroups(0x3, &(0x7f00000000c0)=[r2, 0x0, 0x0]) mkdir(0x0, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x2) 14:50:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfsB', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 305.616115] FAULT_INJECTION: forcing a failure. [ 305.616115] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 305.684701] CPU: 1 PID: 12370 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 305.693309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.702673] Call Trace: [ 305.705288] dump_stack+0x244/0x39d [ 305.708946] ? dump_stack_print_info.cold.1+0x20/0x20 [ 305.714174] should_fail.cold.4+0xa/0x17 [ 305.718262] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 305.723401] ? kasan_check_read+0x11/0x20 [ 305.727569] ? graph_lock+0x270/0x270 [ 305.731404] ? rcu_read_unlock_special+0x370/0x370 [ 305.736351] ? rcu_softirq_qs+0x20/0x20 [ 305.740384] ? unwind_dump+0x190/0x190 [ 305.744303] ? find_held_lock+0x36/0x1c0 [ 305.748423] ? lock_release+0xa00/0xa00 [ 305.752437] ? perf_trace_sched_process_exec+0x860/0x860 [ 305.757903] ? save_stack+0xa9/0xd0 [ 305.761556] ? __might_sleep+0x95/0x190 [ 305.765557] __alloc_pages_nodemask+0x366/0xec0 [ 305.770255] ? __alloc_pages_slowpath+0x2e00/0x2e00 [ 305.775286] ? cache_grow_end+0xa8/0x190 [ 305.779383] ? lock_downgrade+0x900/0x900 [ 305.783573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.789144] ? check_preemption_disabled+0x48/0x280 [ 305.794187] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 305.799748] ? rcu_pm_notify+0xc0/0xc0 [ 305.803665] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 305.809229] alloc_pages_current+0x173/0x350 [ 305.813660] get_zeroed_page+0x14/0x50 [ 305.817565] legacy_validate+0x133/0x220 [ 305.821640] ? logfc+0x770/0x770 [ 305.825024] vfs_get_tree+0x144/0x5c0 [ 305.828843] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 305.833615] do_mount+0x82a/0x1ff0 [ 305.837187] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 305.842748] ? copy_mount_string+0x40/0x40 [ 305.847009] ? copy_mount_options+0x5f/0x430 [ 305.851440] ? kmem_cache_alloc_trace+0x356/0x740 [ 305.856316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.861870] ? copy_mount_options+0x315/0x430 [ 305.866406] ksys_mount+0x12d/0x140 [ 305.870054] __x64_sys_mount+0xbe/0x150 [ 305.874054] do_syscall_64+0x1b9/0x820 [ 305.878063] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 305.883451] ? syscall_return_slowpath+0x5e0/0x5e0 [ 305.888416] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.893277] ? trace_hardirqs_on_caller+0x310/0x310 [ 305.898312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.903868] ? prepare_exit_to_usermode+0x291/0x3b0 [ 305.908920] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.913785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.918989] RIP: 0033:0x45a0ea 14:50:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) sendto$inet(r0, &(0x7f0000000040)="cc", 0x1, 0x1, 0x0, 0x0) 14:50:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 305.922198] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 305.941117] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 305.948844] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 305.956132] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 305.963416] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 305.970697] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 305.978024] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:50:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7}, 0x48) 14:50:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x700000000000000, &(0x7f00000002c0)={0x1, 0x14, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0xc]}, 0x2c) 14:50:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="786673f9", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) [ 306.427512] audit: type=1804 audit(1544626203.796:35): pid=12381 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir365360036/syzkaller.7BLKcK/218/file0/file0" dev="sda1" ino=17031 res=1 [ 306.473843] audit: type=1804 audit(1544626203.836:36): pid=12382 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir365360036/syzkaller.7BLKcK/218/file0/file0" dev="sda1" ino=17031 res=1 14:50:05 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7}, 0x48) 14:50:05 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 308.656354] FAULT_INJECTION: forcing a failure. [ 308.656354] name failslab, interval 1, probability 0, space 0, times 0 [ 308.668144] CPU: 0 PID: 12405 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 308.676738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.686102] Call Trace: [ 308.688719] dump_stack+0x244/0x39d [ 308.692398] ? dump_stack_print_info.cold.1+0x20/0x20 [ 308.697618] ? mark_held_locks+0x130/0x130 [ 308.701891] should_fail.cold.4+0xa/0x17 [ 308.705975] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 308.711094] ? print_usage_bug+0xc0/0xc0 [ 308.715173] ? lock_release+0xa00/0xa00 [ 308.719166] ? perf_trace_sched_process_exec+0x860/0x860 [ 308.724647] ? graph_lock+0x270/0x270 [ 308.728467] ? mark_held_locks+0x130/0x130 [ 308.732727] ? find_held_lock+0x36/0x1c0 [ 308.736811] ? __lock_is_held+0xb5/0x140 [ 308.740884] ? ovl_get_inode+0xbf8/0xd9b [ 308.744979] ? perf_trace_sched_process_exec+0x860/0x860 [ 308.750445] ? graph_lock+0x270/0x270 [ 308.754339] __should_failslab+0x124/0x180 [ 308.758617] should_failslab+0x9/0x14 [ 308.762449] kmem_cache_alloc_trace+0x2db/0x740 [ 308.767132] ? lock_release+0xa00/0xa00 [ 308.771121] ? perf_trace_sched_process_exec+0x860/0x860 [ 308.776595] alloc_super+0xd4/0xb40 [ 308.780253] ? destroy_unused_super.part.10+0x110/0x110 [ 308.785638] ? sget_userns+0x17c/0x850 [ 308.789547] ? lock_downgrade+0x900/0x900 [ 308.793720] ? kasan_check_read+0x11/0x20 [ 308.797883] ? do_raw_spin_unlock+0xa7/0x330 [ 308.802308] ? do_raw_spin_trylock+0x270/0x270 [ 308.806912] ? security_capable+0x99/0xc0 [ 308.811087] sget_userns+0x278/0x850 [ 308.814820] ? kill_litter_super+0x60/0x60 [ 308.819072] ? test_single_super+0x10/0x10 [ 308.823428] ? vfs_get_super+0x270/0x270 [ 308.827513] ? kasan_check_read+0x11/0x20 [ 308.831682] ? do_raw_spin_trylock+0x270/0x270 [ 308.836293] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 308.841874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.847444] ? ns_capable_common+0x13f/0x170 [ 308.851873] ? kill_litter_super+0x60/0x60 [ 308.856122] sget+0x10b/0x150 [ 308.859245] ? test_single_super+0x10/0x10 [ 308.863498] mount_bdev+0x115/0x3e0 [ 308.867141] ? jfs_destroy_inode+0x310/0x310 [ 308.871575] jfs_do_mount+0x3c/0x50 [ 308.875222] ? jfs_get_dquots+0x20/0x20 [ 308.879216] legacy_get_tree+0x12f/0x260 [ 308.883295] ? security_fs_context_validate+0x80/0xa0 [ 308.888506] vfs_get_tree+0x1cb/0x5c0 [ 308.892322] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 308.897097] do_mount+0x82a/0x1ff0 [ 308.900662] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 308.906224] ? copy_mount_string+0x40/0x40 [ 308.910489] ? copy_mount_options+0x5f/0x430 [ 308.914918] ? kmem_cache_alloc_trace+0x356/0x740 [ 308.919782] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 308.925339] ? _copy_from_user+0xdf/0x150 [ 308.929534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.935089] ? copy_mount_options+0x315/0x430 [ 308.939604] ksys_mount+0x12d/0x140 [ 308.943258] __x64_sys_mount+0xbe/0x150 [ 308.947255] do_syscall_64+0x1b9/0x820 [ 308.951162] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 308.956550] ? syscall_return_slowpath+0x5e0/0x5e0 [ 308.961616] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.966488] ? trace_hardirqs_on_caller+0x310/0x310 [ 308.971531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.977087] ? prepare_exit_to_usermode+0x291/0x3b0 [ 308.982127] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.986998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.992200] RIP: 0033:0x45a0ea [ 308.995428] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 309.014345] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 309.022088] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 309.029385] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 309.036673] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 309.043952] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 309.051237] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:50:06 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000340)="06", 0x1) 14:50:06 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200)=0xffffff19, 0x80800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) r3 = syz_open_procfs(r2, &(0x7f0000000080)='net/sockstat6\x00') ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f00000000c0)={0x9, 0x7f, 0x3}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) ptrace$getenv(0x4201, 0x0, 0x9, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000004c0)={0x200, 0x0, 0x0, 0x0, 0x1000}, 0xc) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000580)='net/sockstat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f00000003c0)={{}, 0x0, 0x0, 0x0, {0x671}, 0x0, 0x5}) geteuid() 14:50:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="786673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7}, 0x48) 14:50:06 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:06 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:06 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) dup3(r1, r2, 0x0) [ 309.179691] block nbd0: shutting down sockets [ 309.213859] block nbd0: shutting down sockets 14:50:06 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) [ 309.312558] FAULT_INJECTION: forcing a failure. [ 309.312558] name failslab, interval 1, probability 0, space 0, times 0 [ 309.336400] CPU: 0 PID: 12430 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 309.345120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.354487] Call Trace: [ 309.357105] dump_stack+0x244/0x39d [ 309.360816] ? dump_stack_print_info.cold.1+0x20/0x20 [ 309.366047] should_fail.cold.4+0xa/0x17 [ 309.370139] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 309.375331] ? graph_lock+0x270/0x270 [ 309.379175] ? save_stack+0xa9/0xd0 [ 309.382821] ? save_stack+0x43/0xd0 [ 309.386521] ? kasan_kmalloc+0xcb/0xd0 [ 309.390427] ? __kmalloc+0x15d/0x760 [ 309.394166] ? find_held_lock+0x36/0x1c0 [ 309.398249] ? __lock_is_held+0xb5/0x140 [ 309.402326] ? xen_snd_front_evtchnl_flush+0x68/0x1b0 [ 309.407602] ? perf_trace_sched_process_exec+0x860/0x860 [ 309.413080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.418644] ? check_preemption_disabled+0x48/0x280 [ 309.423691] __should_failslab+0x124/0x180 [ 309.427945] should_failslab+0x9/0x14 [ 309.431765] kmem_cache_alloc_node_trace+0x277/0x740 [ 309.436901] __kmalloc_node+0x3c/0x70 [ 309.440725] kvmalloc_node+0x65/0xf0 [ 309.444463] __list_lru_init+0x5d9/0x840 [ 309.448550] ? list_lru_destroy+0x500/0x500 [ 309.452896] ? up_write+0x7b/0x220 [ 309.456542] ? down_write_nested+0x130/0x130 [ 309.460972] ? down_read+0x120/0x120 [ 309.464710] ? init_wait_entry+0x1c0/0x1c0 [ 309.468966] ? prealloc_shrinker+0x172/0x340 [ 309.473417] alloc_super+0x907/0xb40 [ 309.477156] ? destroy_unused_super.part.10+0x110/0x110 [ 309.482546] ? sget_userns+0x17c/0x850 [ 309.486454] ? lock_downgrade+0x900/0x900 [ 309.490640] ? kasan_check_read+0x11/0x20 [ 309.494809] ? do_raw_spin_trylock+0x270/0x270 [ 309.499431] ? security_capable+0x99/0xc0 [ 309.503611] sget_userns+0x278/0x850 [ 309.507354] ? kill_litter_super+0x60/0x60 [ 309.511639] ? test_single_super+0x10/0x10 [ 309.515888] ? vfs_get_super+0x270/0x270 [ 309.519964] ? kasan_check_read+0x11/0x20 [ 309.524127] ? do_raw_spin_trylock+0x270/0x270 [ 309.528728] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 309.534300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.539847] ? ns_capable_common+0x13f/0x170 [ 309.544266] ? kill_litter_super+0x60/0x60 [ 309.548508] sget+0x10b/0x150 [ 309.551631] ? test_single_super+0x10/0x10 [ 309.555878] mount_bdev+0x115/0x3e0 [ 309.559516] ? jfs_destroy_inode+0x310/0x310 [ 309.563943] jfs_do_mount+0x3c/0x50 [ 309.567579] ? jfs_get_dquots+0x20/0x20 [ 309.571560] legacy_get_tree+0x12f/0x260 [ 309.575636] ? security_fs_context_validate+0x80/0xa0 [ 309.580840] vfs_get_tree+0x1cb/0x5c0 [ 309.584657] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 309.589429] do_mount+0x82a/0x1ff0 [ 309.592982] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 309.598533] ? copy_mount_string+0x40/0x40 [ 309.602781] ? copy_mount_options+0x5f/0x430 [ 309.607205] ? kmem_cache_alloc_trace+0x356/0x740 [ 309.612064] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 309.617613] ? _copy_from_user+0xdf/0x150 [ 309.621779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.627329] ? copy_mount_options+0x315/0x430 [ 309.631838] ksys_mount+0x12d/0x140 [ 309.635478] __x64_sys_mount+0xbe/0x150 [ 309.639473] do_syscall_64+0x1b9/0x820 [ 309.643387] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 309.648767] ? syscall_return_slowpath+0x5e0/0x5e0 [ 309.653705] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.658559] ? trace_hardirqs_on_caller+0x310/0x310 [ 309.663591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.669147] ? prepare_exit_to_usermode+0x291/0x3b0 [ 309.674183] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.679043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.684240] RIP: 0033:0x45a0ea [ 309.687445] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 309.706356] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:50:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x2, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x20) [ 309.714095] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 309.721386] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 309.728666] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 309.735944] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 309.743223] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 309.813824] block nbd0: shutting down sockets 14:50:09 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080)=0xe67, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740), 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7dc, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x8007) 14:50:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:09 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:09 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 311.704883] FAULT_INJECTION: forcing a failure. [ 311.704883] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 311.716763] CPU: 1 PID: 12446 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 311.725493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.734853] Call Trace: [ 311.737454] dump_stack+0x244/0x39d [ 311.741085] ? dump_stack_print_info.cold.1+0x20/0x20 [ 311.746305] ? graph_lock+0x270/0x270 [ 311.750113] should_fail.cold.4+0xa/0x17 [ 311.754178] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 311.759284] ? find_held_lock+0x36/0x1c0 [ 311.763377] ? mark_held_locks+0x130/0x130 [ 311.767629] ? graph_lock+0x270/0x270 [ 311.771447] ? kasan_check_read+0x11/0x20 [ 311.775607] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 311.780886] ? find_held_lock+0x36/0x1c0 [ 311.784971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.790510] ? should_fail+0x22d/0xd01 [ 311.794402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.799939] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 311.805058] __alloc_pages_nodemask+0x366/0xec0 [ 311.809727] ? rcu_read_unlock_special+0x370/0x370 [ 311.814661] ? __alloc_pages_slowpath+0x2e00/0x2e00 [ 311.819685] ? find_held_lock+0x36/0x1c0 [ 311.823765] ? snd_pcm_status+0x268/0x1640 [ 311.828027] ? trace_hardirqs_off+0xb8/0x310 [ 311.832457] cache_grow_begin+0xa5/0x8c0 [ 311.836524] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 311.842068] ? check_preemption_disabled+0x48/0x280 [ 311.847090] kmem_cache_alloc+0x66a/0x730 [ 311.851257] getname_kernel+0x54/0x370 [ 311.855154] kern_path+0x1e/0x40 [ 311.858525] lookup_bdev+0x10c/0x250 [ 311.862274] ? blkdev_open+0x280/0x280 [ 311.866171] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 311.871762] ? rcu_pm_notify+0xc0/0xc0 [ 311.875673] blkdev_get_by_path+0x1f/0xe0 [ 311.879848] mount_bdev+0x61/0x3e0 [ 311.883411] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 311.888950] ? jfs_destroy_inode+0x310/0x310 [ 311.893448] jfs_do_mount+0x3c/0x50 [ 311.897137] ? jfs_get_dquots+0x20/0x20 [ 311.901167] legacy_get_tree+0x12f/0x260 [ 311.905266] ? security_fs_context_validate+0x80/0xa0 [ 311.910463] vfs_get_tree+0x1cb/0x5c0 [ 311.914268] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 311.919027] do_mount+0x82a/0x1ff0 [ 311.922568] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 311.928111] ? copy_mount_string+0x40/0x40 [ 311.932364] ? copy_mount_options+0x5f/0x430 [ 311.936817] ? kmem_cache_alloc_trace+0x356/0x740 [ 311.941665] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 311.947203] ? _copy_from_user+0xdf/0x150 [ 311.951361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.956907] ? copy_mount_options+0x315/0x430 [ 311.961413] ksys_mount+0x12d/0x140 [ 311.965055] __x64_sys_mount+0xbe/0x150 [ 311.969047] do_syscall_64+0x1b9/0x820 [ 311.972955] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 311.978336] ? syscall_return_slowpath+0x5e0/0x5e0 [ 311.983292] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.988147] ? trace_hardirqs_on_caller+0x310/0x310 [ 311.993186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.998756] ? prepare_exit_to_usermode+0x291/0x3b0 [ 312.003781] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.008633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.013835] RIP: 0033:0x45a0ea [ 312.017046] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 312.035961] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 312.043679] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 312.050995] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 312.058264] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 312.065531] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 312.072838] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 312.096095] block nbd0: shutting down sockets 14:50:09 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x880, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x3eec) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) 14:50:09 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 312.150579] XFS (loop4): Invalid superblock magic number [ 312.156470] XFS (loop2): Invalid superblock magic number 14:50:09 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:09 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200000, 0x0) setsockopt$packet_int(r2, 0x107, 0x1b, &(0x7f0000000040)=0x3, 0x4) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000200)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000010}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYRESOCT=r0, @ANYRES16=r3, @ANYRESHEX=r3], 0x3}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:50:09 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:09 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 312.285935] block nbd0: shutting down sockets 14:50:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@tipc=@id, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/83, 0x53}, {&(0x7f0000000180)=""/194, 0xc2}, {&(0x7f0000000280)=""/253, 0xfd}, {&(0x7f0000000400)=""/148, 0x94}], 0x4}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:50:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:09 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) socket(0x10, 0x800, 0x8) prctl$PR_GET_SECUREBITS(0x1b) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) 14:50:09 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) dup3(r1, r2, 0x0) 14:50:09 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r0 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, 0x0) [ 312.383901] FAULT_INJECTION: forcing a failure. [ 312.383901] name failslab, interval 1, probability 0, space 0, times 0 [ 312.421527] CPU: 1 PID: 12488 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 312.430156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.439549] Call Trace: [ 312.442140] dump_stack+0x244/0x39d [ 312.445821] ? dump_stack_print_info.cold.1+0x20/0x20 [ 312.451042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.456612] should_fail.cold.4+0xa/0x17 [ 312.460674] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.465783] ? graph_lock+0x270/0x270 [ 312.469584] ? find_held_lock+0x36/0x1c0 [ 312.473648] ? __lock_is_held+0xb5/0x140 [ 312.477735] ? acpi_tb_checksum+0x18/0x78 [ 312.481915] ? __lockdep_init_map+0x105/0x590 [ 312.486422] ? perf_trace_sched_process_exec+0x860/0x860 [ 312.491898] ? lockdep_init_map+0x9/0x10 [ 312.495960] __should_failslab+0x124/0x180 [ 312.500231] should_failslab+0x9/0x14 [ 312.504028] __kmalloc+0x2e4/0x760 [ 312.507587] ? __init_waitqueue_head+0x9e/0x150 [ 312.512250] ? init_wait_entry+0x1c0/0x1c0 [ 312.516480] ? prealloc_shrinker+0x172/0x340 [ 312.520914] prealloc_shrinker+0x172/0x340 [ 312.525162] alloc_super+0x8db/0xb40 [ 312.528932] ? destroy_unused_super.part.10+0x110/0x110 [ 312.534300] ? sget_userns+0x17c/0x850 [ 312.538210] ? lock_downgrade+0x900/0x900 [ 312.542382] ? kasan_check_read+0x11/0x20 [ 312.546539] ? do_raw_spin_trylock+0x270/0x270 [ 312.551115] ? security_capable+0x99/0xc0 [ 312.555268] sget_userns+0x278/0x850 [ 312.558972] ? kill_litter_super+0x60/0x60 [ 312.563198] ? test_single_super+0x10/0x10 [ 312.567425] ? vfs_get_super+0x270/0x270 [ 312.571503] ? kasan_check_read+0x11/0x20 [ 312.575658] ? do_raw_spin_trylock+0x270/0x270 [ 312.580268] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 312.585818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.591345] ? ns_capable_common+0x13f/0x170 [ 312.595776] ? kill_litter_super+0x60/0x60 [ 312.600017] sget+0x10b/0x150 [ 312.603144] ? test_single_super+0x10/0x10 [ 312.607397] mount_bdev+0x115/0x3e0 [ 312.611016] ? jfs_destroy_inode+0x310/0x310 [ 312.615468] jfs_do_mount+0x3c/0x50 [ 312.619089] ? jfs_get_dquots+0x20/0x20 [ 312.623055] legacy_get_tree+0x12f/0x260 [ 312.627109] ? security_fs_context_validate+0x80/0xa0 [ 312.632299] vfs_get_tree+0x1cb/0x5c0 [ 312.636098] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 312.640869] do_mount+0x82a/0x1ff0 [ 312.644407] ? copy_mount_string+0x40/0x40 [ 312.648642] ? retint_kernel+0x2d/0x2d [ 312.652543] ? copy_mount_options+0x239/0x430 [ 312.657029] ? copy_mount_options+0x249/0x430 [ 312.661530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.667085] ? copy_mount_options+0x315/0x430 [ 312.671575] ksys_mount+0x12d/0x140 [ 312.675194] __x64_sys_mount+0xbe/0x150 [ 312.679199] do_syscall_64+0x1b9/0x820 [ 312.683144] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 312.688507] ? syscall_return_slowpath+0x5e0/0x5e0 [ 312.693461] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.698298] ? trace_hardirqs_on_caller+0x310/0x310 [ 312.703322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.708930] ? prepare_exit_to_usermode+0x291/0x3b0 [ 312.713948] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.718789] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.723966] RIP: 0033:0x45a0ea [ 312.727151] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 312.746040] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 312.753756] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 312.761017] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 312.768276] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 312.775535] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:50:10 executing program 3: socketpair$unix(0x1, 0x800001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x5eb857) r3 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}], 0x1ee, 0x0) sendmmsg(r4, &(0x7f0000000c00), 0x4000000000001e6, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101800, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffb000/0x4000)=nil) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000100)=0x80000001) renameat2(r5, &(0x7f0000000180)='./file0\x00', r5, &(0x7f00000001c0)='./file0\x00', 0x2) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x2000000000000000, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r6, 0xc00c55ca) setsockopt(r5, 0x5, 0x100, &(0x7f0000000000)="daa8ad8144917cc5f35f399eb31ccb7d6e839181b0792c6a86cae664683eee3004611d73", 0x13) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x6) 14:50:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@tipc=@id, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/83, 0x53}, {&(0x7f0000000180)=""/194, 0xc2}, {&(0x7f0000000280)=""/253, 0xfd}, {&(0x7f0000000400)=""/148, 0x94}], 0x4}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 312.782805] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:50:10 executing program 5: r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:10 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) dup3(r1, r2, 0x0) 14:50:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) write$binfmt_aout(r0, &(0x7f0000000400)={{0x10b, 0x8, 0x4, 0xcd, 0x3b7, 0xd1c, 0x31b, 0x6}, "4a75f8e677c596c3404586cc3b30ab0694dc0ea03626836fcac01eb365ee9e7844f71be81ecd84382d449e740ef4a5358e2c941ab8e2e2a780f2f4d4643c922a8b8287fac50fc39d6ffec0657dd4481d39c2bf51e047685c85d39624f6b02a988882d11cfd4f1e3e66b019132977b6f3e7aec513ab3e36b5b760b34c49fe586b9b79643aec47ef33390b10ffa44abcf7a81bb8c7088592ac657ca79cd0c049b0e72e7c7066b1bf93c871e95a4c6a111d51f61186ea53fcc1e31a1e886f2d47e187efcd3efda9", [[], [], [], [], [], [], [], []]}, 0x8e6) 14:50:10 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 312.924730] XFS (loop2): Invalid superblock magic number 14:50:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 313.009798] FAULT_INJECTION: forcing a failure. [ 313.009798] name failslab, interval 1, probability 0, space 0, times 0 [ 313.030764] CPU: 1 PID: 12534 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 313.039347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.048708] Call Trace: [ 313.051306] dump_stack+0x244/0x39d [ 313.054978] ? dump_stack_print_info.cold.1+0x20/0x20 [ 313.060193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.065737] should_fail.cold.4+0xa/0x17 [ 313.069804] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 313.074919] ? graph_lock+0x270/0x270 [ 313.078745] ? find_held_lock+0x36/0x1c0 [ 313.082826] ? __lock_is_held+0xb5/0x140 [ 313.086898] ? __lockdep_init_map+0x105/0x590 [ 313.091398] ? perf_trace_sched_process_exec+0x860/0x860 [ 313.096899] ? lockdep_init_map+0x9/0x10 [ 313.100964] __should_failslab+0x124/0x180 [ 313.105216] should_failslab+0x9/0x14 [ 313.109045] __kmalloc+0x2e4/0x760 [ 313.112598] ? __init_waitqueue_head+0x9e/0x150 [ 313.117278] ? init_wait_entry+0x1c0/0x1c0 [ 313.121515] ? prealloc_shrinker+0x172/0x340 [ 313.125954] prealloc_shrinker+0x172/0x340 [ 313.130211] alloc_super+0x8db/0xb40 [ 313.133931] ? destroy_unused_super.part.10+0x110/0x110 [ 313.139292] ? sget_userns+0x17c/0x850 [ 313.143202] ? lock_downgrade+0x900/0x900 [ 313.147396] ? kasan_check_read+0x11/0x20 [ 313.151557] ? do_raw_spin_trylock+0x270/0x270 [ 313.156181] ? security_capable+0x99/0xc0 [ 313.160337] sget_userns+0x278/0x850 [ 313.164084] ? kill_litter_super+0x60/0x60 [ 313.168322] ? test_single_super+0x10/0x10 [ 313.172554] ? vfs_get_super+0x270/0x270 [ 313.176644] ? kasan_check_read+0x11/0x20 [ 313.180834] ? do_raw_spin_trylock+0x270/0x270 [ 313.185434] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 313.191039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.196576] ? ns_capable_common+0x13f/0x170 [ 313.200981] ? kill_litter_super+0x60/0x60 [ 313.205228] sget+0x10b/0x150 [ 313.208333] ? test_single_super+0x10/0x10 [ 313.212591] mount_bdev+0x115/0x3e0 [ 313.216221] ? jfs_destroy_inode+0x310/0x310 [ 313.220654] jfs_do_mount+0x3c/0x50 [ 313.224281] ? jfs_get_dquots+0x20/0x20 [ 313.228252] legacy_get_tree+0x12f/0x260 [ 313.232309] ? security_fs_context_validate+0x80/0xa0 [ 313.237511] vfs_get_tree+0x1cb/0x5c0 [ 313.241333] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 313.246097] do_mount+0x82a/0x1ff0 [ 313.249646] ? copy_mount_string+0x40/0x40 [ 313.253887] ? retint_kernel+0x2d/0x2d [ 313.257782] ? copy_mount_options+0x257/0x430 [ 313.262300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.267831] ? copy_mount_options+0x315/0x430 [ 313.272354] ksys_mount+0x12d/0x140 [ 313.275987] __x64_sys_mount+0xbe/0x150 [ 313.279990] do_syscall_64+0x1b9/0x820 [ 313.283877] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 313.289262] ? syscall_return_slowpath+0x5e0/0x5e0 [ 313.294190] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.299030] ? trace_hardirqs_on_caller+0x310/0x310 [ 313.304060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.309628] ? prepare_exit_to_usermode+0x291/0x3b0 [ 313.314648] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.319509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.324690] RIP: 0033:0x45a0ea [ 313.327893] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 313.346788] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:50:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 313.354506] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 313.361807] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 313.369077] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 313.376364] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 313.383666] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:50:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:10 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) dup3(r1, r2, 0x0) 14:50:10 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) bind$alg(r1, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) [ 313.549159] FAULT_INJECTION: forcing a failure. [ 313.549159] name failslab, interval 1, probability 0, space 0, times 0 [ 313.578393] XFS (loop2): Invalid superblock magic number [ 313.582825] CPU: 0 PID: 12555 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 313.592464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.601831] Call Trace: [ 313.604429] dump_stack+0x244/0x39d [ 313.608135] ? dump_stack_print_info.cold.1+0x20/0x20 [ 313.613360] ? __kernel_text_address+0xd/0x40 [ 313.613385] ? unwind_get_return_address+0x61/0xa0 [ 313.613405] should_fail.cold.4+0xa/0x17 [ 313.613425] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 313.622841] ? save_stack+0x43/0xd0 [ 313.622854] ? kasan_kmalloc+0xcb/0xd0 [ 313.622881] ? kmem_cache_alloc_trace+0x154/0x740 [ 313.622894] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 313.622908] ? __list_lru_init+0x4d6/0x840 [ 313.653847] ? graph_lock+0x270/0x270 [ 313.657665] ? mount_bdev+0x115/0x3e0 [ 313.661467] ? jfs_do_mount+0x3c/0x50 [ 313.665270] ? legacy_get_tree+0x12f/0x260 [ 313.669506] ? vfs_get_tree+0x1cb/0x5c0 [ 313.673480] ? do_mount+0x82a/0x1ff0 [ 313.677189] ? ksys_mount+0x12d/0x140 [ 313.680998] ? __x64_sys_mount+0xbe/0x150 [ 313.685166] ? find_held_lock+0x36/0x1c0 [ 313.689231] ? __lock_is_held+0xb5/0x140 [ 313.693378] ? perf_trace_sched_process_exec+0x860/0x860 [ 313.698882] __should_failslab+0x124/0x180 [ 313.703120] should_failslab+0x9/0x14 [ 313.706923] kmem_cache_alloc_trace+0x2db/0x740 [ 313.711591] ? __kmalloc_node+0x3c/0x70 [ 313.715563] ? rcu_read_lock_sched_held+0x14f/0x180 [ 313.720593] __memcg_init_list_lru_node+0x185/0x2d0 [ 313.725622] ? kvfree_rcu+0x20/0x20 [ 313.729264] ? __kmalloc_node+0x4d/0x70 [ 313.733260] __list_lru_init+0x4d6/0x840 [ 313.737335] ? list_lru_destroy+0x500/0x500 [ 313.741665] ? up_write+0x7b/0x220 [ 313.745241] ? down_write_nested+0x130/0x130 [ 313.749651] ? down_read+0x120/0x120 [ 313.753373] ? init_wait_entry+0x1c0/0x1c0 [ 313.757619] ? prealloc_shrinker+0x172/0x340 [ 313.762054] alloc_super+0x907/0xb40 [ 313.765773] ? destroy_unused_super.part.10+0x110/0x110 [ 313.771128] ? sget_userns+0x17c/0x850 [ 313.775015] ? lock_downgrade+0x900/0x900 [ 313.779204] ? kasan_check_read+0x11/0x20 [ 313.783378] ? do_raw_spin_trylock+0x270/0x270 [ 313.787961] ? security_capable+0x99/0xc0 [ 313.792109] sget_userns+0x278/0x850 [ 313.795831] ? kill_litter_super+0x60/0x60 [ 313.800084] ? test_single_super+0x10/0x10 [ 313.804343] ? vfs_get_super+0x270/0x270 [ 313.808415] ? kasan_check_read+0x11/0x20 [ 313.812595] ? do_raw_spin_trylock+0x270/0x270 [ 313.817188] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 313.822745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.828282] ? ns_capable_common+0x13f/0x170 [ 313.832690] ? kill_litter_super+0x60/0x60 [ 313.836925] sget+0x10b/0x150 [ 313.840040] ? test_single_super+0x10/0x10 [ 313.844272] mount_bdev+0x115/0x3e0 [ 313.847902] ? jfs_destroy_inode+0x310/0x310 [ 313.852334] jfs_do_mount+0x3c/0x50 [ 313.855968] ? jfs_get_dquots+0x20/0x20 [ 313.860008] legacy_get_tree+0x12f/0x260 [ 313.864088] ? security_fs_context_validate+0x80/0xa0 [ 313.869281] vfs_get_tree+0x1cb/0x5c0 [ 313.873117] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 313.877873] do_mount+0x82a/0x1ff0 [ 313.881443] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 313.887009] ? copy_mount_string+0x40/0x40 [ 313.891243] ? copy_mount_options+0x5f/0x430 [ 313.895668] ? kmem_cache_alloc_trace+0x356/0x740 [ 313.900511] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 313.906092] ? _copy_from_user+0xdf/0x150 [ 313.910267] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.915808] ? copy_mount_options+0x315/0x430 [ 313.920313] ksys_mount+0x12d/0x140 [ 313.923944] __x64_sys_mount+0xbe/0x150 [ 313.927929] do_syscall_64+0x1b9/0x820 [ 313.931831] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 313.937209] ? syscall_return_slowpath+0x5e0/0x5e0 [ 313.942154] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.947004] ? trace_hardirqs_on_caller+0x310/0x310 [ 313.952048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.957587] ? prepare_exit_to_usermode+0x291/0x3b0 [ 313.962643] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.967492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.972698] RIP: 0033:0x45a0ea [ 313.975906] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 14:50:11 executing program 3: socketpair$unix(0x1, 0x800001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x5eb857) r3 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}], 0x1ee, 0x0) sendmmsg(r4, &(0x7f0000000c00), 0x4000000000001e6, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101800, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffb000/0x4000)=nil) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000100)=0x80000001) renameat2(r5, &(0x7f0000000180)='./file0\x00', r5, &(0x7f00000001c0)='./file0\x00', 0x2) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x2000000000000000, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r6, 0xc00c55ca) setsockopt(r5, 0x5, 0x100, &(0x7f0000000000)="daa8ad8144917cc5f35f399eb31ccb7d6e839181b0792c6a86cae664683eee3004611d73", 0x13) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x6) 14:50:11 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) dup3(r1, r2, 0x0) [ 313.994800] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 314.002758] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 314.010029] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 [ 314.017291] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 314.024555] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 314.031815] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 314.123928] XFS (loop2): Invalid superblock magic number 14:50:13 executing program 5: r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0xfffffd2a) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'os2.', 'salsa20-generic\x00'}, &(0x7f0000000180)=""/39, 0x27) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) 14:50:13 executing program 1 (fault-call:0 fault-nth:53): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:13 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r2) dup3(r1, 0xffffffffffffffff, 0x0) 14:50:13 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:13 executing program 3: socketpair$unix(0x1, 0x800001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x5eb857) r3 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000300)=[{{0x0, 0x0, 0x0}}], 0x1ee, 0x0) sendmmsg(r4, &(0x7f0000000c00), 0x4000000000001e6, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101800, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffb000/0x4000)=nil) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000100)=0x80000001) renameat2(r5, &(0x7f0000000180)='./file0\x00', r5, &(0x7f00000001c0)='./file0\x00', 0x2) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x2000000000000000, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_DEV_CREATE(r6, 0xc00c55ca) setsockopt(r5, 0x5, 0x100, &(0x7f0000000000)="daa8ad8144917cc5f35f399eb31ccb7d6e839181b0792c6a86cae664683eee3004611d73", 0x13) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x6) 14:50:13 executing program 4: r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 315.990661] FAULT_INJECTION: forcing a failure. [ 315.990661] name failslab, interval 1, probability 0, space 0, times 0 14:50:13 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) dup3(0xffffffffffffffff, r1, 0x0) 14:50:13 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 316.051727] XFS (loop2): Invalid superblock magic number [ 316.064307] CPU: 0 PID: 12588 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 316.072922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.082268] Call Trace: [ 316.084864] dump_stack+0x244/0x39d [ 316.088543] ? dump_stack_print_info.cold.1+0x20/0x20 [ 316.093739] ? __kernel_text_address+0xd/0x40 14:50:13 executing program 0: socket$inet6(0xa, 0x803, 0x7) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) dup3(r0, r1, 0x0) [ 316.098051] block nbd0: shutting down sockets [ 316.098234] ? unwind_get_return_address+0x61/0xa0 [ 316.098255] should_fail.cold.4+0xa/0x17 [ 316.098272] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.098297] ? save_stack+0x43/0xd0 [ 316.120471] ? kasan_kmalloc+0xcb/0xd0 [ 316.124405] ? kmem_cache_alloc_trace+0x154/0x740 [ 316.129267] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 316.134453] ? __list_lru_init+0x4d6/0x840 [ 316.138689] ? graph_lock+0x270/0x270 [ 316.142491] ? mount_bdev+0x115/0x3e0 [ 316.146294] ? jfs_do_mount+0x3c/0x50 14:50:13 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 316.150092] ? legacy_get_tree+0x12f/0x260 [ 316.154340] ? vfs_get_tree+0x1cb/0x5c0 [ 316.158336] ? do_mount+0x82a/0x1ff0 [ 316.162078] ? ksys_mount+0x12d/0x140 [ 316.165881] ? __x64_sys_mount+0xbe/0x150 [ 316.170037] ? find_held_lock+0x36/0x1c0 [ 316.174101] ? __lock_is_held+0xb5/0x140 [ 316.178173] ? perf_trace_sched_process_exec+0x860/0x860 [ 316.183672] __should_failslab+0x124/0x180 [ 316.187930] should_failslab+0x9/0x14 [ 316.191743] kmem_cache_alloc_trace+0x2db/0x740 [ 316.196408] ? __kmalloc_node+0x3c/0x70 [ 316.200378] ? rcu_read_lock_sched_held+0x14f/0x180 [ 316.205393] __memcg_init_list_lru_node+0x185/0x2d0 [ 316.210404] ? kvfree_rcu+0x20/0x20 [ 316.214022] ? __kmalloc_node+0x4d/0x70 [ 316.217989] __list_lru_init+0x4d6/0x840 [ 316.222060] ? list_lru_destroy+0x500/0x500 [ 316.226381] ? up_write+0x7b/0x220 [ 316.229925] ? down_write_nested+0x130/0x130 [ 316.234339] ? down_read+0x120/0x120 [ 316.238070] ? init_wait_entry+0x1c0/0x1c0 [ 316.242315] ? prealloc_shrinker+0x172/0x340 [ 316.246723] alloc_super+0x907/0xb40 [ 316.250448] ? destroy_unused_super.part.10+0x110/0x110 [ 316.255814] ? sget_userns+0x17c/0x850 [ 316.259696] ? lock_downgrade+0x900/0x900 [ 316.263858] ? kasan_check_read+0x11/0x20 [ 316.268012] ? do_raw_spin_trylock+0x270/0x270 [ 316.272597] ? security_capable+0x99/0xc0 [ 316.276744] sget_userns+0x278/0x850 [ 316.280448] ? kill_litter_super+0x60/0x60 [ 316.284674] ? test_single_super+0x10/0x10 [ 316.288918] ? vfs_get_super+0x270/0x270 [ 316.293012] ? kasan_check_read+0x11/0x20 [ 316.297201] ? do_raw_spin_trylock+0x270/0x270 [ 316.301787] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 316.307334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.312860] ? ns_capable_common+0x13f/0x170 [ 316.317260] ? kill_litter_super+0x60/0x60 [ 316.321502] sget+0x10b/0x150 [ 316.324636] ? test_single_super+0x10/0x10 [ 316.328898] mount_bdev+0x115/0x3e0 [ 316.332588] ? jfs_destroy_inode+0x310/0x310 [ 316.336992] jfs_do_mount+0x3c/0x50 [ 316.340647] ? jfs_get_dquots+0x20/0x20 [ 316.344623] legacy_get_tree+0x12f/0x260 [ 316.348679] ? security_fs_context_validate+0x80/0xa0 [ 316.353858] vfs_get_tree+0x1cb/0x5c0 [ 316.357654] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 316.362403] do_mount+0x82a/0x1ff0 [ 316.365933] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 316.371504] ? copy_mount_string+0x40/0x40 [ 316.375735] ? copy_mount_options+0x5f/0x430 [ 316.380132] ? kmem_cache_alloc_trace+0x356/0x740 [ 316.384978] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 316.390523] ? _copy_from_user+0xdf/0x150 [ 316.394697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.400236] ? copy_mount_options+0x315/0x430 [ 316.404741] ksys_mount+0x12d/0x140 [ 316.408399] __x64_sys_mount+0xbe/0x150 [ 316.412413] do_syscall_64+0x1b9/0x820 [ 316.416313] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 316.421686] ? syscall_return_slowpath+0x5e0/0x5e0 [ 316.426642] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.431480] ? trace_hardirqs_on_caller+0x310/0x310 [ 316.436503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.442039] ? prepare_exit_to_usermode+0x291/0x3b0 [ 316.447053] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.451924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.457119] RIP: 0033:0x45a0ea [ 316.460303] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 316.479209] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 316.486936] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 316.494195] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 14:50:13 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 316.501457] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 316.508738] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 316.516014] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 [ 316.533466] block nbd0: shutting down sockets 14:50:14 executing program 1 (fault-call:0 fault-nth:54): syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:14 executing program 4: r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:14 executing program 0: socket$inet6(0xa, 0x803, 0x7) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) dup3(r0, r1, 0x0) 14:50:14 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 316.693310] block nbd0: shutting down sockets [ 316.716489] FAULT_INJECTION: forcing a failure. [ 316.716489] name failslab, interval 1, probability 0, space 0, times 0 [ 316.742913] CPU: 1 PID: 12628 Comm: syz-executor1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 316.751515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.760864] Call Trace: [ 316.763471] dump_stack+0x244/0x39d [ 316.767120] ? dump_stack_print_info.cold.1+0x20/0x20 [ 316.772318] ? __kernel_text_address+0xd/0x40 [ 316.776814] ? unwind_get_return_address+0x61/0xa0 [ 316.781753] should_fail.cold.4+0xa/0x17 [ 316.785831] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.790977] ? save_stack+0x43/0xd0 [ 316.794621] ? kasan_kmalloc+0xcb/0xd0 [ 316.798504] ? kmem_cache_alloc_trace+0x154/0x740 [ 316.803362] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 316.808584] ? __list_lru_init+0x4d6/0x840 [ 316.812833] ? graph_lock+0x270/0x270 [ 316.816629] ? mount_bdev+0x115/0x3e0 [ 316.820428] ? jfs_do_mount+0x3c/0x50 [ 316.824239] ? legacy_get_tree+0x12f/0x260 [ 316.828512] ? vfs_get_tree+0x1cb/0x5c0 [ 316.832483] ? do_mount+0x82a/0x1ff0 [ 316.836190] ? ksys_mount+0x12d/0x140 [ 316.839986] ? __x64_sys_mount+0xbe/0x150 [ 316.844153] ? find_held_lock+0x36/0x1c0 [ 316.848248] ? __lock_is_held+0xb5/0x140 [ 316.852320] ? perf_trace_sched_process_exec+0x860/0x860 [ 316.857777] __should_failslab+0x124/0x180 [ 316.862027] should_failslab+0x9/0x14 [ 316.865823] kmem_cache_alloc_trace+0x2db/0x740 [ 316.870501] ? __kmalloc_node+0x3c/0x70 [ 316.874494] ? rcu_read_lock_sched_held+0x14f/0x180 [ 316.879516] __memcg_init_list_lru_node+0x185/0x2d0 [ 316.884564] ? kvfree_rcu+0x20/0x20 [ 316.888192] ? __kmalloc_node+0x4d/0x70 [ 316.892174] __list_lru_init+0x4d6/0x840 [ 316.896242] ? list_lru_destroy+0x500/0x500 [ 316.900583] ? up_write+0x7b/0x220 [ 316.904171] ? down_write_nested+0x130/0x130 [ 316.908574] ? down_read+0x120/0x120 [ 316.912303] ? init_wait_entry+0x1c0/0x1c0 [ 316.916562] ? prealloc_shrinker+0x172/0x340 [ 316.920990] alloc_super+0x907/0xb40 [ 316.924709] ? destroy_unused_super.part.10+0x110/0x110 [ 316.930072] ? sget_userns+0x17c/0x850 [ 316.933973] ? lock_downgrade+0x900/0x900 [ 316.938158] ? kasan_check_read+0x11/0x20 [ 316.942326] ? do_raw_spin_trylock+0x270/0x270 [ 316.946932] ? security_capable+0x99/0xc0 [ 316.951094] sget_userns+0x278/0x850 [ 316.954834] ? kill_litter_super+0x60/0x60 [ 316.959066] ? test_single_super+0x10/0x10 [ 316.963309] ? vfs_get_super+0x270/0x270 [ 316.967398] ? kasan_check_read+0x11/0x20 [ 316.971557] ? do_raw_spin_trylock+0x270/0x270 [ 316.976160] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 316.981719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.987300] ? ns_capable_common+0x13f/0x170 [ 316.991750] ? kill_litter_super+0x60/0x60 [ 316.995979] sget+0x10b/0x150 [ 316.999096] ? test_single_super+0x10/0x10 [ 317.003327] mount_bdev+0x115/0x3e0 [ 317.006953] ? jfs_destroy_inode+0x310/0x310 [ 317.011361] jfs_do_mount+0x3c/0x50 [ 317.015010] ? jfs_get_dquots+0x20/0x20 [ 317.018982] legacy_get_tree+0x12f/0x260 [ 317.023058] ? security_fs_context_validate+0x80/0xa0 [ 317.028249] vfs_get_tree+0x1cb/0x5c0 [ 317.032057] ? legacy_fs_context_dup+0x1d0/0x1d0 [ 317.036852] do_mount+0x82a/0x1ff0 [ 317.040399] ? copy_mount_string+0x40/0x40 [ 317.044661] ? retint_kernel+0x2d/0x2d [ 317.048589] ? copy_mount_options+0x228/0x430 [ 317.053112] ? copy_mount_options+0x234/0x430 [ 317.057614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.063150] ? copy_mount_options+0x315/0x430 [ 317.067681] ksys_mount+0x12d/0x140 [ 317.071323] __x64_sys_mount+0xbe/0x150 [ 317.075359] do_syscall_64+0x1b9/0x820 [ 317.079273] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 317.084636] ? syscall_return_slowpath+0x5e0/0x5e0 [ 317.089579] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.094440] ? trace_hardirqs_on_caller+0x310/0x310 [ 317.099474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.105008] ? prepare_exit_to_usermode+0x291/0x3b0 [ 317.110065] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.114937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.120120] RIP: 0033:0x45a0ea [ 317.123315] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 317.142229] RSP: 002b:00007fc04b0f0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 317.149951] RAX: ffffffffffffffda RBX: 00007fc04b0f0b30 RCX: 000000000045a0ea [ 317.157221] RDX: 00007fc04b0f0ad0 RSI: 0000000020000100 RDI: 00007fc04b0f0af0 14:50:14 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\b', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:14 executing program 3 (fault-call:0 fault-nth:0): bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:14 executing program 4: r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 317.164500] RBP: 0000000020000100 R08: 00007fc04b0f0b30 R09: 00007fc04b0f0ad0 [ 317.171793] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 317.179059] R13: 0000000000000000 R14: 00000000004d9b68 R15: 0000000000000003 14:50:14 executing program 0: socket$inet6(0xa, 0x803, 0x7) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) dup3(r0, r1, 0x0) 14:50:14 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 317.285398] block nbd0: shutting down sockets 14:50:14 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x210000) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f00000002c0)) accept$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10) 14:50:14 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:14 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:14 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) dup3(r0, r1, 0x0) 14:50:14 executing program 3: bpf$PROG_LOAD(0xd, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:14 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="78667302", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:14 executing program 4: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="130000001000ffdde200f49ff60f050000230a009d000000110ac53022e5f9ec364f0000c0ff030000001c24e175cc463437101101bd81dc3181ddd83f8d3d1f2c53e45fca5ab94018975d7db75411543e1226408e88cac1f2cbefbb693d8a0c8efc28ceb4ec3ff429592e5de7e4f28bca763acd06f40ad03226af55e3129849ae2d726cf46a629bf91efdb19a5faccffe8090d92237be9951be4bd7c2a1c1a2b5b2684ade4025622c962d916c000000000000003400000000000000d5ba641663ac6847d35b8779c6903efd7800e86ccc2b5bbc156c2a1976a0f57350aeb0775fa06f769670fe986a884ed38202b09bd5865f3d3a6fd77c", 0xf8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @rand_addr, @loopback}, &(0x7f0000000200)=0xfffffffffffffea3) bind$bt_hci(r0, &(0x7f0000000240)={0x1f, r1, 0x1}, 0xc) 14:50:14 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:14 executing program 3: bpf$PROG_LOAD(0xe, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 317.545164] netlink: 137 bytes leftover after parsing attributes in process `syz-executor4'. [ 317.556529] block nbd0: shutting down sockets 14:50:15 executing program 3: bpf$PROG_LOAD(0xc, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:15 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) dup3(r0, r1, 0x0) 14:50:15 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='%fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 317.621545] netlink: 137 bytes leftover after parsing attributes in process `syz-executor4'. 14:50:15 executing program 4: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="130000001000ffdde200f49ff60f050000230a009d000000110ac53022e5f9ec364f0000c0ff030000001c24e175cc463437101101bd81dc3181ddd83f8d3d1f2c53e45fca5ab94018975d7db75411543e1226408e88cac1f2cbefbb693d8a0c8efc28ceb4ec3ff429592e5de7e4f28bca763acd06f40ad03226af55e3129849ae2d726cf46a629bf91efdb19a5faccffe8090d92237be9951be4bd7c2a1c1a2b5b2684ade4025622c962d916c000000000000003400000000000000d5ba641663ac6847d35b8779c6903efd7800e86ccc2b5bbc156c2a1976a0f57350aeb0775fa06f769670fe986a884ed38202b09bd5865f3d3a6fd77c", 0xf8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @rand_addr, @loopback}, &(0x7f0000000200)=0xfffffffffffffea3) bind$bt_hci(r0, &(0x7f0000000240)={0x1f, r1, 0x1}, 0xc) 14:50:15 executing program 3: bpf$PROG_LOAD(0x12, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 317.708580] block nbd0: shutting down sockets 14:50:15 executing program 3: bpf$PROG_LOAD(0x13, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:15 executing program 3: bpf$PROG_LOAD(0x15, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:15 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) dup3(r0, r1, 0x0) 14:50:15 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:15 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='j/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 317.828706] netlink: 137 bytes leftover after parsing attributes in process `syz-executor4'. [ 317.873020] block nbd0: shutting down sockets [ 318.010588] XFS (loop2): Invalid superblock magic number 14:50:17 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:17 executing program 3: bpf$PROG_LOAD(0xa, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:17 executing program 4: syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000180)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x8100, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000080)={0x4, 0xeaa5, 0x8, [], &(0x7f0000000040)={0x9b0971, 0xec, [], @value=0x6}}) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x40405515, &(0x7f0000001000)) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x541d40, 0x0) 14:50:17 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:17 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='j.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:17 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:18 executing program 3: bpf$PROG_LOAD(0x10, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 320.622245] block nbd0: shutting down sockets 14:50:18 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x2c5) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='veno\x00', 0xe2) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x2, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000100)={0x0, 0x4, 0xbc20, &(0x7f00000000c0)}) sendto$inet(r0, &(0x7f00000001c0)='8', 0x1, 0x0, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000002c0)="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", 0x81d}], 0x1}, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8, 0x80050, r2, 0x0) 14:50:18 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:18 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:18 executing program 3: bpf$PROG_LOAD(0x4, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 320.709820] XFS (loop2): Invalid superblock magic number 14:50:18 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, 0x0, 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:18 executing program 3: bpf$PROG_LOAD(0xb, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:18 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 320.855082] block nbd0: shutting down sockets 14:50:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="78667304", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:18 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x2c5) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='veno\x00', 0xe2) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x2, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000100)={0x0, 0x4, 0xbc20, &(0x7f00000000c0)}) sendto$inet(r0, &(0x7f00000001c0)='8', 0x1, 0x0, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000002c0)="8daeafdaeecfd35c948f29f34c5cac5145d5fc77038cd24b48d671f6d6b3ed7065dfe387870a02e9ba11050b571f04e89bed17d05d46f43decb43f91897ace2ff825411fefe521142346232841237b971328df7e1c69dc48b6f880b5871aafd940a5769d2b3e3f12b207109fbcdc48aca060c526072514d1b81edc6d24974649b0d1cad5ba9baa53c9cfc57fcb1c2334356600dfb5345570168e272eaa6d0558d76b83bc57074ef6d51006f2f3c18c7b7a0a7ef80df26c1f669b98fb4392f362a3643cb3e808658eb39e4cff2451a58c8215591433571e0145362d3cac1963469ce94842ca823248cacd8eb7a071443f9f11b8b0cdd6d5a14af84e84d735096445866f6452167f77aa562117336a7531ff290f24f32489ad647e62a5312ac6540b2c66d97ea602c6be2d99f22300207b9fdd620d2efe61f85078086eb3d2da62fc34645d41ea94ff071fd5a332972472e71aed5b725cea1d2e31d1ca8090383d8cbde626ae5974ceb9d5326508bc5f1a65dabc913758c088ec490f7e91d474e35a0a12bd8f8b88d20459d952582575912a3c412b24c108cdf32c7762f847ffacee9d890e933e7b080e3e635b14703f77eb67435f3465f7ccf4a47e6a8505c788ff80b7d36ba6d750523d6ed0761bc288d024e0c3e20ef3b37660b64e6bdd3b8d606a60399f739f44b5e3060d21cbbe5759e01b9c94918c9d34ab517f4dc6e1d5b75ca175347bd4376f886b3c0d86968b187c236386b66ca27f5dd872c8df8f792a43e07c4ff82ec1a495e978f09474aed980abad3d7b34a2d6d294d537c00629c756ee95344ea6609085d264e2dab59555dbc7ad02af34997f262bbe2d0ee5b12096f4dc2b46b87ead58251e272ce17e138834e9b280a5bca52bcc0819f52dc5f94961439b39417a9af154669d95bd10d072db700383c8748643ea63cc26546db76b5c301046d52c141654b98573df13d4cd1ca577708631018ef4eb76c449801c62046e9e7478a9d404433b47cdb268e9c4a6bef87f78906e2fab9368bc6473599bfa9a5e8d61bc823cdf816b8f1170f4614a156df5e4b5d3dc11b17b262496c2dd9c73a4e38862ae3a9e4541d9415be03554af68a09b3bd30884afce00e839f0542f0c6cec441f40cc5dfdc36e6c128e835813d46ef974f7d2d1959153da119821c3762f70c4fe6f648934477cffa63b7f07bc6c09eff158df0aaa99eb3efa1bc53f1ac38227dfefa13d5e29a23fe5db2fbae800b5f31dfd0ffd5648ed81edaa7a62b390b44763ea3e1eef083971cca35b579042fd3292f3a260083978f8ba4535cf1c5a9882d0945ce71dfaf1983b87a5c7cf8cfa63045ee6e1d549beb16bd0baf4caffeb3f400733f3fda8d5deaf5ad8f33cc75efc64f3e482d40fbcb10c72fb81354980527dea488103b8dd4e8eb09ac71e5b675a54e9fa9ed7c96a3b000d7d70de53e8fef2f437382621bb9e0ffe063cd0d89bb07c062da5234b086240db9708c05640f1ed7942d9faca9188b95ed017121a5f9fbb7ff61bc9dafefbcd7ceebcf78773b2ae58fee0f36150aa33f1b3be5707bc0ef8aac1e3d6fa2852b602dcf53b3741415f7ac41c17312f7656763f28c6d02f24a63dc813063eb91b6929bbac0ae02f7697b2e688edebbd9c5a6e5627a02fc5571d357e1455b00f63382391f18cdee95dc317c50742e2ef0d4e950ce2d2cc8f3101f7bf1a142ce0a2b9d27c81f3154579115c830508012b3cc4f404a4a74ba4a8e46bd33c0df2d69bd7f9bc1c8f7609d89656484a1f6acdcc827f4e6b84b912f5d8c1d5ab4e2a0d4b05fa0ccad76531946f6b3eb3234ba87e0fce2a23e84fda1aff80e922aeea6b3bba710274da44504585814a68edf1fd704b048256013fced0601c24d541b72e05e255586b769f7c1c21f75e788658ec6ff02ec7042aec6b29868b6aaf5c1a85e66d118d27633b901ebc33490625b03c8332ec578c5ddcd27c1468fe73ea18196967aaa64c94b2154f64729ac5d774aacbaaed81ce8078daa36e6a847c1a41c5cf347c31cc5710f3c4c681bfb35cd2afb69fb72a4e5d96cedab5a22270a12e21e92913d526a654f36e21a3351d44b76bc67de88d6582a80862762059da4ef58218e73e56b8345c9208932389c2454664a23e33504c5f8ca89ccc39b6518497638712b74f6bc61c3ce38935a8f3a63fc349d3abc1db57d2c935f2564c13fce1fc134ecac2f423d48e1a213274e6cb84c81a9693643f3c3941b43969031f78a9a20ae34686b8a082924bbba99e288e1f05bdb57c1c77c7defad0051b953641f194ed7d6e9fa55813eb5d1ebdc390d117b895e4734d5effffec0d25e9d86d522d127d5fcaf517e29dcec0f55641f93d7ca0d3c737c2b966f351d0ce5b8d63a0d670784799a97955f42b88fb6d4b78dd6bebf9c0e83b88d4131eec6f876596ae842466b87bad66859ed72e557abe39a1d1a5775f693c9bf7d5789aabe9b63b5cfdd2d4ef38959745b11fa0155ca946c50b91dd863d66f6e7fab3af3e1137df7254aa9cc5d024dd2b49e96cb49141f93473a5b21d1e992138554e3edb4950bd1f87e27d1c502cb5f09c4bda91765b5414281ec108536e6a3fc87c7285f46e81d9a11fa01453b0f4b54512d80b81b4238a4676248932b20a71b3776b0d9054ed539b6a0bb7c147f4ddf8726a3c43cfb882ea6fa3bba79287f4322deade08e0727b3c537307e7e828a35045718e6f52c65e509e5e81e220f657b06e2edd192c83b06c81832920a33959e20f73c72dd314bb8d4561a60f9dd466c01eb114661ca7926351590a4e0f9ec46432db1fb88e8a46ea08575210070a42581aec9653eda951bb3a0c2206b5d04d0c24dd0d46af8db007c87cc1710715101f558d0a9ad9c4878bdac65ab709bd07dabe7a31fdc593b2220a4954f01e8173fa249f0fd601e22755", 0x81d}], 0x1}, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8, 0x80050, r2, 0x0) 14:50:18 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ptrace(0x10, r0) 14:50:18 executing program 3: bpf$PROG_LOAD(0x3, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:18 executing program 3: bpf$PROG_LOAD(0x11, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:18 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:18 executing program 3: bpf$PROG_LOAD(0x9, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:18 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x0) ptrace(0x10, r0) 14:50:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0x8000, 0x8, 0x3f6}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x127ff, 0x0, &(0x7f0000981000/0x1000)=nil}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x70500000000000, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x200000, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) [ 321.114984] block nbd0: shutting down sockets 14:50:18 executing program 3: bpf$PROG_LOAD(0x14, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:18 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:18 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:18 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0xffffffffffffffff, r0) 14:50:18 executing program 3: bpf$PROG_LOAD(0x8, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:18 executing program 3: bpf$PROG_LOAD(0xf, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 321.374903] block nbd0: shutting down sockets 14:50:18 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r0 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, 0x0) 14:50:18 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0x8000, 0x8, 0x3f6}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x127ff, 0x0, &(0x7f0000981000/0x1000)=nil}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x70500000000000, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x200000, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) 14:50:18 executing program 3: bpf$PROG_LOAD(0x2000002a, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:18 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r0 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, 0x0) [ 321.528693] XFS (loop2): Invalid superblock magic number 14:50:18 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 321.613173] block nbd0: shutting down sockets 14:50:19 executing program 3: bpf$PROG_LOAD(0x7, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:19 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r0 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, 0x0) 14:50:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:19 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:19 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0xffffffffffffffff, r0) 14:50:19 executing program 3: bpf$PROG_LOAD(0x2, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:19 executing program 3: bpf$PROG_LOAD(0x3fe, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:19 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 321.912819] block nbd0: shutting down sockets [ 321.955521] XFS (loop2): Invalid superblock magic number 14:50:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0x8000, 0x8, 0x3f6}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x127ff, 0x0, &(0x7f0000981000/0x1000)=nil}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x70500000000000, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x200000, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) 14:50:19 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0xffffffffffffffff, r0) 14:50:19 executing program 0: socket$inet6(0xa, 0x803, 0x7) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) dup3(r0, r1, 0x0) 14:50:19 executing program 3: bpf$PROG_LOAD(0x6, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:19 executing program 5 (fault-call:8 fault-nth:0): munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 322.121019] block nbd0: shutting down sockets 14:50:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:19 executing program 3: bpf$PROG_LOAD(0x20000014, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:19 executing program 0: socket$inet6(0xa, 0x803, 0x7) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) dup3(r0, r1, 0x0) 14:50:19 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:19 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xb, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 322.315431] block nbd0: shutting down sockets 14:50:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc2, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0x8000, 0x8, 0x3f6}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x127ff, 0x0, &(0x7f0000981000/0x1000)=nil}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x70500000000000, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x200000, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) 14:50:19 executing program 0: socket$inet6(0xa, 0x803, 0x7) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) dup3(r0, r1, 0x0) 14:50:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x16, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:19 executing program 5: munmap(&(0x7f0000010000/0x3000)=nil, 0x3000) r0 = gettid() r1 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x6, 0x0, 0x10000, 0x3a}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000100)={0x0, r2}) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x3b) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r3 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0x2, 0x9}) ptrace(0x10, r0) [ 322.443615] XFS (loop2): Invalid superblock magic number [ 322.481526] block nbd0: shutting down sockets 14:50:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:20 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x4, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:20 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 322.672658] block nbd0: shutting down sockets 14:50:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:20 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) [ 322.779008] XFS (loop2): Invalid superblock magic number 14:50:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x9, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="78667303", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) [ 322.902066] block nbd0: shutting down sockets 14:50:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xd, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:20 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0x8000, 0x8, 0x3f6}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x127ff, 0x0, &(0x7f0000981000/0x1000)=nil}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x70500000000000, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x200000, 0x0) 14:50:22 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$midi(&(0x7f00000024c0)='/dev/midi#\x00', 0x5, 0x80000) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000002900)={{0x2, 0x7, 0x1ff, 0x7, 'syz1\x00', 0x9}, 0x4, 0x0, 0x4, r0, 0x4, 0x4a5a0556, 'syz0\x00', &(0x7f0000002500)=["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", "e7766d6e65743063707573657476626f786e65743000", "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", '(\x00'], 0x3e4, [], [0x101, 0x1ff, 0x400, 0x7b02]}) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000022c0)=[{{&(0x7f00000000c0)=@ax25, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)=""/24, 0x18}], 0x1, &(0x7f0000000180)=""/221, 0xdd}}, {{&(0x7f0000000280)=@in6, 0x80, &(0x7f0000000600)=[{&(0x7f0000000300)=""/231, 0xe7}, {&(0x7f0000000400)=""/197, 0xc5}, {&(0x7f0000000500)=""/243, 0xf3}, {&(0x7f0000001040)=""/4096, 0x1000}], 0x4, &(0x7f0000000640)=""/133, 0x85}, 0x100}, {{&(0x7f0000000700)=@xdp, 0x80, &(0x7f0000000980)=[{&(0x7f0000000780)=""/76, 0x4c}, {&(0x7f0000000800)=""/51, 0x33}, {&(0x7f0000000840)=""/159, 0x9f}, {&(0x7f0000000900)=""/119, 0x77}], 0x4, &(0x7f00000009c0)=""/188, 0xbc}, 0x1}, {{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000a80)=""/210, 0xd2}, {&(0x7f0000000b80)=""/53, 0x35}], 0x2}, 0xd5}, {{&(0x7f0000000c00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000002180)=[{&(0x7f0000000c80)=""/204, 0xcc}, {&(0x7f0000000d80)=""/146, 0x92}, {&(0x7f0000002040)=""/52, 0x34}, {&(0x7f0000002080)=""/27, 0x1b}, {&(0x7f00000020c0)=""/159, 0x9f}], 0x5, &(0x7f0000002200)=""/129, 0x81}, 0x7}], 0x5, 0x101, &(0x7f0000002400)={0x77359400}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000002440)={0x4, [0x5, 0x2, 0x0, 0x2]}, &(0x7f0000002480)=0xc) r3 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:22 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0x8000, 0x8, 0x3f6}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x127ff, 0x0, &(0x7f0000981000/0x1000)=nil}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x70500000000000, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) 14:50:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="78667303", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:22 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 325.641362] block nbd0: shutting down sockets 14:50:23 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x1f, 0x802, 0x0) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000000c0), &(0x7f0000000100)=0x4) exit_group(0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x2) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r2 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0xc0305710, &(0x7f0000000040)={0x0, 0x0, 0x1ff, 0xd9}) ptrace(0x10, r0) 14:50:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x12, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:23 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfsL', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) [ 325.809940] block nbd0: shutting down sockets 14:50:23 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:23 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:23 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = msgget$private(0x0, 0x1) r1 = getuid() getresgid(&(0x7f0000000040)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) r3 = getuid() fstat(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000200)={{0x1000, r1, r2, r3, r4, 0x1, 0x2}, 0x233a, 0x7, 0x8, 0x3, 0x3, 0x1ff, r5, r6}) r7 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x7ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r8 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r8, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r7) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_ADD(r8, 0x4c80, r9) 14:50:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0x8000, 0x8, 0x3f6}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x127ff, 0x0, &(0x7f0000981000/0x1000)=nil}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x70500000000000, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:50:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 326.012623] block nbd0: shutting down sockets 14:50:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:23 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:23 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) [ 326.224560] block nbd0: shutting down sockets 14:50:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0x8000, 0x8, 0x3f6}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x127ff, 0x0, &(0x7f0000981000/0x1000)=nil}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x70500000000000, 0xe, 0x0, 0x0) 14:50:23 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xe, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 326.380278] block nbd0: shutting down sockets 14:50:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 326.422845] XFS (loop2): Invalid superblock magic number 14:50:26 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x0, 0x70bd27, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x6e}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) 14:50:26 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:26 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0x8000, 0x8, 0x3f6}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x127ff, 0x0, &(0x7f0000981000/0x1000)=nil}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 14:50:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) [ 329.093497] block nbd0: shutting down sockets 14:50:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:26 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x2, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0x8000, 0x8, 0x3f6}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x127ff, 0x0, &(0x7f0000981000/0x1000)=nil}) [ 329.229672] XFS (loop2): Invalid superblock magic number 14:50:26 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0xa, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 329.322470] block nbd0: shutting down sockets 14:50:26 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x20000) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000000c0)=0xffffffffffffffe1, &(0x7f0000000100)=0x2) r2 = memfd_create(&(0x7f0000000e40)="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", 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000340)={{0x4, 0x0, 0x3, 0x9, 'syz1\x00', 0xb031}, 0x6, 0x200, 0x9, r0, 0x1, 0x7, 'syz1\x00', &(0x7f0000000140)=["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"], 0x1e6, [], [0x1ff, 0x6, 0x1]}) execveat(r2, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x5, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="786673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:26 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:26 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) prctl$PR_SET_ENDIAN(0x14, 0x0) ptrace(0x10, r0) 14:50:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x2, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0x8000, 0x8, 0x3f6}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 329.547800] block nbd0: shutting down sockets 14:50:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0xb, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:27 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x9, 0x201) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @broadcast, @broadcast}, &(0x7f0000000180)=0xc) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in=@dev={0xac, 0x14, 0x14, 0x10}, @in6=@local, 0x4e24, 0x10001, 0x4e22, 0x0, 0x2, 0x80, 0x80, 0x62, r1, r2}, {0xa5aa, 0x7ef, 0x8001, 0x1000, 0x100, 0x3, 0x8, 0x400}, {0x694, 0x0, 0x4, 0x1}, 0xc8, 0x6e6bb3, 0x1, 0x1, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0x1e}, 0x4d4, 0x3e}, 0x0, @in=@loopback, 0x3506, 0x2, 0x3, 0xfff, 0x9, 0x1, 0x7fff}}, 0xe8) r3 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40800, 0x0) ioctl$RTC_VL_READ(r4, 0x80047013, &(0x7f00000000c0)) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r5 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r5, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r3) 14:50:27 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:27 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3fe, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 329.755295] block nbd0: shutting down sockets 14:50:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0x8000, 0x8, 0x3f6}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 14:50:27 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)={0x0, 0x7, 0x100, 0x7, 0x6, 0x3ff, 0x40, 0x6, 0x2, 0x914, 0x7fffffff}) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r2 = memfd_create(&(0x7f0000000e40)="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", 0x0) gettid() ptrace(0x420f, r0) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18, 0x71, 0x2, {{0x30, 0x1, 0x3}, 0x99ee}}, 0x18) pipe(&(0x7f0000000000)) 14:50:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="786673ba", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x2000000d, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:27 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0x8000, 0x8, 0x3f6}, 0x10) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 14:50:27 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = accept$alg(0xffffffffffffff9c, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x100, 0x4) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r2 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x14, r0) [ 330.005908] block nbd0: shutting down sockets 14:50:27 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff10, 0x0, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:27 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:27 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f00000000c0)) ptrace(0x10, r0) 14:50:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x7a, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 330.191941] block nbd0: shutting down sockets 14:50:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 14:50:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="786673fd", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:27 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x4800000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:27 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffff8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000780)=[@in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e20, 0x806, @dev={0xfe, 0x80, [], 0x17}, 0x401}, @in6={0xa, 0x4e22, 0x5, @remote, 0xfffffffffffffff8}, @in6={0xa, 0x4e24, 0x4, @mcast1, 0x6}, @in6={0xa, 0x4e24, 0xff, @dev={0xfe, 0x80, [], 0x1b}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e20, 0x8, @empty, 0x7f}], 0xfffffffffffffedc) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000100)={0x81, 0x3, {0xffffffffffffffff, 0x3, 0x6, 0x3, 0x10000}}) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x7f, @remote, 0x4e24, 0x4, 'fo\x00', 0x5, 0x80000001, 0x34}, 0x2c) r1 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x5) getrandom(&(0x7f0000000280)=""/44, 0xcebfa1b274d22873, 0x2) r2 = memfd_create(&(0x7f0000000e40)="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", 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000180)=0xe6) execveat(r2, &(0x7f0000000200)='\x00', 0x0, &(0x7f00000002c0)=[&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00'], 0x1000) write$selinux_attr(r2, &(0x7f0000000040)='system_u:object_r:removable_device_t:s0\x00', 0x28) ptrace(0x10, r1) write$binfmt_misc(r2, &(0x7f0000000300)={'syz1', "69762981bb720bfa1626716b26b43247dd081d31afd5eac717e91fc3d48e1234b0fd6b3b378c337e53ab17bdf763a5a85daa7eba95999b1c8104cb99ff4f736c8ae83bbf44187af4f78d39f83df43481cfa1759247d07f70d99cd27097be981c84e54cb18e9e85ce6f5d733129ca1a9e2b5bb7cfec768c71b7ed5194c661419f6af2f395674d81e5789f185b"}, 0x90) ioctl$UI_SET_MSCBIT(r2, 0x40045568, 0x15) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f00000001c0)) 14:50:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x74000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 330.386560] block nbd0: shutting down sockets 14:50:27 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x109000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x4e20, 0x0, @local, 0x9}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x16}}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e20, 0x3, @remote, 0x400}, @in6={0xa, 0x4e21, 0x40, @ipv4={[], [], @loopback}, 0x7f}], 0x74) r2 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0xff000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:27 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:27 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 14:50:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x4800, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 330.608708] block nbd0: shutting down sockets 14:50:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0xff00000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\n', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x4c000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:28 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x500, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 330.832651] block nbd0: shutting down sockets 14:50:30 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0xa00, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:31 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 14:50:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:31 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgid(r0) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000780)=0xe8) fstat(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = geteuid() stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = getegid() stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000b00)={0x0, 0x0, 0x0}, &(0x7f0000000b40)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000b80)={{}, {}, [{0x2, 0x1, r2}, {0x2, 0x1, r3}, {0x2, 0x1, r4}, {0x2, 0x2, r5}, {0x2, 0x7, r6}, {0x2, 0x6, r7}, {0x2, 0x1, r8}, {0x2, 0x7, r9}, {0x2, 0x1, r10}, {0x2, 0x1, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x4, r14}, {0x8, 0x2, r15}, {0x8, 0x2, r16}, {0x8, 0x3, r17}], {}, {0x20, 0x4}}, 0xa4, 0x1) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 333.664401] block nbd0: shutting down sockets 14:50:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x7a00000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:31 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) ioprio_set$uid(0x0, r1, 0x47b) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r2 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:31 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) [ 333.792808] XFS (loop2): Invalid superblock magic number 14:50:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0xff00, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 14:50:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x68000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:31 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 333.981901] block nbd0: shutting down sockets 14:50:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x48, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:31 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x10000) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:31 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 14:50:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x3, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 334.202174] block nbd0: shutting down sockets 14:50:31 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 14:50:31 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:31 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) [ 334.292639] cgroup: fork rejected by pids controller in /syz5 [ 334.299993] XFS (loop2): Invalid superblock magic number 14:50:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x6800000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:31 executing program 5: munmap(&(0x7f0000010000/0x1000)=nil, 0x1000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200800, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x9, 0x4, [0x1, 0xfe, 0x8001, 0x6]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r2, 0x2}, &(0x7f0000000180)=0x8) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r3 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 334.392145] block nbd0: shutting down sockets 14:50:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfsD', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 14:50:31 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e24, @multicast2}}) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r2 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0xc200000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:31 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:31 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 334.615630] block nbd0: shutting down sockets 14:50:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x600, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:32 executing program 5: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xb, 0x140) munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) ioctl$sock_netdev_private(r1, 0x89fa, &(0x7f00000000c0)="f6043625e1821e695934f149da4e2d8d19d01c3370fc2c75a2c1a4a4dbcabadec64fc1904ac6236b66f67d793052a54c65022a74a8f7e097e859c5aa5cca220a0e8db502fd8fa37891ccbe595d81ba8ea5723883cf3ac19247352ab7cf18aa700d367ea728d7ac7ee684444d") 14:50:32 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x7, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="786673b4", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:32 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x80, 0xff00000000000000, 0x6, 0xffff, 0x1bef, r0}) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r2 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) getpgrp(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000003c0)=[{{&(0x7f0000000140)=@xdp, 0x3e6, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/204, 0x473}}], 0x1500, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000100)={0x8, 0x8, [0x1, 0x7f]}) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) syz_open_pts(0xffffffffffffffff, 0x0) 14:50:32 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x200000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:32 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:32 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) fsync(r1) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x400000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:32 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:32 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0xa000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:32 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:32 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x2fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x800, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044080}, 0x40080) r3 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) prctl$PR_SET_FPEXC(0xc, 0x100003) [ 335.490285] XFS (loop2): Invalid superblock magic number 14:50:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) getpgrp(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000003c0)=[{{&(0x7f0000000140)=@xdp, 0x3e6, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/204, 0x473}}], 0x1500, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000100)={0x8, 0x8, [0x1, 0x7f]}) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) syz_open_pts(0xffffffffffffffff, 0x0) 14:50:33 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:33 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) dup3(r1, r2, 0x0) 14:50:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0xc2000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:33 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x10000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = semget(0x1, 0x2, 0x40) r2 = msgget(0x2, 0x201) r3 = getuid() getgroups(0x7, &(0x7f0000000040)=[0xee01, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xee01]) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000200)={{0x4, r3, r4, r5, r6, 0x80, 0x7}, 0x7fffffff, 0x7f, 0x0, 0x657c, 0x5, 0x100000000, r0, r0}) semctl$IPC_INFO(r1, 0x3, 0x3, &(0x7f0000001040)=""/4096) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r7 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r7, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) 14:50:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x6c00000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:33 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) dup3(r1, r2, 0x0) 14:50:34 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x490000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="05000000b35406009f00300c"], &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r2, 0x4}, &(0x7f0000000180)=0x8) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r3 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:34 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 336.619905] XFS (loop2): Invalid superblock magic number 14:50:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x700000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:34 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x6, &(0x7f00000000c0)=""/215) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:35 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000800)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 14:50:35 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) dup3(r1, r2, 0x0) 14:50:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x500000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:35 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)="6a6673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:35 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, r2, 0x10, 0x1, @ib={0x1b, 0x3000, 0x3ff, {"f30d0a6201ee0d1f685b3c5c496f44f7"}, 0x7, 0x8, 0x3ff}}}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000400)={0x0, 0x1, &(0x7f0000000200)=""/227, &(0x7f0000000300)=""/76, &(0x7f0000000380)=""/70, 0x3000}) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getpeername$packet(r1, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b80)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000bc0)={0x0, @broadcast, @dev}, &(0x7f0000000c00)=0xc) getsockname$packet(r1, &(0x7f0000000c40)={0x11, 0x0, 0x0}, &(0x7f0000000c80)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000cc0)={@empty, 0x0}, &(0x7f0000000d00)=0x14) recvmmsg(r1, &(0x7f00000064c0)=[{{&(0x7f0000000d40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000003500)=[{&(0x7f0000001040)=""/207, 0xcf}, {&(0x7f0000000dc0)=""/10, 0xa}, {&(0x7f0000001140)=""/4096, 0x1000}, {&(0x7f0000002140)=""/136, 0x88}, {&(0x7f0000000e00)=""/37, 0x25}, {&(0x7f0000002200)=""/252, 0xfc}, {&(0x7f0000002300)=""/130, 0x82}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f00000033c0)=""/253, 0xfd}, {&(0x7f00000034c0)=""/9, 0x9}], 0xa, &(0x7f00000035c0)=""/123, 0x7b}, 0x8}, {{&(0x7f0000003640)=@ethernet={0x0, @local}, 0x80, &(0x7f0000003c40)=[{&(0x7f00000036c0)=""/98, 0x62}, {&(0x7f0000003740)=""/104, 0x68}, {&(0x7f00000037c0)=""/252, 0xfc}, {&(0x7f00000038c0)=""/164, 0xa4}, {&(0x7f0000003980)=""/255, 0xff}, {&(0x7f0000003a80)=""/101, 0x65}, {&(0x7f0000003b00)=""/15, 0xf}, {&(0x7f0000003b40)=""/201, 0xc9}], 0x8, &(0x7f0000003cc0)=""/254, 0xfe}, 0x200}, {{&(0x7f0000003dc0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000003e40)=""/236, 0xec}, {&(0x7f0000003f40)=""/25, 0x19}, {&(0x7f0000003f80)=""/123, 0x7b}, {&(0x7f0000004000)=""/197, 0xc5}, {&(0x7f0000004100)=""/75, 0x4b}, {&(0x7f0000004180)=""/37, 0x25}, {&(0x7f00000041c0)=""/153, 0x99}, {&(0x7f0000004280)=""/188, 0xbc}, {&(0x7f0000004340)=""/18, 0x12}], 0x9, &(0x7f0000004440)=""/246, 0xf6}, 0x7}, {{&(0x7f0000004540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000004700)=[{&(0x7f00000045c0)=""/173, 0xad}, {&(0x7f0000004680)=""/116, 0x74}], 0x2, &(0x7f0000004740)=""/4, 0x4}, 0x80000001}, {{&(0x7f0000004780)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f00000048c0)=[{&(0x7f0000004800)=""/12, 0xc}, {&(0x7f0000004840)=""/56, 0x38}, {&(0x7f0000004880)=""/27, 0x1b}], 0x3, &(0x7f0000004900)=""/206, 0xce}, 0x1f}, {{&(0x7f0000004a00)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000004bc0)=[{&(0x7f0000004a80)=""/163, 0xa3}, {&(0x7f0000004b40)=""/84, 0x54}], 0x2, &(0x7f0000004c00)=""/222, 0xde}, 0xfffffffffffff568}, {{&(0x7f0000004d00)=@alg, 0x80, &(0x7f00000050c0)=[{&(0x7f0000004d80)=""/247, 0xf7}, {&(0x7f0000004e80)}, {&(0x7f0000004ec0)=""/27, 0x1b}, {&(0x7f0000004f00)=""/165, 0xa5}, {&(0x7f0000004fc0)=""/115, 0x73}, {&(0x7f0000005040)=""/38, 0x26}, {&(0x7f0000005080)=""/21, 0x15}], 0x7, &(0x7f0000005140)=""/199, 0xc7}, 0x8}, {{&(0x7f0000005240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000006440)=[{&(0x7f00000052c0)=""/208, 0xd0}, {&(0x7f00000053c0)=""/96, 0x60}, {&(0x7f0000005440)=""/4096, 0x1000}], 0x3, &(0x7f0000006480)=""/18, 0x12}, 0x5}], 0x8, 0x1, &(0x7f00000066c0)) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000008980)={0x0, @broadcast, @multicast2}, &(0x7f00000089c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000008c40)={'vcan0\x00', 0x0}) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000008c80)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000008cc0)=0x14) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000008d40)=@req={0x28, &(0x7f0000008d00)={'veth1_to_team\x00', @ifru_addrs=@xdp={0x2c, 0x4, 0x0, 0x17}}}) getsockname$packet(r1, &(0x7f0000008e40)={0x11, 0x0, 0x0}, &(0x7f0000008e80)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000008ec0)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000008fc0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000009400)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000093c0)={&(0x7f0000009000)={0x390, r3, 0x108, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r4}, {0xf0, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffc}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x27c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xf1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff7}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}]}}]}, 0x390}, 0x1, 0x0, 0x0, 0x800}, 0x10) ptrace(0x10, r0) 14:50:35 executing program 5: munmap(&(0x7f0000011000/0x1000)=nil, 0x1000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400800, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000140)={r2, 0x1}) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r3 = memfd_create(&(0x7f0000000780)="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", 0x1) execveat(r3, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x7400000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 337.922180] input: syz0 as /devices/virtual/input/input271 [ 337.940462] XFS (loop2): Invalid superblock magic number 14:50:35 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x2, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 337.977291] input: syz0 as /devices/virtual/input/input272 14:50:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x4c, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000000000200bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000001016d400600000000006506000001ed00003f140000000000006f460000000000006b0a00fe00000000850000002e000000b7070000000000009500000000000000"], 0x0}, 0x48) 14:50:35 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)="6a6673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:35 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x6000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:35 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x7fffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0xc0c0583b, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000480), 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) [ 338.218239] XFS (loop2): Invalid superblock magic number 14:50:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x7400, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:35 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x482, 0x0) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x12, r1, 0x24) exit_group(0x0) getrandom(&(0x7f0000000140)=""/44, 0x2c, 0xfffffffffffffffd) r2 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000040)) 14:50:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x600000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:35 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r3) dup3(r1, r2, 0x0) 14:50:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="786673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x6c, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:35 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:36 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) dup3(r1, r2, 0x0) 14:50:36 executing program 5: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000006540)='/dev/snd/pcmC#D#p\x00', 0x7ff, 0x10040) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) r3 = socket$inet_dccp(0x2, 0x6, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) r5 = syz_open_dev$vivid(&(0x7f0000000800)='/dev/video#\x00', 0x0, 0x2) getresuid(&(0x7f0000000840)=0x0, &(0x7f0000000880), &(0x7f00000008c0)) r7 = dup(0xffffffffffffff9c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000c40)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000d40)=0xe8) getgroups(0x6, &(0x7f0000000d80)=[0x0, 0xee00, 0x0, 0xee00, 0xffffffffffffffff, 0x0]) sendmsg$netlink(r1, &(0x7f0000000e00)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000bc0)=[{&(0x7f0000001040)={0x27e8, 0x40, 0x20, 0x70bd2c, 0x25dfdbfc, "", [@nested={0x22f0, 0x84, [@typed={0x1ec, 0x89, @str="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c00"}, @generic="66c12de1639c769c229ff03375c5f087124f954723dc0f3510258a59d5e5c3c0457d7c7d07f936b8ce10ec5c0be23862e6d780be37b13ccd2ea08ee3af53bb34432e113f79e5857acc3587969558e348dbf4bc9d0143d050b45b6c19d826a4991fe10847d8055aad204548ab0f6045fb6434f6693993ad62e5ef50f0", @generic="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", @generic="c224f002c8844db17a7284fb2488e5cea49570dc4612b283821e2e67941acf66ee3ec3465b84e87005afe47239fccb5f602349da7600bb58f3b3e6d93dcf4ce27d4ac2739bcec946301d67adc5874e8494d8cecf3aea960409ff644723bc6b9a1c1f45afda268ad52b44826739ed47edea8ed613c4abf1bf09899746e75111e7bd6f7b7d", @generic="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"]}, @generic="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", @typed={0x1ec, 0x15, @str="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"}, @typed={0x14, 0x4, @ipv6=@mcast2}, @typed={0x1ec, 0x4f, @str="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c00"}]}, 0x27e8}, {&(0x7f00000002c0)={0x534, 0x1e, 0x400, 0x70bd2d, 0x25dfdbfe, "", [@typed={0xd4, 0x8, @binary="fe902f3e4395c3b6eae303e37a1f697c3363cc271b8208695474055dac5a538e3744ac5d5eaeef38036c9bdcbf57b373413d34d06a95bb953d251f5f1ec92c3f75ab682b0a4e9c7cdc3240f06d2270d99c9fbd67a162a85738b22478cd941cfbb76b483fd6fe272ff3288c01478ec1577891036c6ba98f3df1597ba768b5c6f8ea2de87018ebe309874b61006b042c157e7a01cc2e814d8da3c91751328243c3d801412b4ffc7ecfce256814e96a1e78cc8c2189536557f46f4c95548b4c6af193a72667712cdd17b28e121c20"}, @typed={0x1ec, 0x3b, @str="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c00"}, @nested={0x264, 0x5d, [@generic="f47814a666553798f1a5566ac9d3ca0dbfedd03dc6f8cc3de5b8", @generic="1996316e17c0ff14b15f5ee054cea07d24f25e7ffe27450fbe8657006736017f78b512", @typed={0x1ec, 0x8f, @str="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"}, @generic="76c3f04eb334e39185c9cc15fc41077787af5de8238dd9", @typed={0xc, 0x3d, @u64=0x8001}, @typed={0x8, 0x8, @uid=r2}, @typed={0x8, 0x88, @fd=r3}, @typed={0x4, 0x21}]}]}, 0x534}, {&(0x7f0000003840)={0x1330, 0x25, 0x204, 0x9, 0x25dfdbfd, "", [@nested={0x30, 0x31, [@typed={0xc, 0x74, @u64=0x400}, @typed={0xc, 0x8e, @u64=0x2}, @typed={0x8, 0x94, @ipv4=@multicast1}, @typed={0xc, 0x44, @u64=0xfffffffffffffffb}]}, @nested={0x128c, 0x86, [@typed={0x94, 0x3, @binary="53fc36a07240ec1e1044ba9bfef96db4fdc08aedd0a0ba115162dbbe8b79560bf2f2b4196f1c887ef7a385cf787cdd53d959bc09cf3ab6dd9986521dd2fdda5169f86341bb45af2f68ae0fec6767e7c0cd43dc1f3ab055a67fee7ae65e29f046bcb96991875b9b1d489b33758e584c5bc017641c0e8063a88ebfc9692a987800f9fde7f577de17cfe715c6bcc0"}, @typed={0x1ec, 0x65, @str="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"}, @typed={0x8, 0x0, @ipv4=@multicast2}, @generic="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"]}, @generic="40e264a523909dc7a5bcc67ac13c51cce7f01494a0a0bbdc777264641247a7cd60a192b0d7c02b0eed7bda3216deeabde7781a243a106218ea6a6e299aededf7042d710401488ad474863f6b33cf1075ded717ccecb8", @typed={0x8, 0x12, @fd=r4}, @nested={0x4, 0x10}]}, 0x1330}, {&(0x7f0000004b80)={0x818, 0x33, 0x401, 0x70bd25, 0x25dfdbff, "", [@nested={0x31c, 0x1c, [@typed={0x8, 0x4c, @u32=0x6}, @generic="57cd9194a8813758f1777eafafcd4eb3dc13cbb5204f72b73039ffa9e8c1f5b8d17709953aaab71527343849ea63919c79144e42a9f0f9e60214322594e4efbef5638c6fa25c854197cc8131c62fc2030a8419f062f23f856578b0931330129d3b6846a26f5b651b5949ac9d8d423edfb7bf72daab621eb434dc591d8cb71f6e6db079414eb490f5545f51c30f1d98a1e2b0382b9cec7af185f54b188949199b0618a51a5343dd2918b98037d564e5660f23f1a457be718967f05d34044216037f09c09c6f301c8fa62eb4636b4e0162099c61233e844e2016d503907b59eac52c288cc6afca151045e444882586b7a9658c77cb3396b23c2d", @generic="040f324c7307402a3baf41a9ba7c7696c337ea3d1ace29e8e37a392b432e5dc5c3caa64f6382a7893b0a9ddeaf7b45a23457a4209a7bb3feb851cce73d41ede3dfe8a75ec629e832d9f07dc3d3702e63dac02d8ac148816949816b6eab22f9a95db0b7353a031758a620b7f1404e7b28556463ba14aad0e13e12c0639db0fee6594348bfb52464acc40bf771a1d09cea69646f6b8efe138aa79c45b88e3532dcd0e9f638bbc7f3fc8a23eedf5967517b8c5482b4f55664d6ee432e5e1d4e22748e1547490b32b48e6bfc7b3704282cae00ec332a9820aa7c79e7a380f3b9755b31cbf09313e15d8d312b0029532db4ed4e62d204e96638ee", @generic="843ae0d232802ab429ae66d5019fa71df1a760b1466ee3e6491860bffaaa932a3f42a4a5e94d0a29103b799fee3b5ddeec376bc88c", @typed={0xcc, 0x64, @binary="cc3d596367dba0d6a991ccb685207df7f4d0acc06f0058b9617f0cc84d111d928ce06b56aece60e7b9845852dd2aea81da5de52ad2a976ac63944906b837a719d7e82a40f764ea4b1c34311e400b8bf527e798d6fae84aebdfc1d404660d9dbef1f985d4f630ce592365ce1a6eb6e62cdddd851067f90b92ed01bcd4b856efc9a8545809fa64ac9ef2bd1d3cf9d432535e88a8c9ebafb6cdf4fe087e0d5ff189b1af145e45b9661f5ba0db1262f9300adcf8e0457d8578c96dd2444c0df979ac1d851f9e453d3767"}, @generic="8e808c32bcc34d3dba17a7976591c34d9f0a2cc0103184e20494b68985"]}, @generic="d9fc2f2bc622d16ef70811384e6d32ad9d9cdd738a7ef4c13afc43e5f47275565ef8321757d911229dec8c6258800e1e4382b9b7303421b3e3b8740f8a05d5864cf289c05e3c475de2ec72064a24d453813bc0", @typed={0x8, 0x55, @fd=r5}, @typed={0xb4, 0xc, @binary="e41cf85c58dd652885b9dad0f249a6eabc3640fd1b81c569b437d0f1fce4e4ae5083b737529a89ff7eb9c5a9c3c82804d32d5e76a6bae9a2d43250c90f580768ed1d37e6f2b7fc39a6b045f2fe8daa236d2bd26be8fa5280b048af1ed68ae99eee9c099575c26b2e13214d6f6e01289a3848971d688c76ec701ad292ba1cf42f82656ecf601be09c5f2ea6bddeaf9cf6012e75293c4736ad0fb295a2bcaf7f86fd557516ce47158ae45239dd28e28013"}, @nested={0x3d0, 0x6b, [@generic="5cdb8e4cd7cc4cdb13f1f5d06db716822e74f3452160d422db82642a2758f5d41e3546469d1ceb9e7feb02cb3a7c2f5a604df370771d8310e48954cff943bc4bcdf8993ed2bc0d8251eacb4b83026420386e35059af050288a26988612933271556e38cd54d389fced1b188298b8ab803c378b7a6e3811af80b3d1272f710d57112fbd0bd4784d8fe42999381d9be6448a25a8f8a92d0ed94fd2338efa30d2c061ae8a7ac9905ce2802676e11609413b59040ca583357352477b950c2cdf5d70befd528e3761c6bce480e7d5c67084773930285697c22de9c3aa870fe573b2ddb81b036120ffdaeb5b94f3c819b5fe5c8b92e8f68580f3c627", @typed={0x1ec, 0x80, @str="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"}, @generic="7068b35fb2a49016eb5c1b7e948f9a19ce099c67d248dacfce7f1f0532925904df171bb3ac3f5c27f7327671643fbd0c76f4140489e96207fdead0e4019c77d21e8697b4edb531a12bf1cc5529961fa4efd758addc82733f7cf0eebdca2572db6ddf0d959c9907f8a261c28eb30fd059cf078a89e2dc7fd4be734c1f92e52f3bc3a3679b4c6cd36e02bfb14c1970d4f3540cc6f4ac079df46e42a154010b7402d48c0d5fec7979aa1de5cb78e412214c355e47d312ed26eaa988c4dcd5d0fc52c6355bb6f0a78574922ab105de1baf5fb8b337", @typed={0x8, 0x4b, @uid=r6}, @generic, @typed={0x8, 0x2f, @pid=r0}, @typed={0x4, 0x12}]}, @nested={0xc, 0x64, [@typed={0x8, 0x7e, @u32=0x1}]}]}, 0x818}, {&(0x7f00000053c0)={0x1160, 0x35, 0x210, 0x70bd2d, 0x25dfdbfb, "", [@generic="a88d40ac5547f0c82df12c6c6a761227b9da58b66d9a4746d13d6ce7120d3077c999a205a91199bf440fc45eb1e732c1124f92ed00f5409706658b71b73c3fe8fedf7a518fbc5c9b4207b93d3d", @nested={0x1100, 0x88, [@generic="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", @typed={0x8, 0x2f, @str='\x00'}, @typed={0x4, 0x6f}, @typed={0x14, 0x48, @ipv6=@dev={0xfe, 0x80, [], 0x16}}, @typed={0xc, 0x2a, @u64=0x4}, @typed={0x8, 0x7e, @fd=r7}, @typed={0x8, 0x4, @ipv4=@rand_addr=0xfff}, @typed={0x14, 0x22, @ipv6=@ipv4={[], [], @remote}}, @generic="879a4b332f798561f4ce53df75ec71e47ecbb250425f32a3f3231973fcfeaf57f0f4ed495f46a0a8ca340c21b8ceb1be6faad0c510a9034f5857908f6078bd90cd061d1cf7cbf1b773aa607038051d616ad305bef45796734762d9278ceaa9e3b0ccbc42ed9043dc13dce911fdf13f7d7870a0e19d8d9b1a505b71fc637f9f9036d8e94046557c1f0447e448ffbbf4e49f9ae061d8", @typed={0x14, 0x4, @ipv6=@remote}]}]}, 0x1160}, {&(0x7f0000000900)={0x29c, 0x41, 0x300, 0x70bd26, 0x25dfdbff, "", [@generic="731e1cb293f7e5605f5c59414dbd838e7c918f2520e208ae68ec5804428dc72c99f611144a7349362470a9ba95ae43508e59e8907d5c9b198a5ae3f2f2df2b7b648a352845c9243531c848a98f2e0c132753f5476e9c51903cf5c2ec7f0010cb441270706df714922e12362c43f0b78b68c1f6be3eb072fbde2440aee7de478edc20927b6f87248ebfc55e5741c17c033701cc95d24d9dd48bf8bc57e2e8ca44690f0fed28bcb07269641ebe1c193317", @nested={0x24, 0x38, [@typed={0xc, 0x30, @u64=0x3ff}, @typed={0x8, 0x76, @ipv4=@multicast2}, @typed={0x4, 0x66}, @typed={0x8, 0xd, @ipv4=@dev={0xac, 0x14, 0x14, 0x1c}}]}, @nested={0xf4, 0x35, [@typed={0x14, 0x7, @ipv6=@mcast1}, @generic="043d4758e761e3314351102962d72ffcfd8ad8efa06aa845d3e0fb9862436e4131d3468259e5eee3d8fb30c2924fc466fffaa1e2117b2a7bcb7943b14c1886737c4614fa15acfe598b6857f7fadf58ffbb49b6cbdbe242f6ae38cee86414856c11f7053fe8ce2f5c270ea0c9686656e9372c0826b86575c82e9fa1599f1338f85faf80f0f0cb531ec78a0a5a140cd9f5863467a3a51dd42254ccae80edc85cc736677b51f6c71bf1b400e52e3c60b37d94ab6e42901bdfc9e66663ce160d0d20612a42b8f07c46090cc05fd94cf738fc3fa525c5636ce832377fdb"]}, @typed={0xc, 0x6b, @u64=0x6}, @generic="8c684f233ff41d7ceaf8cb6bb40c956d7b7ecb9099b113ba803f9dc61d4602c09bf9b5b8bda2cbe37237bc542da7d0afba99af183c44df540fa5b18c8dd29bef7c02dd4fa30a84709ca6b69508ada6d284d1d15bb56db68b849dcdd1da7c4012d91b6d5f6b29d6877dfc9334c5021184fb628fcb1dd8fc49c3c142a252087a1ca6e7a302fda01d2521f17d97497f12e2563092efdf4941529a019c9939d75a3607e264c7514840fe4d8be5de78aa7cfc393f883e7f"]}, 0x29c}], 0x6, &(0x7f0000000dc0)=[@cred={0x20, 0x1, 0x2, r0, r8, r9}], 0x20, 0x8000}, 0x10) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r10 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r10, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') ptrace(0x10, r0) 14:50:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x2000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:36 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000100)={0xf, @raw_data="5b9ac056f2f7729db382bde8602dd786d52b735b2a5f8d56f6c79cb36b0615824ea1dd5f1429d5d54423760a0fd456937a41a5311b9692ea812b52cdc57c68137c89a64e8d55e00d664255ab4be57146d0a176db913f43873587388eafc0023eb986da513565ed7b206b97b81ea57f65874054ca85366325972bd541b06ddcad7d7631baf7c5f8256248d94cbc813fae38a7825391890c498376c5b322ab5074a517c5e5555c8ed1f0cec76a92c1352d92eb29b051d34065a19271621864509b33a1e0bf94cff7c1"}) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) fcntl$addseals(r2, 0x409, 0x1) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000200)={0x80000001, 0xfffffffffffffffb, 0x100, 0x3, 0x3dc, 0x101}) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r3, &(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000240), 0x1000) ptrace(0x10, r0) 14:50:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0xc0c0583b, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 14:50:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x300, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:36 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) dup3(r1, r2, 0x0) 14:50:36 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:36 executing program 5: munmap(&(0x7f0000010000/0x4000)=nil, 0x4000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x4c00, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:36 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x8001) ptrace(0x10, r0) 14:50:36 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) dup3(r1, r2, 0x0) 14:50:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x68, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:36 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)="6a667304", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:36 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x180, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000140)={r2, 0x9}, 0x8) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r3 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 339.107864] XFS (loop2): Invalid superblock magic number 14:50:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)="6c6f00966fd651b159a9c84a2c60d29800000020") 14:50:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0xffffffff00000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:37 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) dup3(0xffffffffffffffff, r1, 0x0) 14:50:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:37 executing program 5: munmap(&(0x7f000000e000/0x2000)=nil, 0x2000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:37 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x48000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:37 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x10001, 0x0) getdents64(r1, &(0x7f00000000c0)=""/7, 0x7) r2 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 339.793995] block nbd0: shutting down sockets 14:50:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x6c00, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:37 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() ptrace$cont(0x3f, r0, 0x7, 0x3) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000010000/0x1000)=nil, 0x1000}, 0x1}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x60, r2, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xaad}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbd76}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) r3 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:37 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) dup3(r1, 0xffffffffffffffff, 0x0) 14:50:37 executing program 4: 14:50:37 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 339.919198] XFS (loop2): Invalid superblock magic number 14:50:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x3000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:37 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 340.003979] block nbd0: shutting down sockets 14:50:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:37 executing program 4: 14:50:37 executing program 0: 14:50:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x1000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:37 executing program 4: 14:50:37 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)="6a66737f", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:37 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockname(0xffffffffffffff9c, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000040)=0x80) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x4, 0x30}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r2, 0x1ff}, &(0x7f0000000200)=0x8) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) setxattr$security_capability(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.capability\x00', &(0x7f0000000340)=@v3={0x3000000, [{0xf08d, 0x279}, {0x0, 0xd02d}], r3}, 0x18, 0x3) r4 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:37 executing program 0: 14:50:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x7a00, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:37 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x24c00, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000140)={0x3, 0x20, 0x1}) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r2 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f00000000c0)=""/80) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20100000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xf0, r3, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x401}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7fffffff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x4000000}, 0x810) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000380)=""/40) 14:50:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:50:37 executing program 0: [ 340.300635] XFS (loop2): Invalid superblock magic number 14:50:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x700, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:38 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)="6a66738c", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:50:38 executing program 0: 14:50:38 executing program 0: 14:50:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x10, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:50:38 executing program 0: [ 340.858055] XFS (loop2): Invalid superblock magic number 14:50:38 executing program 5: munmap(&(0x7f0000010000/0x2000)=nil, 0x2000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000040)=@fragment={0x3f, 0x0, 0x8, 0x0, 0x0, 0x10001, 0x66}, 0x8) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r2 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="786673cc", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0xa00000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:50:38 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)="6a667303", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:38 executing program 0: 14:50:38 executing program 0: 14:50:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:50:38 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x4c00000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:39 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:39 executing program 0: 14:50:39 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x1000000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 341.745915] IPVS: ftp: loaded support on port[0] = 21 [ 341.775110] XFS (loop2): Invalid superblock magic number [ 344.294510] device bridge_slave_1 left promiscuous mode [ 344.301017] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.380819] device bridge_slave_0 left promiscuous mode [ 344.386701] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.205657] team0 (unregistering): Port device team_slave_1 removed [ 348.218826] team0 (unregistering): Port device team_slave_0 removed [ 348.231000] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 348.279179] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 348.384747] bond0 (unregistering): Released all slaves [ 348.614049] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.620505] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.628208] device bridge_slave_0 entered promiscuous mode [ 348.674016] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.680473] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.688637] device bridge_slave_1 entered promiscuous mode [ 348.771111] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 348.880857] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 349.175356] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 349.273266] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 349.677175] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 349.684818] team0: Port device team_slave_0 added [ 349.729374] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 349.736875] team0: Port device team_slave_1 added [ 349.777766] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 349.785091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 349.800678] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 349.862881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 349.941467] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 349.948707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 349.964573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 350.000912] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 350.008184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 350.024554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 350.651335] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.657789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.664492] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.670902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.678468] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 351.605574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 352.330267] 8021q: adding VLAN 0 to HW filter on device bond0 [ 352.479436] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 352.633288] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 352.639837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 352.654782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.802260] 8021q: adding VLAN 0 to HW filter on device team0 14:50:54 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000040)={0x2, 0x8}) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) fchdir(r1) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f00000000c0)={0x8, 0x103, 0x2, {0x839, 0x1000, 0x7, 0x4}}) 14:50:54 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:50:54 executing program 0: 14:50:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x74, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:54 executing program 0: 14:50:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x5, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) [ 356.791853] XFS (loop2): Invalid superblock magic number 14:50:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x10000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:54 executing program 0: 14:50:54 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)="6a667310", &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:57 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x4000007ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$int_out(r1, 0x5462, &(0x7f0000000140)) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000040), &(0x7f00000000c0)=0x8) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r3 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d58297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a41c06bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:50:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:50:57 executing program 0: 14:50:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:50:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0xc200, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:57 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:57 executing program 0: 14:50:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x4, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:50:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:50:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0xb8450000, 0x0, 0x0) 14:50:57 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:50:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0xa, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 359.954257] XFS (loop2): Invalid superblock magic number [ 360.225075] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 360.509343] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 14:51:00 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) geteuid() getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) move_pages(r0, 0x5, &(0x7f0000000040)=[&(0x7f000000f000/0x1000)=nil, &(0x7f000000f000/0x8000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000015000/0x3000)=nil, &(0x7f0000010000/0x1000)=nil], &(0x7f00000000c0)=[0x100000001, 0xfffffffffffffc00, 0x2641], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x6) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) read(r1, &(0x7f0000000200)=""/59, 0x3b) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000240)) ptrace(0x10, r0) 14:51:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x100000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:51:00 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:51:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x2) readv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/21, 0x15}], 0x1) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r3, 0x1000000000016) 14:51:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x7000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 362.944527] serio: Serial port pts0 [ 362.971786] XFS (loop2): Invalid superblock magic number 14:51:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x6, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 363.013486] serio: Serial port pts0 14:51:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:00 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:51:00 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x3f, 0x8, 0x1, 0x2, 0xfffffffffffffff8, 0x0, 0x100000001, 0xdc75, 0x5, 0x100000001], 0xa, 0x9, 0x5, 0x7f, 0x1, 0x6, {0x7fff, 0x4, 0x100000001, 0x3f, 0x8, 0x3, 0x3f, 0x8, 0x9, 0x9, 0x3f, 0x5, 0x2, 0xfffffffffffffffe, "770075fc4b38f2e52a0ed50380fd336506bc9274585fce70288745b3982dae4d"}}) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000140)=0x68) r3 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:51:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 14:51:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x1000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:51:00 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(0xfffffffffffffffd, 0x5ec7b2a1ec7cda59, 0x2) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:51:00 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x7a000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:00 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:51:00 executing program 0: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @remote}, 0x0, 0x0, 0x4, 0x1}}, 0xffffffffffffff19) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 14:51:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x6800, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:00 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x6c000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:00 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:00 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:51:00 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs#', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 363.530313] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 363.549106] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 363.572527] attempt to access beyond end of device [ 363.583712] loop0: rw=12288, want=8200, limit=20 [ 363.590215] attempt to access beyond end of device [ 363.597368] loop0: rw=12288, want=12296, limit=20 [ 363.602984] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 363.620123] XFS (loop2): Invalid superblock magic number [ 363.632194] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 363.642294] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 363.660764] attempt to access beyond end of device [ 363.669051] loop0: rw=12288, want=8200, limit=20 [ 363.678291] attempt to access beyond end of device [ 363.684500] loop0: rw=12288, want=12296, limit=20 [ 363.689861] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 363.810187] XFS (loop2): Invalid superblock magic number 14:51:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfsX', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:51:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0xc2, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:01 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vsock\x00', 0x20000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r0, 0x50, &(0x7f0000000800)}, 0x10) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x4000000000005002}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x3, 0x2f) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000010005fba000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008071b0000000000"], 0x28}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socket$l2tp(0x18, 0x1, 0x1) ftruncate(r5, 0x8000009) write$P9_RXATTRCREATE(r5, &(0x7f0000000140)={0x383}, 0x7) syz_init_net_socket$bt_l2cap(0x1f, 0xfffffffffffffffd, 0x0) sendfile(r1, r5, &(0x7f0000d83ff8)=0x1834, 0x8000fffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x143, 0x1009}}, 0x20) 14:51:01 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:51:01 executing program 0: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @remote}, 0x0, 0x0, 0x4, 0x1}}, 0xffffffffffffff19) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 14:51:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x300000000000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:01 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x80, 0x0) clone(0x200, &(0x7f0000000140)="3fd39f3952c377194c5b19dcedf3e250b364fbbdb56715b064612883ad229e94db6ca6ec838f8f685cf0582c803e7db296c30b7636b8b1133621087df0411cb9bd86a321b2610806d16ea47a5299a5558f9ce09c6428d44a239d97aa2237b31e0b7ab41a2c256cc54e5f4e6ccc73f75a299c197b2614", &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)="83c3c0178fa4bd4018487b014fb59f1f98679705b25786fe4511fd2c4b3e99f777218b85905db23fd9b4876e582ba11af2d5ce1868f1c45696cb3907ce7c9762dca7d80a58f8403f90255a33fff08628ce5d9c8386d89a43a6ddfbbb1b89c6280ab642fdab3ce833729fca547ea50d3082b3732318dc9421ebe93e9b80aa1dc6") ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000440)={&(0x7f000000f000/0x2000)=nil, 0x1, 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x6}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000480)) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x401, 0x42) accept4$alg(r2, 0x0, 0x0, 0x800) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x101040, 0x0) syz_emit_ethernet(0x110, &(0x7f0000000300)={@empty, @dev={[], 0x11}, [{[{0x9100, 0x4, 0x8, 0x3}], {0x8100, 0x9, 0x7, 0x2}}], {@llc={0x4, {@snap={0x1, 0x1, 'j', "7fdc8f", 0xa00, "6a40ea5ca8205fc87cfd19c54df866a778ba5b59e7033f4a392e61411930b9f6420289100e0f222e75a6676dfc341460e8dbfee40855f957b24fa210ef274fd3a68a5c3c985709e3bdcb121696efc30a08a34292ef5a9d820619164cdb50dda757fe7f84d0aec4fff0062f0edb1eac5cd9fc24fe99f4c5361c35835cef0c49732d9228c77d42da10adc2972e6d73b038df16b5afc1aa1c91dae7959f877bf03963243e82302af3dda1bbdb32aca53d33c89dc080ba92d5bc58e9139847c6508685d594c670d231acca3580a15e214b1619c1cf383bb29a991c20c00475336f04aa741b8f2a47509e97f6c11e17397afa68d4"}}}}}, 0x0) getdents64(r3, &(0x7f0000000100)=""/64, 0xfffffffffffffec7) r4 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) [ 363.941141] Unknown ioctl 21531 14:51:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x4000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) [ 364.050386] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 364.082490] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 364.107249] attempt to access beyond end of device [ 364.116268] loop0: rw=12288, want=8200, limit=20 [ 364.123383] attempt to access beyond end of device [ 364.129646] loop0: rw=12288, want=12296, limit=20 [ 364.135308] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 14:51:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="786673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:51:01 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 364.162706] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 364.189000] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 14:51:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x5000000, 0x0, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) [ 364.215725] attempt to access beyond end of device [ 364.221432] loop0: rw=12288, want=8200, limit=20 [ 364.240457] attempt to access beyond end of device [ 364.258865] loop0: rw=12288, want=12296, limit=20 [ 364.264618] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 14:51:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0xa00000000000000, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:01 executing program 0: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @remote}, 0x0, 0x0, 0x4, 0x1}}, 0xffffffffffffff19) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 14:51:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x6000000, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) [ 364.554007] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 364.561108] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 364.571302] attempt to access beyond end of device [ 364.576375] loop0: rw=12288, want=8200, limit=20 [ 364.582028] attempt to access beyond end of device [ 364.587473] loop0: rw=12288, want=12296, limit=20 [ 364.592579] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 364.601787] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 364.609038] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 364.618337] attempt to access beyond end of device [ 364.623411] loop0: rw=12288, want=8200, limit=20 [ 364.629474] attempt to access beyond end of device [ 364.635126] loop0: rw=12288, want=12296, limit=20 [ 364.640199] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 14:51:04 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) madvise(&(0x7f000000f000/0x1000)=nil, 0x1000, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e22, @multicast2}, 0x200, 0x0, 0x0, 0x0, 0x4e4b, &(0x7f0000000040)='nr0\x00', 0x10001, 0x8, 0x9}) 14:51:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0xa00, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)="7866738a", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:51:04 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:51:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:04 executing program 0: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @remote}, 0x0, 0x0, 0x4, 0x1}}, 0xffffffffffffff19) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 14:51:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x3, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) [ 367.216351] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 367.231613] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 367.254846] attempt to access beyond end of device 14:51:04 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r0 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000100)={0x1d8, r1, 0xc00, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xcc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd0e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9e2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x60000000000000}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x46}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x64}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_SOCK={0x50, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2b}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8001}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x1d8}, 0x1, 0x0, 0x0, 0x4000}, 0x4844) 14:51:04 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:51:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x68, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 367.274015] loop0: rw=12288, want=8200, limit=20 [ 367.284331] attempt to access beyond end of device [ 367.296289] loop0: rw=12288, want=12296, limit=20 [ 367.307542] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 367.328663] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 367.338221] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 367.360590] attempt to access beyond end of device [ 367.373205] loop0: rw=12288, want=8200, limit=20 14:51:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:04 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$BLKFRASET(r1, 0x1264, &(0x7f00000000c0)=0x3) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r2 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:51:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x4c00000000000000, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 367.385163] attempt to access beyond end of device [ 367.397716] loop0: rw=12288, want=12296, limit=20 [ 367.407077] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 14:51:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x6c00000000000000, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 367.463278] XFS (loop2): Invalid superblock magic number 14:51:04 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001f80)={0x2, 0x0, 0x0, 0x0, 0xffffffffffffff9c}) 14:51:04 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:51:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x6c000000, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:05 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:51:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) 14:51:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:05 executing program 0: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x80, 0x0) clone(0x200, &(0x7f0000000140)="3fd39f3952c377194c5b19dcedf3e250b364fbbdb56715b064612883ad229e94db6ca6ec838f8f685cf0582c803e7db296c30b7636b8b1133621087df0411cb9bd86a321b2610806d16ea47a5299a5558f9ce09c6428d44a239d97aa2237b31e0b7ab41a2c256cc54e5f4e6ccc73f75a299c197b2614", &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)="83c3c0178fa4bd4018487b014fb59f1f98679705b25786fe4511fd2c4b3e99f777218b85905db23fd9b4876e582ba11af2d5ce1868f1c45696cb3907ce7c9762dca7d80a58f8403f90255a33fff08628ce5d9c8386d89a43a6ddfbbb1b89c6280ab642fdab3ce833729fca547ea50d3082b3732318dc9421ebe93e9b80aa1dc6") ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000440)={&(0x7f000000f000/0x2000)=nil, 0x1, 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x6}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000480)) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x401, 0x42) accept4$alg(r2, 0x0, 0x0, 0x800) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x101040, 0x0) syz_emit_ethernet(0x110, &(0x7f0000000300)={@empty, @dev={[], 0x11}, [{[{0x9100, 0x4, 0x8, 0x3}], {0x8100, 0x9, 0x7, 0x2}}], {@llc={0x4, {@snap={0x1, 0x1, 'j', "7fdc8f", 0xa00, "6a40ea5ca8205fc87cfd19c54df866a778ba5b59e7033f4a392e61411930b9f6420289100e0f222e75a6676dfc341460e8dbfee40855f957b24fa210ef274fd3a68a5c3c985709e3bdcb121696efc30a08a34292ef5a9d820619164cdb50dda757fe7f84d0aec4fff0062f0edb1eac5cd9fc24fe99f4c5361c35835cef0c49732d9228c77d42da10adc2972e6d73b038df16b5afc1aa1c91dae7959f877bf03963243e82302af3dda1bbdb32aca53d33c89dc080ba92d5bc58e9139847c6508685d594c670d231acca3580a15e214b1619c1cf383bb29a991c20c00475336f04aa741b8f2a47509e97f6c11e17397afa68d4"}}}}}, 0x0) getdents64(r3, &(0x7f0000000100)=""/64, 0xfffffffffffffec7) r4 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ptrace(0x10, r0) 14:51:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x7a000000, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x6c00, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:05 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:51:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x6c, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:05 executing program 5: munmap(&(0x7f000000f000/0x3000)=nil, 0x3000) r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f00000000c0)={0x2, 0x0, [], {0x0, @reserved}}) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r2 = memfd_create(&(0x7f0000000e40)="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", 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r2, 0x9, 0x5, r2}) execveat(r2, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) ioctl$VIDIOC_SUBDEV_S_EDID(r2, 0xc0285629, &(0x7f00000001c0)={0x0, 0x2, 0x5, [], &(0x7f0000000180)=0x3}) ptrace(0x10, r0) 14:51:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x7400000000000000, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) [ 367.939427] XFS (loop2): Invalid superblock magic number 14:51:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/216, 0xd8}], 0x1}}], 0x1, 0x0, 0x0) 14:51:05 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:51:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xf, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x700, 0x0, 0x6, 0x17}}, &(0x7f0000000180)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x7, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 14:51:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@noikeep='noikeep'}]}) [ 368.344284] XFS (loop2): Invalid superblock magic number [ 368.724308] ================================================================== [ 368.731882] BUG: KASAN: use-after-free in __list_del_entry_valid+0xf1/0x100 [ 368.738976] Read of size 8 at addr ffff8881c170f8f0 by task kworker/1:4/6431 [ 368.746160] [ 368.747788] CPU: 1 PID: 6431 Comm: kworker/1:4 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 368.756109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.765470] Workqueue: events_power_efficient neigh_periodic_work [ 368.771755] Call Trace: [ 368.774351] dump_stack+0x244/0x39d [ 368.777980] ? dump_stack_print_info.cold.1+0x20/0x20 [ 368.783165] ? printk+0xa7/0xcf [ 368.786443] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 368.791198] ? print_usage_bug+0xc0/0xc0 [ 368.795259] print_address_description.cold.4+0x9/0x1ff [ 368.800618] ? __list_del_entry_valid+0xf1/0x100 [ 368.805389] kasan_report.cold.5+0x1b/0x39 [ 368.809627] ? __list_del_entry_valid+0xf1/0x100 [ 368.814380] ? __list_del_entry_valid+0xf1/0x100 [ 368.819182] __asan_report_load8_noabort+0x14/0x20 [ 368.824177] __list_del_entry_valid+0xf1/0x100 [ 368.828763] neigh_mark_dead+0x13b/0x410 [ 368.832854] ? setup_net+0x568/0x8d0 [ 368.836597] ? neigh_change_state+0x680/0x680 [ 368.841112] ? kasan_check_write+0x14/0x20 [ 368.845344] ? do_raw_write_lock+0x14f/0x310 [ 368.849750] ? do_raw_read_unlock+0x70/0x70 [ 368.854068] ? __lock_is_held+0xb5/0x140 [ 368.858135] neigh_periodic_work+0x89a/0xc30 [ 368.862580] ? neigh_table_clear+0x390/0x390 [ 368.866993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.872543] ? check_preemption_disabled+0x48/0x280 [ 368.877607] ? __lock_is_held+0xb5/0x140 [ 368.881704] process_one_work+0xc90/0x1c40 [ 368.885950] ? mark_held_locks+0x130/0x130 [ 368.890189] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 368.894853] ? preempt_notifier_register+0x200/0x200 [ 368.899982] ? __switch_to_asm+0x34/0x70 [ 368.904041] ? __switch_to_asm+0x34/0x70 [ 368.908108] ? __switch_to_asm+0x40/0x70 [ 368.912171] ? __switch_to_asm+0x34/0x70 [ 368.916243] ? __switch_to_asm+0x40/0x70 [ 368.920296] ? __switch_to_asm+0x34/0x70 [ 368.924407] ? __switch_to_asm+0x34/0x70 [ 368.928482] ? __switch_to_asm+0x40/0x70 [ 368.932556] ? __switch_to_asm+0x34/0x70 [ 368.936609] ? __switch_to_asm+0x40/0x70 [ 368.940675] ? __switch_to_asm+0x34/0x70 [ 368.944729] ? __switch_to_asm+0x40/0x70 [ 368.948787] ? __switch_to_asm+0x34/0x70 [ 368.952872] ? __sched_text_start+0x8/0x8 [ 368.957028] ? graph_lock+0x270/0x270 [ 368.960851] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 368.965447] ? find_held_lock+0x36/0x1c0 [ 368.969533] ? lock_acquire+0x1ed/0x520 [ 368.973518] ? worker_thread+0x3e0/0x1390 [ 368.977674] ? kasan_check_write+0x14/0x20 [ 368.981906] ? do_raw_spin_lock+0x14f/0x350 [ 368.986221] ? __schedule+0x21e0/0x21e0 [ 368.990195] ? rwlock_bug.part.2+0x90/0x90 [ 368.994440] ? trace_hardirqs_on+0x310/0x310 [ 368.998981] worker_thread+0x17f/0x1390 [ 369.002950] ? preempt_notifier_register+0x200/0x200 [ 369.008090] ? process_one_work+0x1c40/0x1c40 [ 369.012601] ? __schedule+0xa49/0x21e0 [ 369.016495] ? __sched_text_start+0x8/0x8 [ 369.020692] ? __sched_text_start+0x8/0x8 [ 369.024890] ? __kthread_parkme+0xce/0x1a0 [ 369.029125] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 369.034232] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 369.039335] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 369.043940] ? trace_hardirqs_on+0xbd/0x310 [ 369.048257] ? kasan_check_read+0x11/0x20 [ 369.052414] ? __kthread_parkme+0xce/0x1a0 [ 369.056668] ? trace_hardirqs_off_caller+0x310/0x310 [ 369.061773] ? __schedule+0x21e0/0x21e0 [ 369.065752] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 369.070871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 369.076416] ? __kthread_parkme+0xfb/0x1a0 [ 369.080653] ? process_one_work+0x1c40/0x1c40 [ 369.085146] kthread+0x35a/0x440 [ 369.088520] ? kthread_stop+0x900/0x900 [ 369.092499] ret_from_fork+0x3a/0x50 [ 369.096218] [ 369.097838] Allocated by task 0: [ 369.101246] save_stack+0x43/0xd0 [ 369.104710] kasan_kmalloc+0xcb/0xd0 [ 369.108427] __kmalloc+0x15d/0x760 [ 369.111967] ___neigh_create+0x13fc/0x2600 [ 369.116208] __neigh_create+0x30/0x40 [ 369.120000] ip6_finish_output2+0xa64/0x2940 [ 369.124410] ip6_finish_output+0x58c/0xc60 [ 369.129101] ip6_output+0x232/0x9d0 [ 369.132824] ndisc_send_skb+0x1005/0x1560 [ 369.136983] ndisc_send_rs+0x134/0x6e0 [ 369.140884] addrconf_rs_timer+0x314/0x690 [ 369.145114] call_timer_fn+0x272/0x920 [ 369.148992] __run_timers+0x7e5/0xc70 [ 369.152801] run_timer_softirq+0x52/0xb0 [ 369.156894] __do_softirq+0x308/0xb7e [ 369.160681] [ 369.162305] Freed by task 16: [ 369.165415] save_stack+0x43/0xd0 [ 369.168865] __kasan_slab_free+0x102/0x150 [ 369.173123] kasan_slab_free+0xe/0x10 [ 369.176933] kfree+0xcf/0x230 [ 369.180050] rcu_process_callbacks+0xd91/0x15f0 [ 369.184745] __do_softirq+0x308/0xb7e [ 369.188532] [ 369.190154] The buggy address belongs to the object at ffff8881c170f680 [ 369.190154] which belongs to the cache kmalloc-1k of size 1024 [ 369.202811] The buggy address is located 624 bytes inside of [ 369.202811] 1024-byte region [ffff8881c170f680, ffff8881c170fa80) [ 369.214792] The buggy address belongs to the page: [ 369.219749] page:ffffea000705c380 count:1 mapcount:0 mapping:ffff8881da800ac0 index:0xffff8881c170f200 compound_mapcount: 0 [ 369.231038] flags: 0x2fffc0000010200(slab|head) [ 369.235706] raw: 02fffc0000010200 ffffea0006ddf488 ffffea00070df308 ffff8881da800ac0 [ 369.243582] raw: ffff8881c170f200 ffff8881c170e000 0000000100000002 0000000000000000 [ 369.251449] page dumped because: kasan: bad access detected [ 369.257177] [ 369.258826] Memory state around the buggy address: [ 369.263750] ffff8881c170f780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 369.271110] ffff8881c170f800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 369.278483] >ffff8881c170f880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 369.285833] ^ [ 369.292840] ffff8881c170f900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 369.300195] ffff8881c170f980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 369.307541] ================================================================== [ 369.314900] Disabling lock debugging due to kernel taint [ 369.320417] Kernel panic - not syncing: panic_on_warn set ... [ 369.326301] CPU: 1 PID: 6431 Comm: kworker/1:4 Tainted: G B 4.20.0-rc6-next-20181210+ #164 [ 369.335998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.345405] Workqueue: events_power_efficient neigh_periodic_work [ 369.351640] Call Trace: [ 369.354238] dump_stack+0x244/0x39d [ 369.357859] ? dump_stack_print_info.cold.1+0x20/0x20 [ 369.363085] ? __list_del_entry_valid+0x10/0x100 [ 369.367839] panic+0x2ad/0x632 [ 369.371042] ? add_taint.cold.5+0x16/0x16 [ 369.375190] ? trace_hardirqs_on+0xb4/0x310 [ 369.379513] ? __list_del_entry_valid+0xf1/0x100 [ 369.384265] end_report+0x47/0x4f [ 369.387715] kasan_report.cold.5+0xe/0x39 [ 369.391887] ? __list_del_entry_valid+0xf1/0x100 [ 369.396653] ? __list_del_entry_valid+0xf1/0x100 [ 369.401429] __asan_report_load8_noabort+0x14/0x20 [ 369.406352] __list_del_entry_valid+0xf1/0x100 [ 369.410944] neigh_mark_dead+0x13b/0x410 [ 369.415003] ? setup_net+0x568/0x8d0 [ 369.418761] ? neigh_change_state+0x680/0x680 [ 369.423249] ? kasan_check_write+0x14/0x20 [ 369.427489] ? do_raw_write_lock+0x14f/0x310 [ 369.431887] ? do_raw_read_unlock+0x70/0x70 [ 369.436203] ? __lock_is_held+0xb5/0x140 [ 369.440262] neigh_periodic_work+0x89a/0xc30 [ 369.444685] ? neigh_table_clear+0x390/0x390 [ 369.449125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 369.454694] ? check_preemption_disabled+0x48/0x280 [ 369.459724] ? __lock_is_held+0xb5/0x140 [ 369.463788] process_one_work+0xc90/0x1c40 [ 369.468047] ? mark_held_locks+0x130/0x130 [ 369.472312] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 369.476972] ? preempt_notifier_register+0x200/0x200 [ 369.482077] ? __switch_to_asm+0x34/0x70 [ 369.486130] ? __switch_to_asm+0x34/0x70 [ 369.490201] ? __switch_to_asm+0x40/0x70 [ 369.494250] ? __switch_to_asm+0x34/0x70 [ 369.498299] ? __switch_to_asm+0x40/0x70 [ 369.502362] ? __switch_to_asm+0x34/0x70 [ 369.506442] ? __switch_to_asm+0x34/0x70 [ 369.510496] ? __switch_to_asm+0x40/0x70 [ 369.514561] ? __switch_to_asm+0x34/0x70 [ 369.518618] ? __switch_to_asm+0x40/0x70 [ 369.522697] ? __switch_to_asm+0x34/0x70 [ 369.526769] ? __switch_to_asm+0x40/0x70 [ 369.530844] ? __switch_to_asm+0x34/0x70 [ 369.534905] ? __sched_text_start+0x8/0x8 [ 369.539042] ? graph_lock+0x270/0x270 [ 369.542838] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 369.547434] ? find_held_lock+0x36/0x1c0 [ 369.551492] ? lock_acquire+0x1ed/0x520 [ 369.555459] ? worker_thread+0x3e0/0x1390 [ 369.559603] ? kasan_check_write+0x14/0x20 [ 369.563828] ? do_raw_spin_lock+0x14f/0x350 [ 369.568169] ? __schedule+0x21e0/0x21e0 [ 369.572183] ? rwlock_bug.part.2+0x90/0x90 [ 369.576424] ? trace_hardirqs_on+0x310/0x310 [ 369.580846] worker_thread+0x17f/0x1390 [ 369.584810] ? preempt_notifier_register+0x200/0x200 [ 369.589954] ? process_one_work+0x1c40/0x1c40 [ 369.594446] ? __schedule+0xa49/0x21e0 [ 369.598330] ? __sched_text_start+0x8/0x8 [ 369.602475] ? __sched_text_start+0x8/0x8 [ 369.606641] ? __kthread_parkme+0xce/0x1a0 [ 369.610897] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 369.616033] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 369.621144] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 369.625741] ? trace_hardirqs_on+0xbd/0x310 [ 369.630059] ? kasan_check_read+0x11/0x20 [ 369.634219] ? __kthread_parkme+0xce/0x1a0 [ 369.638454] ? trace_hardirqs_off_caller+0x310/0x310 [ 369.643554] ? __schedule+0x21e0/0x21e0 [ 369.647528] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 369.652626] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 369.658174] ? __kthread_parkme+0xfb/0x1a0 [ 369.662413] ? process_one_work+0x1c40/0x1c40 [ 369.666933] kthread+0x35a/0x440 [ 369.670294] ? kthread_stop+0x900/0x900 [ 369.674264] ret_from_fork+0x3a/0x50 [ 369.679015] Kernel Offset: disabled [ 369.682643] Rebooting in 86400 seconds..