[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 70.024590][ T27] audit: type=1800 audit(1585872232.599:25): pid=9246 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 70.051790][ T27] audit: type=1800 audit(1585872232.599:26): pid=9246 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 70.094471][ T27] audit: type=1800 audit(1585872232.609:27): pid=9246 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.59' (ECDSA) to the list of known hosts. 2020/04/03 00:04:04 fuzzer started 2020/04/03 00:04:05 dialing manager at 10.128.0.26:35359 2020/04/03 00:04:05 syscalls: 2996 2020/04/03 00:04:05 code coverage: enabled 2020/04/03 00:04:05 comparison tracing: enabled 2020/04/03 00:04:05 extra coverage: enabled 2020/04/03 00:04:05 setuid sandbox: enabled 2020/04/03 00:04:05 namespace sandbox: enabled 2020/04/03 00:04:05 Android sandbox: /sys/fs/selinux/policy does not exist 2020/04/03 00:04:05 fault injection: enabled 2020/04/03 00:04:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/04/03 00:04:05 net packet injection: enabled 2020/04/03 00:04:05 net device setup: enabled 2020/04/03 00:04:05 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/04/03 00:04:05 devlink PCI setup: PCI device 0000:00:10.0 is not available 00:06:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x51, 0x4, &(0x7f0000000200)=[{&(0x7f00000000c0)="3ee668596a8ac231a3c88a611b8836045ef06d234af3e646493064e7054581f8a840bf", 0x23, 0x2}, {0x0, 0x0, 0xfffffffd}, {0x0}, {&(0x7f0000000940)}]) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) r0 = creat(0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x46000) r1 = creat(0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x46000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}]}) 00:06:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x51, 0x4, &(0x7f0000000200)=[{&(0x7f00000000c0), 0x0, 0x2}, {0x0, 0x0, 0xfffffffd}, {0x0}, {&(0x7f0000000940), 0x0, 0x805}]) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) r0 = creat(0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x46000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000140)={0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x28, &(0x7f0000000100)=[{}, {0x0}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000000)={r1, 0x2}) syzkaller login: [ 243.006728][ T9414] IPVS: ftp: loaded support on port[0] = 21 [ 243.189995][ T9414] chnl_net:caif_netlink_parms(): no params data found 00:06:45 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x403000) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX], 0x12) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 243.291515][ T9417] IPVS: ftp: loaded support on port[0] = 21 [ 243.293327][ T9414] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.306140][ T9414] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.316285][ T9414] device bridge_slave_0 entered promiscuous mode [ 243.327764][ T9414] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.335868][ T9414] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.346651][ T9414] device bridge_slave_1 entered promiscuous mode [ 243.382838][ T9414] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 243.400480][ T9414] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 243.428877][ T9414] team0: Port device team_slave_0 added [ 243.438623][ T9414] team0: Port device team_slave_1 added [ 243.515219][ T9414] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 243.522777][ T9414] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 243.550978][ T9414] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 243.583644][ T9414] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 243.590647][ T9414] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 243.618407][ T9414] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 243.665823][ T9422] IPVS: ftp: loaded support on port[0] = 21 00:06:46 executing program 3: socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xc}}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_int(r2, 0x29, 0x42, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x20) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) [ 243.713861][ T9417] chnl_net:caif_netlink_parms(): no params data found [ 243.776322][ T9414] device hsr_slave_0 entered promiscuous mode [ 243.852131][ T9414] device hsr_slave_1 entered promiscuous mode [ 243.927978][ T9425] IPVS: ftp: loaded support on port[0] = 21 00:06:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x51, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x2}, {0x0, 0x0, 0xfffffffd}, {0x0}, {&(0x7f0000000940), 0x0, 0x805}]) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) [ 244.068531][ T9417] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.092099][ T9417] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.111105][ T9417] device bridge_slave_0 entered promiscuous mode [ 244.141303][ T9417] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.162236][ T9417] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.170764][ T9417] device bridge_slave_1 entered promiscuous mode [ 244.259166][ T9417] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 244.316346][ T9417] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:06:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 244.362724][ T9430] IPVS: ftp: loaded support on port[0] = 21 [ 244.488997][ T9417] team0: Port device team_slave_0 added [ 244.516989][ T9417] team0: Port device team_slave_1 added [ 244.556552][ T9422] chnl_net:caif_netlink_parms(): no params data found [ 244.583099][ T9414] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 244.636698][ T9414] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 244.716396][ T9417] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 244.724062][ T9417] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 244.750123][ T9417] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 244.765010][ T9414] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 244.825950][ T9414] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 244.939413][ T9417] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 244.947437][ T9434] IPVS: ftp: loaded support on port[0] = 21 [ 244.951888][ T9417] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 244.979619][ T9417] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 244.991653][ T9425] chnl_net:caif_netlink_parms(): no params data found [ 245.102441][ T9430] chnl_net:caif_netlink_parms(): no params data found [ 245.193908][ T9417] device hsr_slave_0 entered promiscuous mode [ 245.232458][ T9417] device hsr_slave_1 entered promiscuous mode [ 245.271915][ T9417] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 245.279815][ T9417] Cannot create hsr debugfs directory [ 245.290194][ T9422] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.298353][ T9422] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.308947][ T9422] device bridge_slave_0 entered promiscuous mode [ 245.319615][ T9422] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.326778][ T9422] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.334802][ T9422] device bridge_slave_1 entered promiscuous mode [ 245.410287][ T9425] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.417640][ T9425] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.425890][ T9425] device bridge_slave_0 entered promiscuous mode [ 245.437919][ T9425] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.445148][ T9425] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.453049][ T9425] device bridge_slave_1 entered promiscuous mode [ 245.508693][ T9422] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 245.537903][ T9425] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 245.552046][ T9422] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 245.568444][ T9425] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 245.611583][ T9422] team0: Port device team_slave_0 added [ 245.617675][ T9430] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.625015][ T9430] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.633331][ T9430] device bridge_slave_0 entered promiscuous mode [ 245.662356][ T9422] team0: Port device team_slave_1 added [ 245.669604][ T9430] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.676987][ T9430] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.685575][ T9430] device bridge_slave_1 entered promiscuous mode [ 245.709282][ T9430] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 245.723757][ T9425] team0: Port device team_slave_0 added [ 245.746190][ T9430] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 245.762965][ T9425] team0: Port device team_slave_1 added [ 245.789619][ T9422] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 245.797988][ T9422] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 245.824651][ T9422] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 245.845882][ T9422] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 245.852965][ T9422] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 245.879478][ T9422] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 245.965449][ T9422] device hsr_slave_0 entered promiscuous mode [ 246.012274][ T9422] device hsr_slave_1 entered promiscuous mode [ 246.052855][ T9422] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 246.060455][ T9422] Cannot create hsr debugfs directory [ 246.089784][ T9425] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 246.096897][ T9425] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.122954][ T9425] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 246.136565][ T9425] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 246.143765][ T9425] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.169779][ T9425] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 246.185025][ T9430] team0: Port device team_slave_0 added [ 246.238516][ T9430] team0: Port device team_slave_1 added [ 246.258821][ T9434] chnl_net:caif_netlink_parms(): no params data found [ 246.281640][ T9417] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 246.395341][ T9425] device hsr_slave_0 entered promiscuous mode [ 246.432397][ T9425] device hsr_slave_1 entered promiscuous mode [ 246.471955][ T9425] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 246.479542][ T9425] Cannot create hsr debugfs directory [ 246.491047][ T9417] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 246.548469][ T9430] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 246.556209][ T9430] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.582514][ T9430] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 246.625934][ T9417] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 246.674335][ T9430] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 246.681305][ T9430] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.707770][ T9430] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 246.732441][ T9417] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 246.917582][ T9434] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.924826][ T9434] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.932942][ T9434] device bridge_slave_0 entered promiscuous mode [ 246.944928][ T9414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.995507][ T9430] device hsr_slave_0 entered promiscuous mode [ 247.052493][ T9430] device hsr_slave_1 entered promiscuous mode [ 247.093082][ T9430] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 247.100667][ T9430] Cannot create hsr debugfs directory [ 247.120412][ T9434] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.127721][ T9434] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.136031][ T9434] device bridge_slave_1 entered promiscuous mode [ 247.163691][ T9434] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 247.191107][ T9434] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 247.231178][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.239462][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.256562][ T9434] team0: Port device team_slave_0 added [ 247.270488][ T9414] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.289991][ T9422] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 247.334177][ T9422] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 247.387874][ T9422] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 247.448930][ T9434] team0: Port device team_slave_1 added [ 247.469493][ T9422] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 247.564988][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.581042][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.589841][ T3860] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.597072][ T3860] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.607057][ T9434] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 247.614499][ T9434] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.640789][ T9434] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 247.657418][ T9434] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 247.664866][ T9434] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.691205][ T9434] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 247.707867][ T9425] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 247.754904][ T9425] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 247.816832][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.825857][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.834944][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.844086][ T3841] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.851136][ T3841] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.897076][ T9425] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 247.967184][ T9425] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 248.055290][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 248.071863][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.080439][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 248.089515][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.098664][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 248.107494][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.165803][ T9434] device hsr_slave_0 entered promiscuous mode [ 248.212275][ T9434] device hsr_slave_1 entered promiscuous mode [ 248.252690][ T9434] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 248.260274][ T9434] Cannot create hsr debugfs directory [ 248.304071][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 248.314663][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 248.323977][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 248.333481][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 248.341842][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 248.385242][ T9414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 248.444442][ T9430] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 248.509267][ T9417] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.544702][ T9430] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 248.565811][ T9430] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 248.658314][ T9434] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 248.725821][ T9430] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 248.790763][ T9417] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.808068][ T9434] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 248.864472][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.875347][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.902166][ T9434] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 248.935849][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.944808][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.953682][ T2681] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.960748][ T2681] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.969043][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.978038][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.986614][ T2681] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.993908][ T2681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.002891][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 249.010432][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 249.018684][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.037488][ T9434] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 249.111799][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 249.136370][ T9414] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 249.157727][ T9422] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.180986][ T9422] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.191218][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 249.200091][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.209043][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.217638][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.225894][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.235513][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 249.275589][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.287174][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.297262][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 249.305764][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.314350][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.323826][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.332545][ T3860] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.339624][ T3860] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.348341][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.357113][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.365848][ T3860] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.372962][ T3860] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.380922][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.398063][ T9417] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 249.412692][ T9417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 249.439389][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 249.449419][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 249.458528][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 249.467579][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 249.476479][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.485366][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.529894][ T9425] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.545296][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 249.554203][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.563471][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.572283][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 249.580887][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 249.589836][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 249.598643][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.629774][ T9414] device veth0_vlan entered promiscuous mode [ 249.658826][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 249.667782][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 249.676230][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 249.690563][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 249.699777][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 249.708363][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 249.741113][ T9422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 249.760443][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.770940][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.786274][ T9414] device veth1_vlan entered promiscuous mode [ 249.799578][ T9425] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.811433][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 249.822818][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 249.830541][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 249.879300][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 249.887943][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.897529][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.908466][ T3853] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.915820][ T3853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.925062][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.933740][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.942245][ T3853] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.949291][ T3853] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.957215][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 249.964672][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 249.972147][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 249.981133][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.000727][ T9430] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.014195][ T9417] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 250.032254][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 250.040863][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 250.053218][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.066675][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 250.080329][ T9422] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 250.117948][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.125768][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.134335][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.143661][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.154971][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 250.165119][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.173584][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 250.182370][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.190575][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 250.199111][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.214450][ T9434] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.233903][ T9414] device veth0_macvtap entered promiscuous mode [ 250.248121][ T9430] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.264961][ T9425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 250.275372][ T9414] device veth1_macvtap entered promiscuous mode [ 250.313443][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 250.321658][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 250.331940][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.342111][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.350467][ T2681] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.357673][ T2681] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.371221][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.379301][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.392356][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.432572][ T9414] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 250.440716][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 250.450010][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.459823][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.468602][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.477173][ T9442] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.484743][ T9442] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.494111][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 250.503356][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.512382][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 250.519798][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 250.527482][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 250.536404][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 250.556643][ T9425] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 250.568104][ T9434] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.587552][ T9414] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 250.596123][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.606150][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 250.614755][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.623612][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 250.632842][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 250.641474][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.650094][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.682744][ T9417] device veth0_vlan entered promiscuous mode [ 250.709608][ T9430] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 250.720926][ T9430] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 250.741382][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 250.750280][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 250.760704][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.769432][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.778595][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.787612][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 250.796090][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.805379][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.814413][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.823577][ T3841] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.830631][ T3841] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.838286][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 250.848480][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.857046][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 250.864962][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 250.872798][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.923964][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.936313][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.945085][ T3841] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.952201][ T3841] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.959986][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.971154][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 250.979818][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.999896][ T9417] device veth1_vlan entered promiscuous mode [ 251.017149][ T9422] device veth0_vlan entered promiscuous mode [ 251.036853][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.045708][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 251.055737][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.065063][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.074343][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.083299][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 251.094210][ T3860] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.272278][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.280157][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.290152][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.299648][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.308748][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.317465][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 251.326508][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 251.341564][ T9434] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 251.354921][ T9434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 251.419189][ T9430] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 251.429831][ T9422] device veth1_vlan entered promiscuous mode [ 251.450260][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.459945][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.474699][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 251.486685][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 251.502801][ T9425] device veth0_vlan entered promiscuous mode [ 251.528984][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.538453][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 251.546819][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 251.558717][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 251.576306][ T9417] device veth0_macvtap entered promiscuous mode [ 251.592393][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 251.600509][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 251.618677][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.669660][ T9425] device veth1_vlan entered promiscuous mode [ 251.697708][ T9434] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 251.720345][ T9422] device veth0_macvtap entered promiscuous mode [ 251.761584][ T9417] device veth1_macvtap entered promiscuous mode [ 251.810986][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 251.819486][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 251.828276][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 251.849035][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 251.858350][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 251.872297][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 251.880930][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 251.890465][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 251.945702][ T9422] device veth1_macvtap entered promiscuous mode [ 251.970107][ T9417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 251.996113][ T9417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.010670][ T9417] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 252.018415][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 252.027768][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 00:06:54 executing program 0: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) pipe(&(0x7f0000000180)) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x1ff}, &(0x7f0000000440), 0x0) [ 252.040002][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 252.062555][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 252.082325][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.090259][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 00:06:54 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x58, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000000c0)={0x7f499eb2ae778c31}) [ 252.129531][ T9425] device veth0_macvtap entered promiscuous mode [ 252.149661][ T9430] device veth0_vlan entered promiscuous mode [ 252.160063][ T9417] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 252.191409][ T9417] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.217214][ T9417] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 252.235478][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 252.244754][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 252.254284][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 252.273885][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.285147][ T9425] device veth1_macvtap entered promiscuous mode [ 252.307349][ T9422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 252.319121][ T9422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.329540][ T9422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 252.340784][ T9422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.352596][ T9422] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 252.363208][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 252.371184][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 252.380399][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 252.389903][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 252.400679][ T9430] device veth1_vlan entered promiscuous mode [ 252.428471][ T9422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 252.439629][ T9422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.450041][ T9422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 252.460838][ T9422] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 00:06:55 executing program 0: setxattr$security_capability(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f0000000380)=@v2={0x2000000, [{0x380400, 0x4}, {0x4, 0x2}]}, 0x14, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)) ioprio_set$pid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x2, 0x8001, 0x0, 0x0, 0x0, 0x18, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc125, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xfffffffffffffffd, 0x0, 0x4, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) semget$private(0x0, 0x4, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x2) [ 252.473867][ T9422] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 252.571668][ T9425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 252.583997][ T9425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.601079][ T9425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 252.617726][ T9425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.628885][ T9425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 252.652072][ T9425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.666491][ T9425] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 252.676086][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 252.691222][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 252.699890][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 252.709412][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.718721][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 252.728778][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 252.804666][ T9425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 252.821797][ T9425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.832876][ T9425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 252.843538][ T9425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.861746][ T9425] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 252.872698][ T9425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.885894][ T9425] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 252.918571][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 252.928671][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 252.937637][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 252.946575][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.956317][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 00:06:55 executing program 0: r0 = perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0xb) [ 252.965678][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.074465][ T9434] device veth0_vlan entered promiscuous mode [ 253.092407][ T9430] device veth0_macvtap entered promiscuous mode [ 253.099782][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.109876][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.118157][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.127559][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 00:06:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0x7d, &(0x7f00000002c0)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @multicast1}}}}, &(0x7f0000000380)=0xb0) [ 253.228818][ T9434] device veth1_vlan entered promiscuous mode [ 253.244511][ T9430] device veth1_macvtap entered promiscuous mode [ 253.255647][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 253.268566][ C0] hrtimer: interrupt took 27641 ns [ 253.506854][ T9430] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.520109][ T9430] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.543495][ T9430] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.572561][ T9430] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.582638][ T9430] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.593620][ T9430] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.603558][ T9430] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.614680][ T9430] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.626186][ T9430] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 253.636610][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.658192][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 00:06:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000100), 0xc, 0x0}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x5f) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000080)={0x5c77}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000003c0)={[0x0, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x1000004cc, 0x0, 0x0, 0xfffffffffffffffd], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 253.701945][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.710837][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.781477][ T9434] device veth0_macvtap entered promiscuous mode [ 253.812783][ T9430] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 253.875787][ T9430] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 00:06:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="b131dc30d5c25b0d0300000081d06d5dce08f285fc35c8f98d8336d6ca1eba1cdf20ebe813cc0676238a021a09240177cb2ddc72e2f7c920cc1df07222dc692c4f4e20ec4acc4831d79c36627684bec4008e000000000000000000000000009dbd4c416c0cf7a4826c8b564ce534d2d5a23bc4a5fb7b20379ab3e787ee173cf0b9e003c05ddf99d96221867d9388e970fb7bee5a04382507965cd3c0145c5284eb5f3df92397cf2ea8d53cde56a8609b4d576a5eb3883df607705929ea82c00f9f9fbfe321620ab518a96fffc3255eb56db62e267c13af8b78d5f519ac28", @ANYBLOB="5266f4251952e76e1a5c04f34df8ee3713044eee7f7a2bb752d46130ebf92155ef4860bb13c1c9f54b1c608499934601744d0365652f0f2ede6829e4220a2738453d3537f4c30d115f578a7bcdf77e95e6ef70afd1c39075f08ddd518edf2587cc89cf16859fbc097f67873597352e79849f7e25649524d5", @ANYBLOB="299f82d0cb54ef7accb405bf872b8ed145cab982ff26647ef37d7411812a85f7ca01fff64673df2e51681250c2833b86d71068a3d144266c8f", @ANYRESOCT], 0x0, 0x1a6}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/6, 0x6}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 253.920238][ T9430] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 253.936736][ T9526] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 253.972087][ T9430] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.016387][ T9430] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.047245][ T9430] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.071655][ T9430] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.105784][ T9430] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.137708][ T9430] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 254.166737][ T9434] device veth1_macvtap entered promiscuous mode [ 254.207185][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 254.216173][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.224381][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.233257][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 254.318117][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.354467][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.375903][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.387510][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.397803][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.409063][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.419186][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.430801][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.440941][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.451611][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.464662][ T9434] batman_adv: batadv0: Interface activated: batadv_slave_0 00:06:57 executing program 3: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x10000}, 0x0) clone(0x503, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) [ 254.497740][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 254.510471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 254.606711][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.639613][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.674600][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.697916][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.719571][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.731500][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.748987][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.760311][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 00:06:57 executing program 2: setxattr$security_capability(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f0000000380)=@v2={0x2000000, [{0x380400, 0x4}, {0x4, 0x2}]}, 0x14, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30009, 0x0) sync_file_range(0xffffffffffffffff, 0x1, 0x7, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) getrlimit(0xd, &(0x7f00000000c0)) ioprio_set$pid(0x0, 0x0, 0x0) pipe(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x50, 0x0, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_MAC={0xa, 0x6, @remote}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x50}}, 0x20040) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) semget$private(0x0, 0x4, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x2) 00:06:57 executing program 0: setxattr$security_capability(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f0000000380)=@v2={0x2000000, [{0x380400, 0x4}, {0x4, 0x2}]}, 0x14, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30009, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)) ioprio_set$pid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x2, 0x8001, 0x0, 0x0, 0x0, 0x18, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x50, 0x0, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_MAC={0xa, 0x6, @remote}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x50}}, 0x20040) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) semget$private(0x0, 0x4, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x2) [ 254.770665][ T9434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.781828][ T9434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.808470][ T9434] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 254.881317][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.894981][ T9442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 00:06:58 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x10000}, 0x0) clone(0x503, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) 00:07:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d6a4cf10ce619a25ac9fa07fdffed203782ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b1003f5435282d27194a232de4acfd96ca06d6c6c2ec7937c23b418118d2e3f904c989499190019750a47e57192d77d68322761ecb212454c947f9af561badc0", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:00 executing program 3: mkdirat(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x6, 0x0, 0x0, 0x10000017}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x3, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb920888ba4784466ebedb0400060000000000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce96477e96a1b651d2d3405a8e1ae68541484f993adb8fe151d28dfa5c132d07519db532efed97d204c71e21aa7a3f20c799086b421437617adaed844c064697c25f85e4a714d7382902c98a523c490fac8ebbc0660d04a4822ad8c5d9717f63ca7a5a690c067ef"], 0x79) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) socket$bt_hidp(0x1f, 0x3, 0x6) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 00:07:00 executing program 2: mkdirat(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x6, 0x0, 0x0, 0x10000017}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x3}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb920888ba4784466ebedb0400060000000000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce96477e96a1b651d2d3405a8e1ae68541484f993adb8fe151d28dfa5c132d07519db532efed97d204c71e21aa7a3f20c799086b421437617adaeb844c064697c25f85e4a714d7382902c98a523c490fac8ebbc0660d04a4822ad8c5d9717f63ca7a5a690c067ef"], 0x79) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) socket$bt_hidp(0x1f, 0x3, 0x6) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 00:07:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00000000000007ff1028e6c467144d2fa8336f1039f938fea40fde3d2c3887175ed104ffab548940d1756f4decdd88e66c81169f7cc003d86999c29bd7d780bd8792a409c3764a0828a505995b7d2dc356c8b584fdd56750b72d147d00000000e78b240754e90d72abc2dd57434f5b6a1d72fed1785fc80792148d2e425feb7e8a1d7c06"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000400ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000700)=@gettfilter={0x24, 0x24, 0x221, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x2, 0x4}}}, 0x24}}, 0x0) 00:07:00 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r1) 00:07:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000300)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:07:01 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000300)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:07:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) [ 258.624909][ T9626] 9pnet: p9_fd_create_tcp (9626): problem connecting socket to 127.0.0.1 00:07:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000300)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x2f, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 00:07:01 executing program 1: [ 258.712015][ T9626] 9pnet: p9_fd_create_tcp (9626): problem connecting socket to 127.0.0.1 00:07:01 executing program 4: 00:07:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:04 executing program 0: 00:07:04 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:04 executing program 1: 00:07:04 executing program 4: 00:07:04 executing program 3: 00:07:04 executing program 1: 00:07:04 executing program 3: 00:07:04 executing program 4: [ 261.583060][ T9660] 9pnet: p9_fd_create_tcp (9660): problem connecting socket to 127.0.0.1 00:07:04 executing program 0: 00:07:04 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:04 executing program 4: [ 261.921233][ T9679] 9pnet: p9_fd_create_tcp (9679): problem connecting socket to 127.0.0.1 00:07:07 executing program 0: 00:07:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:07 executing program 3: 00:07:07 executing program 4: 00:07:07 executing program 1: 00:07:07 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:07 executing program 1: 00:07:07 executing program 3: 00:07:07 executing program 4: 00:07:07 executing program 0: [ 264.633906][ T9688] 9pnet: p9_fd_create_tcp (9688): problem connecting socket to 127.0.0.1 00:07:07 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:07 executing program 1: [ 264.905586][ T9704] 9pnet: p9_fd_create_tcp (9704): problem connecting socket to 127.0.0.1 00:07:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:10 executing program 4: 00:07:10 executing program 3: 00:07:10 executing program 0: 00:07:10 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:10 executing program 1: 00:07:10 executing program 3: 00:07:10 executing program 1: 00:07:10 executing program 0: 00:07:10 executing program 4: [ 267.702641][ T9718] 9pnet: p9_fd_create_tcp (9718): problem connecting socket to 127.0.0.1 00:07:10 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:10 executing program 3: [ 267.973428][ T9735] 9pnet: p9_fd_create_tcp (9735): problem connecting socket to 127.0.0.1 00:07:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:13 executing program 4: 00:07:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x84}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)) socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000340)={0x1}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) 00:07:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x404, 0x0, 0x0, 0x0, 0x206}}], 0x1, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@multicast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x14, 0x3a, 0xff, @empty, @mcast2, {[], @ndisc_ns={0x87, 0x0, 0x0, @dev}}}}}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$invalidate(0x15, r2) bind$inet6(r1, &(0x7f0000f5dfe4), 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udp6\x00') preadv(r3, &(0x7f00000017c0), 0x333, 0x4c00) 00:07:13 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r0) 00:07:13 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:13 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 270.814521][ T9747] 9pnet: p9_fd_create_tcp (9747): problem connecting socket to 127.0.0.1 00:07:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 00:07:13 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:13 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:07:13 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x7f, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) [ 271.136309][ T9771] 9pnet: p9_fd_create_tcp (9771): problem connecting socket to 127.0.0.1 00:07:13 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:07:16 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:07:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:16 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:16 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') restart_syscall() ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000580)='environ\x00') syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nvram(0xffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x0, 0x0) fcntl$getown(r1, 0x9) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 00:07:16 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) 00:07:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4020ae46, &(0x7f0000000000)={0x1, 0x0, [{0x0, 0x0, 0x0, 0x0, @sint={0x0, 0xffff}}]}) 00:07:16 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 00:07:16 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:16 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 00:07:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00000000000007ff1028e6c467144d2fa8336f1039f938fea40fde3d2c3887175ed104ffab548940d1756f4decdd88e66c81169f7cc003d86999c29bd7d780bd8792a409c3764a0828a505995b7d2dc356c8b584fdd56750b72d147d00000000e78b240754e90d72abc2dd57434f5b6a1d72fed1785fc80792148d2e425feb7e8a1d7c06"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000400ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000700)=@gettfilter={0x24, 0x25, 0x221, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x2, 0x4}}}, 0x24}}, 0x0) 00:07:16 executing program 0: r0 = msgget(0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) msgget(0x1, 0x254) [ 274.028818][ T9809] 9pnet: p9_fd_create_tcp (9809): problem connecting socket to 127.0.0.1 00:07:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$tun(r0, &(0x7f0000000200)={@void, @val, @mpls={[], @ipv4=@dccp={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x84, 0x0, @remote, @rand_addr=0xfffffff8, {[@ssrr={0x89, 0x3}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "f404e6", 0x0, '\a\x00`'}}}}}, 0x32) 00:07:16 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) [ 274.338426][ T9831] 9pnet: p9_fd_create_tcp (9831): problem connecting socket to 127.0.0.1 00:07:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:19 executing program 1: sched_setattr(0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8}]}}}]}, 0x38}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10800, 0x2, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, 0x0, 0x8000) fchown(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @random="089fb614e102", 'syzkaller0\x00'}}, 0x80) 00:07:19 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 00:07:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002a80)=[{{&(0x7f0000000000)={0x2, 0x4e24, @remote}, 0x10, 0x0}}, {{&(0x7f00000001c0)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x10, 0x11}}], 0x10}}], 0x2, 0x0) 00:07:19 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:19 executing program 3: sched_setattr(0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) syz_genetlink_get_family_id$wireguard(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r2}]}}}]}, 0x38}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYBLOB="01002bbd7000fbdbdf250100000024000300a0cb879a47f5bc644c0e693fa6d031c74a1553b6e901b9ff2f518c78042fb5421404020077673200000000000000000000000000140002001367310000000000000000000000000008000100", @ANYRES32=r3, @ANYBLOB="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"/780], 0x4}}, 0xd8f6a02a79f6aa63) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10800, 0x2, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, 0x0, 0x8000) fchown(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @random="089fb614e102", 'syzkaller0\x00'}}, 0x80) 00:07:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x0, 0x0, 0x0, @dev, @mcast2}}}}, 0x0) [ 276.946660][ T9842] 9pnet: p9_fd_create_tcp (9842): problem connecting socket to 127.0.0.1 00:07:19 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/vmallocinfo\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x100000064) [ 277.089675][ T9848] IPVS: ftp: loaded support on port[0] = 21 [ 277.101605][ T9847] IPVS: ftp: loaded support on port[0] = 21 00:07:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x0, 0x0, 0x0, @dev, @mcast2}}}}, 0x0) [ 277.238757][ T9862] 9pnet: p9_fd_create_tcp (9862): problem connecting socket to 127.0.0.1 00:07:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x0, 0x0, 0x0, @dev, @mcast2}}}}, 0x0) 00:07:19 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) [ 277.710338][ T9848] IPVS: ftp: loaded support on port[0] = 21 [ 277.764402][ T9881] IPVS: ftp: loaded support on port[0] = 21 [ 277.981890][ T1124] tipc: TX() has been purged, node left! 00:07:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:22 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x8, 0x0, 0x0, @dev, @mcast2, {[@srh]}}}}}, 0x0) 00:07:22 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:22 executing program 3: sched_setattr(0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) syz_genetlink_get_family_id$wireguard(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r2}]}}}]}, 0x38}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYBLOB="01002bbd7000fbdbdf250100000024000300a0cb879a47f5bc644c0e693fa6d031c74a1553b6e901b9ff2f518c78042fb5421404020077673200000000000000000000000000140002001367310000000000000000000000000008000100", @ANYRES32=r3, @ANYBLOB="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"/780], 0x4}}, 0xd8f6a02a79f6aa63) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10800, 0x2, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, 0x0, 0x8000) fchown(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @random="089fb614e102", 'syzkaller0\x00'}}, 0x80) 00:07:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141842, 0x0) pwrite64(r1, &(0x7f0000000000)="c2", 0x1, 0x1961) write$UHID_INPUT(r1, &(0x7f0000000480)={0x8, {"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", 0x1000}}, 0x1006) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, 0x0, 0x40008080fffffffa) 00:07:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/vmallocinfo\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x100000064) 00:07:22 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:22 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x8, 0x0, 0x0, @dev, @mcast2, {[@srh]}}}}}, 0x0) [ 280.130548][ T9902] IPVS: ftp: loaded support on port[0] = 21 00:07:22 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:22 executing program 1: 00:07:23 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x8, 0x0, 0x0, @dev, @mcast2, {[@srh]}}}}}, 0x0) [ 280.442132][ T9919] 9pnet: p9_fd_create_tcp (9919): problem connecting socket to 127.0.0.1 00:07:23 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) [ 280.656355][ T9929] 9pnet: p9_fd_create_tcp (9929): problem connecting socket to 127.0.0.1 [ 281.961852][ T1124] tipc: TX() has been purged, node left! [ 282.131878][ T1124] tipc: TX() has been purged, node left! [ 282.302035][ T1124] tipc: TX() has been purged, node left! [ 282.471845][ T1124] tipc: TX() has been purged, node left! 00:07:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:25 executing program 1: 00:07:25 executing program 4: syz_emit_ethernet(0x46, &(0x7f0000000100)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x10, 0x3a, 0x0, @empty={[0x3]}, @mcast2, {[], @ni}}}}}, 0x0) 00:07:25 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:25 executing program 3: sched_setattr(0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) syz_genetlink_get_family_id$wireguard(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r2}]}}}]}, 0x38}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYBLOB="01002bbd7000fbdbdf250100000024000300a0cb879a47f5bc644c0e693fa6d031c74a1553b6e901b9ff2f518c78042fb5421404020077673200000000000000000000000000140002001367310000000000000000000000000008000100", @ANYRES32=r3, @ANYBLOB="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"/780], 0x4}}, 0xd8f6a02a79f6aa63) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10800, 0x2, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, 0x0, 0x8000) fchown(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @random="089fb614e102", 'syzkaller0\x00'}}, 0x80) 00:07:25 executing program 0: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 00:07:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x40ee1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3800109, 0x11, r0, 0x0) write(r0, &(0x7f0000000000), 0x52698b21) 00:07:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xdd388e3c88ea0516, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:07:25 executing program 2: exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:25 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRES32], 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c00000323892e3f0000003d2c0b94941336b8000206000000000000"], 0x1c}}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, 0x0) [ 283.136803][ T9946] 9pnet: p9_fd_create_tcp (9946): problem connecting socket to 127.0.0.1 [ 283.313145][ T9941] IPVS: ftp: loaded support on port[0] = 21 00:07:25 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRES32], 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[]}}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000100)=@v2={0x2, @aes256, 0x0, [], "e1b63f4b5ef9902923666d581bc0668b"}) 00:07:25 executing program 2: exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='wchan\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:28 executing program 2: exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:28 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 00:07:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = open(0x0, 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) r3 = socket$unix(0x1, 0x2, 0x0) sendto(r3, &(0x7f00000000c0)="77b1", 0x2, 0x14, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 00:07:28 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:28 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffffffffffeae, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffea8, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200085}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) read$dsp(r1, 0x0, 0xc) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f00000000c0)={0xc021, 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 00:07:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/arp\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000000640)=""/132, 0x84}], 0x1}}], 0x1, 0x0, 0x0) preadv(r2, &(0x7f00000017c0), 0x315, 0x800000) 00:07:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='wchan\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:29 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:29 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:31 executing program 1: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001cb, 0x0) 00:07:31 executing program 3: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001cf, 0x0) 00:07:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='wchan\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:31 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:31 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:31 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRESOCT, @ANYRES64, @ANYBLOB="a7b33cad84000000000200000085a7c5959263093c6547c70921d903f191f3b5253e8e92fad95582c8405601000080236747a6cdf02d4d9d95a6b464336d4f7eadad3878640848d2e5fa8b4739d9fb4ec5d1755bf6dcaf0ce489acb76f111dac3c0000000000", @ANYPTR], 0x0, 0x8d}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x1000021e, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:32 executing program 1: set_mempolicy(0x1, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000000000800"], 0x2000, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) 00:07:32 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:32 executing program 3: 00:07:32 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) [ 292.031934][ T1124] tipc: TX() has been purged, node left! 00:07:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:34 executing program 1: 00:07:34 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:34 executing program 3: 00:07:34 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:35 executing program 3: 00:07:35 executing program 1: 00:07:35 executing program 4: 00:07:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:35 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:35 executing program 3: 00:07:35 executing program 1: [ 292.643568][T10122] 9pnet: p9_fd_create_tcp (10122): problem connecting socket to 127.0.0.1 [ 295.204997][ T0] NOHZ: local_softirq_pending 08 00:07:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:37 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:37 executing program 4: 00:07:37 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:37 executing program 1: 00:07:37 executing program 3: 00:07:38 executing program 3: 00:07:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x11) 00:07:38 executing program 3: unshare(0x2040400) r0 = getpgrp(0xffffffffffffffff) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x101a00, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000200)={[0x2, 0x4, 0x5000, 0x4], 0x7, 0x0, 0x9}) semop(0x0, &(0x7f000001a000)=[{}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)='em1em0$\x00', 0xffffffffffffffff}, 0x30) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000280)) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000300)={0x5, 0x80, 0x6274, 0x40, 0xb60, 0x8}) r2 = gettid() rt_sigtimedwait(&(0x7f00000000c0)={[0x24]}, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x1) 00:07:38 executing program 1: syz_open_procfs(0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) wait4(0x0, 0x0, 0x0, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0xfffd}], 0x1) tkill(r1, 0x1) 00:07:38 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) [ 295.539261][T10148] 9pnet: p9_fd_create_tcp (10148): problem connecting socket to 127.0.0.1 00:07:38 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) [ 295.868294][T10180] 9pnet: p9_fd_create_tcp (10180): problem connecting socket to 127.0.0.1 00:07:41 executing program 1: openat$vfio(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/vfio/vfio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x7, 0x40000) r0 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, &(0x7f0000000280)={0x0, @data}) close(r0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x1, 0x0, @mcast2, 0x4}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 00:07:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 00:07:41 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:41 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x989680}, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r1, 0x4bfb, &(0x7f0000000800)={0x0, "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"}) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080)=0x998, 0x4) write$binfmt_elf64(r1, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x0, 0x0, 0x85, 0x8, 0x3, 0x0, 0x3, 0x3dc, 0x40, 0x10e, 0x8, 0x4e8, 0x38, 0x2, 0x8000, 0x8, 0xf464}, [{0x60000000, 0x0, 0x80, 0x0, 0x0, 0x9, 0x7, 0x1}], "d6c6d019e5913b0169310fa2ad8453b38e5b7ab3e9bafa223fede370fd7a47322eda91b6dc833f8e56925c62e74ce5101565b72ccd439430902ac1", [[], [], [], [], []]}, 0x5b3) 00:07:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 298.498954][T10206] 9pnet: p9_fd_create_tcp (10206): problem connecting socket to 127.0.0.1 00:07:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) [ 298.533466][T10212] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 00:07:41 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:41 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0xffffffff) [ 298.812308][T10229] 9pnet: p9_fd_create_tcp (10229): problem connecting socket to 127.0.0.1 00:07:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) nanosleep(0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) close(r1) 00:07:41 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) open(0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000004c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000700000004000000c80300000000000000000000d0010000e0020000e0020000e002000004000000000000000000000000000000ac1e000100000000000000000000aaaaaaaaaabb0000000000000000000000ff00ffff0000000001000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000076657468305f746f5f7465616d0000007663616e3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028004d41524b000000000000000000000000000000000000000000000800000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e800000000000000000000000000000000000000000000000000280041554449540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000c000100100000000000000000000000000000000000000000000000050006d616e676c650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffac1414aa0f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @remote, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @local, @multicast1, @dev, @multicast1}}}}, 0x0) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24004047, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) setresuid(0x0, 0x0, 0x0) geteuid() syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x60c40, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB, @ANYBLOB]) [ 299.195168][T10245] 9pnet: p9_fd_create_tcp (10245): problem connecting socket to 127.0.0.1 [ 299.336222][T10252] x_tables: duplicate underflow at hook 1 00:07:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d6a4cf10ce619a25ac9fa07fdffed203782ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b1003f5435282d27194a232de4acfd96ca06d6c6c2ec7937c23b418118d2e3f904c989499190019750a47e57192d77d68322761ecb212454c947f9af561badc0", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:44 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:44 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:44 executing program 3: unshare(0x2040400) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0xfffd}], 0x1) tkill(r1, 0x1) 00:07:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) open(0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @remote, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @local, @multicast1, @dev, @multicast1}}}}, 0x0) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24004047, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) setresuid(0x0, 0x0, 0x0) geteuid() syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x60c40, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB, @ANYBLOB]) 00:07:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_targets\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) 00:07:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) [ 301.634666][T10283] x_tables: duplicate underflow at hook 1 [ 301.646115][T10284] 9pnet: p9_fd_create_tcp (10284): problem connecting socket to 127.0.0.1 00:07:44 executing program 1: 00:07:44 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:44 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:44 executing program 4: [ 301.838748][T10299] 9pnet: p9_fd_create_tcp (10299): problem connecting socket to 127.0.0.1 00:07:44 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) [ 302.039938][T10311] 9pnet: p9_fd_create_tcp (10311): problem connecting socket to 127.0.0.1 00:07:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:47 executing program 1: 00:07:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:47 executing program 4: 00:07:47 executing program 3: 00:07:47 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:47 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:47 executing program 1: 00:07:47 executing program 4: 00:07:47 executing program 3: 00:07:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:47 executing program 4: 00:07:47 executing program 1: [ 304.920117][T10341] 9pnet: p9_fd_create_tcp (10341): problem connecting socket to 127.0.0.1 00:07:47 executing program 3: 00:07:47 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:47 executing program 3: 00:07:47 executing program 4: 00:07:47 executing program 1: 00:07:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) [ 305.244310][T10361] 9pnet: p9_fd_create_tcp (10361): problem connecting socket to 127.0.0.1 00:07:47 executing program 4: 00:07:47 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:48 executing program 1: 00:07:48 executing program 3: [ 305.451053][T10380] 9pnet: p9_fd_create_tcp (10380): problem connecting socket to 127.0.0.1 00:07:48 executing program 0: io_uring_setup(0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:48 executing program 1: 00:07:48 executing program 4: 00:07:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:50 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:50 executing program 3: 00:07:50 executing program 4: 00:07:50 executing program 1: 00:07:50 executing program 0: io_uring_setup(0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:50 executing program 4: 00:07:50 executing program 1: 00:07:50 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x393) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000040)=0xfffefffc, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1c) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 308.283954][T10402] 9pnet: p9_fd_create_tcp (10402): problem connecting socket to 127.0.0.1 00:07:50 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:50 executing program 0: io_uring_setup(0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:51 executing program 1: [ 308.661245][T10426] 9pnet: p9_fd_create_tcp (10426): problem connecting socket to 127.0.0.1 00:07:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:53 executing program 4: 00:07:53 executing program 1: 00:07:53 executing program 0: io_uring_setup(0xd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:53 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:53 executing program 3: 00:07:54 executing program 4: 00:07:54 executing program 1: 00:07:54 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) clone3(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) unshare(0x40000000) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) 00:07:54 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:54 executing program 0: io_uring_setup(0xd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:54 executing program 4: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='.\x00', 0xc0000080) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) [ 311.691290][T10454] IPVS: ftp: loaded support on port[0] = 21 [ 312.050651][T10454] IPVS: ftp: loaded support on port[0] = 21 [ 312.361842][ T7] tipc: TX() has been purged, node left! 00:07:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d6a4cf10ce619a25ac9fa07fdffed203782ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b1003f5435282d27194a232de4acfd96ca06d6c6c2ec7937c23b418118d2e3f904c989499190019750a47e57192d77d68322761ecb212454c947f9af561badc0", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:56 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='.\x00', 0xc0000080) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYPTR64=&(0x7f0000000140)=ANY=[], @ANYRES32=0x0], 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r3, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 00:07:56 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:56 executing program 0: io_uring_setup(0xd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:56 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, 0x0) clone3(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) unshare(0x40000000) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) 00:07:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="b131dc30d5c25b0d0300000081d06d5dce08f285fc35c8f98d8336d6ca1eba1cdf20ebe813cc0676238a021a09240177cb2ddc72e2f7c920cc1df07222dc692c4f4e20ec4acc4831d79c36627684bec4008e000000000000000000000000009dbd4c416c0cf7a4826c", @ANYBLOB="5266f4251952e76e1a5c04f34df8ee3713044eee7f7a2bb752d46130ebf92155ef4860bb13c1c9f54b1c608499934601744d0365652f0f2ede6829e4220a2738453d3537f4c30d115f578a7bcdf77e95e6ef70afd1c39075f08ddd518edf2587cc89cf16859fbc097f67873597352e79849f7e25649524d5a88667183d593fcad71db72745db8fac1fa54e08f143f1696086993cc251317a9808d21c270b5273a51400ba2da50006bf3141eb7716926add11bd9b9bbafa9afacd7595bcd215961da2d591ee5c84065532d62eab8bb92cc618004604d55e3bcdec7fcaa1b34cf059cb33182836419d9e57a696f10d28", @ANYBLOB="299f82d0cb54ef7accb405bf872b8ed145cab982ff26647ef37d7411812a85f7ca01fff64673df2e51681250c2833b86d71068a3d144266c8f25096a", @ANYRESOCT], 0x0, 0x1ab}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/6, 0x6}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 314.500468][T10476] IPVS: ftp: loaded support on port[0] = 21 00:07:57 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:57 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', 0x0, &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d6a4cf10ce619a25ac9fa07fdffed203782ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b1003f5435282d27194a232de4acfd96ca06d6c6c2ec7937c23b418118d2e3f904c989499190019750a47e57192d77d68322761ecb212454c947f9af561badc0", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:07:57 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', 0x0, &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:57 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:07:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d6a4cf10ce619a25ac9fa07fdffed203782ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b1003f5435282d27194a232de4acfd96ca06d6c6c2ec7937c23b418118d2e3f904c989499190019750a47e57192d77d68322761ecb212454c947f9af561badc0", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 00:07:58 executing program 1: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) 00:07:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 00:07:58 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', 0x0, &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:07:58 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) [ 316.701855][ T7] tipc: TX() has been purged, node left! [ 316.921865][ T7] tipc: TX() has been purged, node left! 00:08:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0xc4042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x800002, 0x0) write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[], 0x0) sendfile(r0, r1, 0x0, 0x200004) 00:08:00 executing program 3 (fault-call:0 fault-nth:0): syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:00 executing program 1: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207a07e4f1e000000880344fb0a000200030ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 00:08:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 00:08:00 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:00 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 317.498091][T10553] FAULT_INJECTION: forcing a failure. [ 317.498091][T10553] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 317.558144][T10553] CPU: 0 PID: 10553 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 317.568191][T10553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.578252][T10553] Call Trace: [ 317.581642][T10553] dump_stack+0x188/0x20d [ 317.586534][T10553] should_fail.cold+0x5/0x14 [ 317.591180][T10553] ? mark_lock+0xbc/0x1220 [ 317.591826][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 317.591837][ T27] audit: type=1800 audit(1585872480.129:31): pid=10565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16878 res=0 [ 317.595621][T10553] ? setup_fault_attr+0x1e0/0x1e0 [ 317.626746][T10553] ? __lock_acquire+0x827/0x5270 [ 317.629070][ T27] audit: type=1800 audit(1585872480.129:32): pid=10565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16878 res=0 [ 317.631791][T10553] __alloc_pages_nodemask+0x17a/0x820 [ 317.631851][T10553] ? up_write+0x148/0x470 [ 317.661663][T10553] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 317.667501][T10553] ? tun_build_skb.isra.0+0x1dc/0x13c0 [ 317.673050][T10553] alloc_pages_current+0xff/0x200 [ 317.678201][T10553] skb_page_frag_refill+0x25d/0x560 [ 317.683426][T10553] tun_build_skb.isra.0+0x252/0x13c0 [ 317.688744][T10553] ? tun_xdp_act.isra.0+0x800/0x800 [ 317.693954][T10553] ? find_held_lock+0x2d/0x110 [ 317.699321][T10553] ? aa_file_perm+0x5a8/0x14d0 [ 317.704124][T10553] ? mark_lock+0xbc/0x1220 00:08:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="8400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="ad11060001000000440012800e00010069703665727370616e000000300002800400120068c853df80e879a1050016000200000008000100", @ANYRESDEC=r2, @ANYBLOB="05000b002000000008000100", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001f00020000000800040081000000080028008ceb0000"], 0x9}, 0x1, 0x0, 0x0, 0x4044000}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$SIOCX25SCALLUSERDATA(r3, 0x89e5, &(0x7f0000000240)={0x1c, "a10d8e8de4483a53751b3607f8a2343db4bcfcc47d46b41bad4e80592ad0ab1ec48019cc518ca8a17ba8495d3b86b62fd62532a9b370b51d95716395537203e0cbd60aa47545431f02a8d6b4e3428fdcbdab7915db49ba2cd2e417ee49bf9103702ff753081225ecf8cb96cca034f94354107d981db1b065f3b2a558b00c4eb3"}) [ 317.708562][T10553] tun_get_user+0x834/0x3be0 [ 317.713197][T10553] ? tun_build_skb.isra.0+0x13c0/0x13c0 [ 317.718727][T10553] ? tun_get+0x16d/0x290 [ 317.722966][T10553] ? lock_downgrade+0x7f0/0x7f0 [ 317.727967][T10553] ? rcu_read_lock_held_common+0x130/0x130 [ 317.733791][T10553] tun_chr_write_iter+0xb0/0x147 [ 317.738825][T10553] do_iter_readv_writev+0x59c/0x840 [ 317.744036][T10553] ? no_seek_end_llseek_size+0x60/0x60 [ 317.749530][T10553] do_iter_write+0x185/0x600 [ 317.754160][T10553] vfs_writev+0x1b3/0x2f0 00:08:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x81}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000011000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000240)={0x200, 0x4, 0xc6a, 0xfff, 0xfffb, 0x5}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = semget$private(0x0, 0x2000000010a, 0x0) semop(r2, &(0x7f0000000100)=[{0x0, 0xfffffffffffefffc}], 0x1) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$GETPID(r2, 0x4, 0xb, &(0x7f0000000000)=""/53) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x1000, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x4cb, 0x10001, 0x0, 0x2]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 317.758500][T10553] ? vfs_iter_write+0xa0/0xa0 [ 317.763200][T10553] ? rcu_read_lock_held_common+0x130/0x130 [ 317.769092][T10553] ? do_dup2+0x520/0x520 [ 317.773369][T10553] ? __fget_light+0x208/0x270 [ 317.778071][T10553] do_writev+0x133/0x2f0 [ 317.782326][T10553] ? vfs_writev+0x2f0/0x2f0 [ 317.786905][T10553] ? __ia32_sys_clock_settime+0x260/0x260 [ 317.792692][T10553] ? trace_hardirqs_off_caller+0x55/0x230 [ 317.798502][T10553] do_syscall_64+0xf6/0x790 [ 317.803027][T10553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.809049][T10553] RIP: 0033:0x45c701 [ 317.812954][T10553] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 317.832574][T10553] RSP: 002b:00007f2d72fcebc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 317.840997][T10553] RAX: ffffffffffffffda RBX: 000000000000004e RCX: 000000000045c701 [ 317.848980][T10553] RDX: 0000000000000001 RSI: 00007f2d72fcebf0 RDI: 00000000000000f0 00:08:00 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) [ 317.857058][T10553] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000000000000 [ 317.865036][T10553] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 317.873019][T10553] R13: 0000000000000bb0 R14: 00000000004cdd69 R15: 0000000000000000 00:08:00 executing program 1: r0 = memfd_create(&(0x7f0000000080)='Nwlan\x91\xfe5\x9b\xf6\x06\x16\xa0', 0x5) fchmod(r0, 0x0) sched_getparam(0x0, &(0x7f0000000000)) mlockall(0x4) 00:08:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:00 executing program 3 (fault-call:0 fault-nth:1): syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:00 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:00 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:00 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) msgget(0x0, 0x8) socket$inet(0x2, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000080)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x85c, &(0x7f0000000000)=[{}]}, 0x10) 00:08:00 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, 0x0) 00:08:00 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:00 executing program 1: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) socket$packet(0x11, 0x2, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x68, r4, 0x5, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x60, @media='ib\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r4, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008001}, 0x40800) 00:08:01 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) [ 318.423620][T10611] FAULT_INJECTION: forcing a failure. [ 318.423620][T10611] name failslab, interval 1, probability 0, space 0, times 1 [ 318.519520][T10611] CPU: 1 PID: 10611 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 318.523785][T10618] 9pnet_virtio: no channels available for device 127.0.0.1 [ 318.529449][T10611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.529455][T10611] Call Trace: [ 318.529482][T10611] dump_stack+0x188/0x20d [ 318.529507][T10611] should_fail.cold+0x5/0x14 [ 318.558952][T10611] ? setup_fault_attr+0x1e0/0x1e0 [ 318.563999][T10611] ? lock_downgrade+0x7f0/0x7f0 [ 318.569060][T10611] should_failslab+0x5/0xf [ 318.573766][T10611] kmem_cache_alloc+0x44/0x730 [ 318.578552][T10611] ? copyin+0xf3/0x140 [ 318.582654][T10611] __build_skb+0x21/0x60 [ 318.586915][T10611] build_skb+0x1c/0x180 [ 318.591089][T10611] tun_build_skb.isra.0+0xb89/0x13c0 [ 318.596532][T10611] ? tun_xdp_act.isra.0+0x800/0x800 [ 318.601739][T10611] ? find_held_lock+0x2d/0x110 [ 318.606520][T10611] ? aa_file_perm+0x5a8/0x14d0 [ 318.611308][T10611] ? mark_lock+0xbc/0x1220 [ 318.615758][T10611] tun_get_user+0x834/0x3be0 [ 318.617111][T10632] ptrace attach of "/root/syz-executor.5"[10631] was attempted by "/root/syz-executor.5"[10632] [ 318.620382][T10611] ? tun_build_skb.isra.0+0x13c0/0x13c0 [ 318.620401][T10611] ? tun_get+0x16d/0x290 [ 318.640705][T10611] ? lock_downgrade+0x7f0/0x7f0 [ 318.645586][T10611] ? rcu_read_lock_held_common+0x130/0x130 [ 318.651546][T10611] tun_chr_write_iter+0xb0/0x147 [ 318.656518][T10611] do_iter_readv_writev+0x59c/0x840 [ 318.661826][T10611] ? no_seek_end_llseek_size+0x60/0x60 [ 318.667326][T10611] do_iter_write+0x185/0x600 [ 318.671963][T10611] vfs_writev+0x1b3/0x2f0 [ 318.676314][T10611] ? vfs_iter_write+0xa0/0xa0 [ 318.681001][T10611] ? rcu_read_lock_held_common+0x130/0x130 [ 318.686966][T10611] ? do_dup2+0x520/0x520 [ 318.691234][T10611] ? __mutex_unlock_slowpath+0xe2/0x660 [ 318.696815][T10611] ? __fget_light+0x208/0x270 [ 318.701512][T10611] do_writev+0x133/0x2f0 [ 318.705770][T10611] ? vfs_writev+0x2f0/0x2f0 [ 318.710280][T10611] ? __ia32_sys_clock_settime+0x260/0x260 00:08:01 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, 0x0) [ 318.716024][T10611] ? trace_hardirqs_off_caller+0x55/0x230 [ 318.721770][T10611] do_syscall_64+0xf6/0x790 [ 318.726395][T10611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.732297][T10611] RIP: 0033:0x45c701 [ 318.736207][T10611] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 318.753744][T10637] 9pnet_virtio: no channels available for device 127.0.0.1 00:08:01 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 318.756024][T10611] RSP: 002b:00007f2d72fcebc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 318.756038][T10611] RAX: ffffffffffffffda RBX: 000000000000004e RCX: 000000000045c701 [ 318.756047][T10611] RDX: 0000000000000001 RSI: 00007f2d72fcebf0 RDI: 00000000000000f0 [ 318.756056][T10611] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000000000000 [ 318.756064][T10611] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 318.756072][T10611] R13: 0000000000000bb0 R14: 00000000004cdd69 R15: 0000000000000001 00:08:01 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) [ 318.865048][T10648] ptrace attach of "/root/syz-executor.5"[10647] was attempted by "/root/syz-executor.5"[10648] 00:08:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x1}]}]}}, &(0x7f00000001c0)=""/258, 0x2e, 0x102, 0x8}, 0x20) socket$inet_mptcp(0x2, 0x1, 0x106) 00:08:01 executing program 3 (fault-call:0 fault-nth:2): syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:01 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, 0x0) 00:08:01 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:01 executing program 1: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000080)="66baf80cb86a903085ef66bafc0c66b8500066ef0fc75adf3e0f01c3c443d969c683c7442400af630000c744240200600000c7442406000000000f011c240f01c266400f3881b100300000c744240000000000c7442402ca000000c7442406000000000f0114242e0f380552572e650f8900000100", 0x75}], 0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x10, &(0x7f0000000080)={r5}, 0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000180)={r5, 0x1, 0x9, 0x7fffffff, 0x24, 0x5}, &(0x7f00000001c0)=0x14) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c0000000001ff050000000000000000000000003c0001002c000100140003000000000000000000000000000000000114000400fe800000000000000059df00000000bb0c0002000500010000000000240002000c000200050001000000000014000100080001ab0000000008000200e00000010800070000000000080003"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 319.110865][T10661] ptrace attach of "/root/syz-executor.5"[10660] was attempted by "/root/syz-executor.5"[10661] [ 319.146368][T10663] BPF:[1] FUNC_PROTO (anon) 00:08:01 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d6a4cf10ce619a25ac9fa07fdffed203782ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b1003f5435282d27194a232de4acfd96ca06d6c6c2ec7937c23b418118d2e3f904c989499190019750a47e57192d77d68322761ecb212454c947f9af561badc0", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 319.164481][T10663] BPF:return=0 args=( [ 319.177862][T10667] 9pnet_virtio: no channels available for device 127.0.0.1 [ 319.185407][T10663] BPF:vararg 00:08:01 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 319.237449][T10663] BPF:) [ 319.240361][T10663] BPF: [ 319.248152][T10675] sctp: [Deprecated]: syz-executor.1 (pid 10675) Use of struct sctp_assoc_value in delayed_ack socket option. [ 319.248152][T10675] Use struct sctp_sack_info instead [ 319.256681][T10663] BPF:Invalid arg#1 [ 319.317926][T10663] BPF: [ 319.317926][T10663] 00:08:01 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}}) [ 319.339814][T10663] BPF:[1] FUNC_PROTO (anon) [ 319.346657][T10663] BPF:return=0 args=( [ 319.351660][T10663] BPF:vararg [ 319.359550][T10663] BPF:) 00:08:02 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:02 executing program 3: syz_emit_ethernet(0xd, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 319.398294][T10663] BPF: [ 319.405784][T10663] BPF:Invalid arg#1 [ 319.418015][T10663] BPF: [ 319.418015][T10663] [ 319.462436][T10690] 9pnet: p9_fd_create_tcp (10690): problem connecting socket to 127.0.0.1 00:08:02 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) socket$rds(0x15, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0xd1, &(0x7f0000000840)=ANY=[@ANYBLOB="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", @ANYRESDEC=r2, @ANYRES64=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x9}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0xf, 0x0, 0x2}, 0x10}, 0x78) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000180)=0x40) 00:08:02 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}}) 00:08:02 executing program 3: syz_emit_ethernet(0x8e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 319.798488][T10713] 9pnet: p9_fd_create_tcp (10713): problem connecting socket to 127.0.0.1 00:08:02 executing program 1: prctl$PR_GET_CHILD_SUBREAPER(0x25) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6611, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) 00:08:02 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlinkat(&(0x7f00000002c0)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0/file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000100)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) sendto$inet(r1, &(0x7f00000012c0), 0x0, 0x11, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'macvtap0\x00', {0x2, 0x4e24, @loopback}}) 00:08:02 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}}) 00:08:02 executing program 3: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 320.094243][T10735] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.102970][T10735] bridge0: port 1(bridge_slave_0) entered disabled state 00:08:02 executing program 3: syz_emit_ethernet(0x2000004e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 320.140732][T10746] 9pnet: p9_fd_create_tcp (10746): problem connecting socket to 127.0.0.1 00:08:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 320.187694][T10735] device bridge0 entered promiscuous mode 00:08:02 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:02 executing program 3: syz_emit_ethernet(0x7ffff000, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 320.791467][T10745] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 320.810142][T10745] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.818100][T10745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.828778][T10745] bridge0: port 1(bridge_slave_0) entered blocking state 00:08:03 executing program 1: prctl$PR_GET_CHILD_SUBREAPER(0x25) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6611, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) 00:08:03 executing program 3: syz_emit_ethernet(0xfffffdef, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:03 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:03 executing program 2: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:03 executing program 4: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) [ 320.837245][T10745] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.857623][T10745] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 320.868949][T10735] syz-executor.1 (10735) used greatest stack depth: 22824 bytes left 00:08:03 executing program 3: syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:03 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x0}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 321.041568][T10798] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.048862][T10798] bridge0: port 1(bridge_slave_0) entered disabled state 00:08:03 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:03 executing program 2: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:03 executing program 4 (fault-call:6 fault-nth:0): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:03 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x2}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 321.426490][T10823] FAULT_INJECTION: forcing a failure. [ 321.426490][T10823] name failslab, interval 1, probability 0, space 0, times 0 [ 321.458868][T10823] CPU: 1 PID: 10823 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 321.459312][T10799] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 321.468794][T10823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.468801][T10823] Call Trace: [ 321.468827][T10823] dump_stack+0x188/0x20d [ 321.468851][T10823] should_fail.cold+0x5/0x14 [ 321.468867][T10823] ? lock_downgrade+0x7f0/0x7f0 [ 321.468884][T10823] ? setup_fault_attr+0x1e0/0x1e0 [ 321.468912][T10823] should_failslab+0x5/0xf [ 321.468926][T10823] __kmalloc_track_caller+0x2d1/0x790 [ 321.468940][T10823] ? strndup_user+0x70/0xe0 [ 321.468954][T10823] ? vfs_write+0x15b/0x5c0 [ 321.468971][T10823] ? fput_many+0x2f/0x1a0 [ 321.468990][T10823] memdup_user+0x22/0xd0 [ 321.469006][T10823] strndup_user+0x70/0xe0 [ 321.469026][T10823] __x64_sys_mount+0xe6/0x230 [ 321.469048][T10823] do_syscall_64+0xf6/0x790 [ 321.469073][T10823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.516332][T10799] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.520198][T10823] RIP: 0033:0x45c849 [ 321.520220][T10823] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 321.520229][T10823] RSP: 002b:00007f22de119c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 321.520252][T10823] RAX: ffffffffffffffda RBX: 00007f22de11a6d4 RCX: 000000000045c849 [ 321.525462][T10799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.529148][T10823] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 321.529159][T10823] RBP: 000000000076bfa0 R08: 00000000200004c0 R09: 0000000000000000 [ 321.529166][T10823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 321.529184][T10823] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000000 [ 321.535460][T10799] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.651175][T10799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.673274][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 00:08:06 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x3}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:06 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:06 executing program 4 (fault-call:6 fault-nth:1): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:06 executing program 2: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe80, 0xfffffe6f, &(0x7f0000000100)="480e003f0000007e5bc5795eca00054300ffffffba0e7200ffff08", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) [ 323.487418][T10836] FAULT_INJECTION: forcing a failure. [ 323.487418][T10836] name failslab, interval 1, probability 0, space 0, times 0 [ 323.542789][T10836] CPU: 1 PID: 10836 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 323.552977][T10836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.563214][T10836] Call Trace: [ 323.566523][T10836] dump_stack+0x188/0x20d [ 323.570879][T10836] should_fail.cold+0x5/0x14 [ 323.575530][T10836] ? lock_downgrade+0x7f0/0x7f0 [ 323.580403][T10836] ? setup_fault_attr+0x1e0/0x1e0 [ 323.585459][T10836] should_failslab+0x5/0xf [ 323.589895][T10836] __kmalloc_track_caller+0x2d1/0x790 [ 323.595274][T10836] ? strndup_user+0x70/0xe0 [ 323.599797][T10836] ? __might_fault+0x190/0x1d0 [ 323.604575][T10836] ? _copy_from_user+0x123/0x190 [ 323.609530][T10836] memdup_user+0x22/0xd0 [ 323.613789][T10836] strndup_user+0x70/0xe0 [ 323.618135][T10836] __x64_sys_mount+0x12f/0x230 [ 323.622921][T10836] do_syscall_64+0xf6/0x790 [ 323.627438][T10836] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.633330][T10836] RIP: 0033:0x45c849 [ 323.637231][T10836] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.656840][T10836] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 323.665269][T10836] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 323.673865][T10836] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 323.681857][T10836] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 00:08:06 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:06 executing program 1: mq_unlink(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008d}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x80100, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000540)="d85ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a05000000000000000000000010008107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637a51d482394f2181e31ff307a2ace003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d3", 0xc0, r0) r2 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000000)="03", 0x1, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r1, r3}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) r4 = memfd_create(&(0x7f0000000000)='dummY0\x00', 0x0) r5 = geteuid() fsetxattr$system_posix_acl(r4, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000018c0)=ANY=[@ANYBLOB="020000000100000000080000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x7, 0x0) r6 = getgid() keyctl$chown(0x4, r3, r5, r6) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}}) 00:08:06 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x4}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 323.689837][T10836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 323.697824][T10836] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000001 00:08:06 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3b8}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[]}}, 0x40805) r0 = socket(0x10, 0x80002, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x111000) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:08:06 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x8}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:06 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:06 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000140)={0x0, 0x78, 0x0, &(0x7f0000000100)=0x8000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file0,workdir=./file1\\\x00']) io_setup(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000040)={0x1, 0x0, [0x0]}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) io_setup(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f00000003c0)={0x0, 0x0}) 00:08:06 executing program 4 (fault-call:6 fault-nth:2): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) [ 324.180960][T10883] FAULT_INJECTION: forcing a failure. [ 324.180960][T10883] name failslab, interval 1, probability 0, space 0, times 0 [ 324.230223][T10883] CPU: 1 PID: 10883 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 324.240156][T10883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.250218][T10883] Call Trace: [ 324.253524][T10883] dump_stack+0x188/0x20d [ 324.258878][T10883] should_fail.cold+0x5/0x14 [ 324.263490][T10883] ? lock_downgrade+0x7f0/0x7f0 [ 324.268353][T10883] ? setup_fault_attr+0x1e0/0x1e0 [ 324.273404][T10883] should_failslab+0x5/0xf [ 324.277837][T10883] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 324.283222][T10883] ? __might_fault+0x190/0x1d0 [ 324.287997][T10883] ? _copy_from_user+0x123/0x190 [ 324.292953][T10883] copy_mount_options+0x53/0x160 [ 324.297906][T10883] __x64_sys_mount+0x15b/0x230 [ 324.302689][T10883] do_syscall_64+0xf6/0x790 [ 324.307206][T10883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.313097][T10883] RIP: 0033:0x45c849 [ 324.316995][T10883] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.336749][T10883] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 324.345785][T10883] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 324.353767][T10883] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 324.361765][T10883] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 324.368701][T10880] overlayfs: filesystem on './file0' not supported as upperdir [ 324.369788][T10883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 324.369797][T10883] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000002 00:08:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:09 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0xf}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:09 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6b) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x6d3f346481c00de6, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000001640)={0x5, 0x5, 0x4, 0x9, 0x5, 0x100, 0x8, 0x20}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="6000000024000705000000000007000000000000", @ANYRES32=r1, @ANYBLOB="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"], 0x60}}, 0x0) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r6, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) getsockopt$IP_VS_SO_GET_SERVICE(r5, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) ioctl$KVM_GET_SUPPORTED_CPUID(r6, 0xc008ae05, &(0x7f0000000000)=""/83) r7 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f0000000340)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}, {0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)="c347c4c3c969783fae1594c90d570c58ed12f2e7b991a6408be3b2cb3a0d577be6859a08b7669cce08e0da28677adfa1eab4fac39ad9198af369bc4d5f93c08f20099233c35b2ab511fac3f59539d84e1db87220b93da153a2d6faa7aff80fe4ce7c1e1b7345ba78b6e86278e5f366a9c3899bd5e049e1a359216c19ed3c84602a1b0bbb6650f188526814fe0018259fcfde549b84a43c2636acf908e417de29f238de0548bbc20f548d249f5039e4ca2a0d4651", 0xb4}, {&(0x7f0000000100)}, {&(0x7f00000001c0)="3d3789aa65009b8247f8677cebfa14e4e044dc05500908c51df4186cb50c31ac033d7bb4180f277be1fad3b219d9bac23c839e9cf02530ba78b2bc6aa5c7e3fd8a71751f37d9e0694adaa1730b987635343233a1f134b187a0689e42", 0x5c}, {&(0x7f0000000140)}, {&(0x7f0000000280)="8030c2f3c962a08fbcbb8f20845fa7092e639567cab8e3881a06f0988363cc2115cf7f", 0x23}, {&(0x7f0000000640)="dfff08e6680a7c265b433f0c017a4a113a6a4ef314bbff4441e5a2e554e206364e03d7a2ca60980aa642320864ffb2cbf645298fdbb692d089b17f0643949ab1392c1aa350818f6e78d1506725fd7f9693af54cc6f69c50af8657b7ca5c38810e201c29ba0b6013528420a1a3a94f4b54b83e955b5b0548382f13edc1dc427cf23c1a81c3cd663ee0b2dc2e4a031b92293a21bcfdc694b5fc45f01c1bad1c1b40bb9c175e813308f9e1d1133c8a85077bfae3070457eccb67dd68301f772772bbd8aa9caf3be424b73d33f99c74fd17e5656e7af83dc36814c35fb7417bbd0a26188766a22b3b25957cc08414556e6800d0a667d0b300b7a78c69e67fe2a1121bf88d39934908369966773d3ddd2bdbbba8418a76ae001d90e36ba84c1c4c10ed404d3c633c3d1940e4f3caf3e41f5f81d08957de356434bd6e04f89844a844cd3aeacc55ee3976cf9f12b5ea72e489474d306332e43eb4cbbd76510f6450611ca570b7f82816488ff8d9e54cbc37bfa319b3f64ee438dfcddd73a1aff081113d1bec8a4cd6b99b6fc68e5a486e14dc3a5040a8ac096f7cf07f86a4745ca4dc5def9f30d582ed1605dc478266089af15508f5efe9c1ebf2a978334ef5cbbe12e7c076af37f990bf156cd1068cc2180be7d1985777d3b1b8082fc7ea59962d11877bdd3d3aa98c116c5283a4c7e1f81ed967af52b765360b597d38121516dd2c87ae0bd7f57c5f247fd17638f8c2fe48ad47bf37861178d0dda0b87aaacbd3b08955bf8233fe015360c42d7acb8724b62777246eb4bd25be3b88e7fffa207a49688dac4259e67b6eb540444e5f04f0368d5eeb59c5de247638e0fc1aa7ceedf28947dba6e3eaa6a4790fbe4668a4057417c184a203a82c5a56ea273f236d1f9cafe083d0ac4874e343e0fe09e1ab1d40859fa4ea45a603b23677c6e2839209287efbfa75b0c4f0470a157609044c461e07432c662761d39c9c5d8401deae99a9117122affb59d54e76ca19e6e8351702cb2665c1fa4d41d8ee295aa2d2cf3f1a47f2636c14de02926ad45e11ed6528564bb928daf3cf6f78576c7eaf51d3fd48ca758efdd3fa6e2fed2a80649caa1e49176ab5002fd237c701d81185a02045ba1147e46e637a46300e11aa44efa7e3c915e7d0b7c007561616b07b7ee688914adeaeedd689ffe2cb3b0c1cfc4568887b1a1ef57cf55a9e12eb2f36c43100271c2f1a988e92de14bddcb01e29f7c3aaa9aacac25244e3f84787d4a7fa52b4c4f2b454fdf7ee30c16d4f4aa51b1342cca16d39485216008d225158e9964e99efea8b605c0ac88f1cc351593db165681b4065af5f3d69ef79cc047066757d64bd62c3780b248e3daa63857632d0be165e4cb2d56761842429a32bfa7bc9d77956542eb7b0a2a8a3e8a1af6c83a300e7ab796a889b0f65845b0301f188c27e92318635eae9fe6de0d565449eeed4b7fcc54241b05568bfcfed0798206976304abcf6098e09ed09c0914d23e2de9e57c82c2d8ba99f5c3225324e5fd5fbf3db1cb96b34f3250b514c18c278aa653350ee976ab27e01a53bbffb3c38732e32031285002915f6eae9448f0df461582f873f48c453ee421e900baef26e952ac8f5db84340f6a5d06405647590bb54f6381777aec79e8c3b2b503fefcf6274a9f4b9d8c352f097ba248817f3272959748ab4ec07d3966ba21e8ed0555a44d63e580536a9498314643180083f2dbb2c6df2982d8d534482a0edcaa98014dbca5663dddb30e2d36b603b9f9176d9419f45d64e4b9dbe3d3a1f658ac661f29665f07351a001a6554fe5bc465cb552877fa8d1eb4b048c962411160317d71b2d8a0cd7341a5e6b3645040b2950e63d1b20751bb575d782c7f50043a4ba98f768e95b16d86d2641fff05b43a44b79d22bde7e969036305246dce18cac0b4703ee749c7075e2761d0417bd59f99efe866b8d7badc116bac7ade2616cd210b90e605f7085fcce96a0c384cb598d64bbd0408ea1a60d9949a2bd0121d0da67c6e19772435ec22c2499b57bf5da297cf3a0913238ff7c4189644248660fcd6945a51b969d848c25aef87c1e55cfffdaae215c2775bb93afd056f5a839b3710581bc773bd1983ee759d3a3240084f9e17d75be2d7c8b90a7f10377598cc14372b68b68db042e754cf453c4fde6a85756fb7785727b47f506a75c9c482683b4e31cfd58efd67e1dc2773c0d486cf4f1aa502e7f5a95ee3d18e58cc2ad5e474ec483a5e4d7bdecb01ab7c3fdd21f8a812fd48ebfa21a6a918f03cecbafe7b388557c98eab80568baa89a8e01e6c3bf9a026090f2dcc01c3dc90692235ba3ba58ca17808d03f18058917753a84cb2fe76e6e3f73c4a44ed07bfa7513ab948eeacb249b83000cb5272a44d98d40eb73592678e5088eba7514838d84c79cfcfb1dadd407ad274536a28cd431bc3b0f7fa58be488bba9e8e1079196aeddd9e085689ee00977408b7d273d6efc7fbc50d3e17e7953d106e74e80fedaef760de4f51c4e9b0e0e96821356353fae29a317d15d83699e0e5dd65b81a7c208abf661c7578adb13f4dc4ca817d9f4f2b71007aa78cf310d829c5e16eacaa16bcbeae35369e72be2bf9d6be73c96dfab8f822e8fed8c59ec4452aad0b384dd9f4fd1d37a951e3226bf4b0156b0b9336591eb06c2d0f3ea70418938af1b4be3530b312fdc6d6711e8e1bffb4f4369c353cd82767cd0b3e0732a1021ea7f630133e48a88f57b80ede4be098611c5a2e00a74295fced3a26847596af965c89a2f79475b59a6440d96b7dc5255c1d33bf56dc643729c84fd963ab084e211581e295f0fd251dc90a11cca9ea2b238bdf10ba2e72a9f896ba45bf412515afc56cbd78adc91c96e8a5ddc82daf54cd36153486647355b978ceb789411221689d76edb83c2b00404a7e1edbb5768361f2dec9759da915351b4f26ce0e67c37f5d314ef545d4abb3ebac0eb08714fa5e1f56057eb9e0bf322f171be77d5875614f1abb71711284e42b708e5106a0495822582ca19df2e4c58e004c5aa8dd70f80a71b2efd2a2453421102c3c00f3ef12a7b32bfa42791f07ee71279f9ee8b0edf10c1b28f8ea366eb5918ee4ec0a5eefcfc2aef31110683311868d9d9eedfb02f2ac5efdcc5629488543b6bf6f2e9b1750052331f87b38753466a16a5d5a85419ae63a51793708f28193665af1aff9cf7aa7f8363d3cb02494b0ee0909f42f182a4b8761f4e7bb97a44804fdef41f1682269ba564dbb80512850342e511857a5166fed810034420693560e325cb6658c906bb9087ced22fb9908c7aa96530594db0b49b7523bb26bbf0a50be42171e96f2342015f10be2e9cad2414bc1f688e36e0c05fdde973010f618c8fbd0e67aaac5a2159d0ba38f99bc610a6e37e30502739f78b661040e593d3cb28ca86ca8f176aac1de61d31cecc115200566c6d55ebe51cae8b9f0af56a5612f539874a723b65f07d4201ad234477b2f532916b769271d9ba3f12e481284f5a8f8914f03660d85e3b81c7cc35758c4eabbd702b88dcb0e3a54e40b79ff4ca6842f855c0e7977361c7729a19ed5fdbf9b99fbf4cda1c5aaba377ee6cc07dca28f39eaa1554c73594b2ea38ae4a8d1cacc79949ed74df1c4614fcb0256e49201bbb2f3767574d9d5c5cae6375d0b556cbaba3aaad77a0d7300aa06a20bec06aad57195c2769173ebc67729fc34482504ca91e357c6e303afadcede0da1cb8fa89b6ffb15c4bff9a3936a703350a9deaea20a0ef14e1821b25b52c90ce3da18db3dbfe4ba45f7e03d15156076392aa9640ac0f36ceb0522c59f06b20c870898cfc5a8196024f5b5c4cf83c97823de6ec148adab0dd6f63e72d179e7a5fffda5d5cd36f3736edac153bf3995d5f3d712d05050d501470ed8c075b65a61b1e5688500eaaec7155f41f7097dcd0412687073452318364a0086935f15615f1054668ba487a359e39d63749ecc48e619de8e69402d26e5a347f8d1561785cdd36aeb888a3ba730b6275314f559cb04788a4b346b190c79b70f5b13263f01ee29de9ebbc6ab69347a512206a93ee7b6c69f9df4b3de65c4daa1dcfb4cbb5fe493d8902902b9d2d5bfe84dbe05fa895f5fc91bc4d6ec8852bbda2ee624939eb339e4ffede0fec0747edf83dabbd740ec087de3e085d413e94e210329f4685113e2f935fa224cd71102dd3a43da911194f651dada1b869fa2449302bbc1ae1bf9891af636bd189426b89b99540fdc1c763fbc5faf43041af975e27a3a0a213da42e3113c55cf9bd7df3beb8999ed689774d72fa888a67b18325d4b10bdfc26e7c5ab8c9a0c6de98bf5a01608d688030339457cf96dfcd9d5bc30abafe178ffa90f99ed43761d17d2a4cb1cddc8a729449242c2ed643613e5fbd82368d68da644404c430d063f0761bf32f46788b4fe1a0c3279e3a55c1a037d540fcdc3d2824b3bea3422d2d9d7fba104efa282af045448d64a35da39758aa23b1adae0dd1fddf44f2cad776ca62fdc694b0f4b10acbfbbe8e51b9a71ba997ef8c538485c1794bd90e27b9511a96897ac20ccaa11e64855b07fdff8c06a49ef4058de811b99fb25f85fa7549169c64613d36952531e16ca268c89840cb0ae23ed94ef4a6d9e9005158979d6f28bf60f056208f4f6b9777ced8961d865065a883158358a051e2107fe541c031a4c8d678db98818ea93b925ac879114e72ec6eb5997331064f262f31392c9dcdd2400c35855e7938ad64ee670b6f248737d3c53824724292e4d3452e8cb12fc1f12954bffe793f0b35de76ac753776f37b27c01c79c2a58decaff1f52ab342c1f81b83d438b49aa9850f3e924c0c835b5483230209205040afbd18ae79ec2d984bc80fd176c5a307d9d6756a902636f183431a0d21a8d634b3f9f5d95d4a1765105023e91192fdc36c783feb7602db97b6de712a57be59850003f75eec3100b85edb648742c392e39b19ff7c7b4ad162d169573e90245a29c3e51a50a256a997003f88c2c2b409cce7c5f17d35381d7182120d81f48015f7a17e7a7003d3b86a5d616785be595de9b2e5d9625ac05d47d1460c697a96592fa9a2c5ac51ff3729e298a50a4fed830e22c566eb91e970a1e8cbb6efafbf689a7651931f7bd1cc1e44b4c683f1be10181c5b20b728153c9672754f28700959027ab2382f7616fe558b3b81c27c062a26bd204348c5c1920f5f53de8e8e37cb2aa31608dd66836e54d87ecfd4cfe5aac3d4f8e144dd502f8fd7ab859108042e7d6c1eda399b608a27689f3649539933261553bc1c78989fd905472663e6eed025e82036e22ea430791771efbf257fe84aca44915b0149d4981109fe1535f0d164e07a5ef14653c19bc4cf2fecef85d565f4bea3a9a15cfdc540982f1515463acb45339e00a4ee8a37080c8dd08ebe21335b26d9816e025fbf0efc566d13a66b178865455e5dcf0a74e335a84a9f10bb8b1015452e75e9400333c5d67f5943945cf82217be832f58986048bc0c0f3e0fd332ee206cb599571c83ed38db06495f61fb2dda06f9e947e05e48ee2ac0f198023e0c0c01a987657041faf11a35ae0c794cec517d75628f65506b8963ec086f788e917d144c8b0ba6279db7f34712788e961a266ef60d1121b82b6a840a4810645ce3ca50711154064e29bbaf0cf92620d60648e7d0ba5998f4891b5e178197563527b283efb1ff85fc3a74f8e076bf9707e3f30b482fe2206020db75dbd8f8ab3a56e5ee187c4445dfdedc5194c6b9885eea9801f4b9c10d15648240a8120aa64385", 0x1000}], 0x6, &(0x7f0000002780)=[@assoc={0x18, 0x117, 0x4, 0x4}, @iv={0xa8, 0x117, 0x2, 0x8e, "e84322375284c5b36fbbbd9a73849831a589063187e1c1a82e32dcdd3b74396ff9397f702b66e8841e814043bc889833630f7b22e9a04df6a0a0dbab6ecab18d2435b052ac5e233f6e03b57deb73f63564331147d49034c6573018276bb169c01a2041a504b95e00e0b04709e6054008b8bd2f3fb2d8e366e5037730065b382255a3e6ca22b1f9e618a9505bee20"}, @iv={0x88, 0x117, 0x2, 0x71, "47ccea1fa642519e02877313a4c99c1a31c45f0aa6c0e1fb0c8d316dde10de4d5870493f3b50367d60349783f152f3d897f7aac316dfe75540cb68bc2cddcff4d712bcece9e348434fb4e95051930150959a09ad247e38a0ed3c163171e43d1a262bbbc3a8b154eb58ad13e0bff2797994"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}], 0x1190, 0x4000000}], 0x2, 0x0) 00:08:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x10, &(0x7f0000000080)={r5}, 0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000000c0)={r5, 0x7, 0x2, 0xfffff800, 0x4, 0x40}, &(0x7f0000000140)=0x14) sendmsg$rds(r2, &(0x7f00000017c0)={&(0x7f0000000200)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000001700)=[{&(0x7f0000000280)=""/111, 0x6f}, {&(0x7f0000000300)=""/4, 0x4}, {&(0x7f0000000340)=""/233, 0xe9}, {&(0x7f0000000440)=""/132, 0x84}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001580)=""/88, 0x58}, {&(0x7f0000001600)=""/152, 0x98}, {&(0x7f0000001500)=""/11, 0xb}, {&(0x7f00000016c0)=""/59, 0x3b}], 0x9}, 0x40002) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000180)={r6, 0x2}, &(0x7f00000001c0)=0x8) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='grpjquota=.']) 00:08:09 executing program 4 (fault-call:6 fault-nth:3): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:09 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0x4}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 326.589964][T10897] FAULT_INJECTION: forcing a failure. [ 326.589964][T10897] name failslab, interval 1, probability 0, space 0, times 0 [ 326.610901][T10899] sctp: [Deprecated]: syz-executor.1 (pid 10899) Use of struct sctp_assoc_value in delayed_ack socket option. [ 326.610901][T10899] Use struct sctp_sack_info instead 00:08:09 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 326.638915][T10897] CPU: 1 PID: 10897 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 326.648954][T10897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.659033][T10897] Call Trace: [ 326.662347][T10897] dump_stack+0x188/0x20d [ 326.666705][T10897] should_fail.cold+0x5/0x14 [ 326.671321][T10897] ? lock_downgrade+0x7f0/0x7f0 [ 326.676220][T10897] ? setup_fault_attr+0x1e0/0x1e0 [ 326.681277][T10897] should_failslab+0x5/0xf [ 326.685712][T10897] kmem_cache_alloc+0x29b/0x730 [ 326.690666][T10897] getname_flags+0xd2/0x5b0 [ 326.695545][T10897] user_path_at_empty+0x2a/0x50 [ 326.700420][T10897] do_mount+0x132/0x1a60 [ 326.704692][T10897] ? lock_acquire+0x197/0x420 [ 326.709394][T10897] ? __might_fault+0xef/0x1d0 [ 326.714104][T10897] ? copy_mount_string+0x40/0x40 [ 326.719065][T10897] ? __might_fault+0x190/0x1d0 [ 326.723851][T10897] ? _copy_from_user+0x123/0x190 [ 326.728817][T10897] __x64_sys_mount+0x18f/0x230 [ 326.733598][T10897] do_syscall_64+0xf6/0x790 00:08:09 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x2}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 326.738133][T10897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.744143][T10897] RIP: 0033:0x45c849 [ 326.748048][T10897] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.767803][T10897] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 326.776241][T10897] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 326.784231][T10897] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 326.792216][T10897] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 326.800202][T10897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 326.808191][T10897] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000003 00:08:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/sem\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="db8bb0555c153e81c93ee4e80076b81ab6867c16d1f03f0c1d9dd600"/39, @ANYBLOB="01002dbd7000fddbdf25030000000800040000000080080004000421357073000400000000000800050000000800080005000354d5b24d0005000800000008000062cead9b4cbc7f6a0000"], 0x2}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x84003ff) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x84003ff) signalfd4(r2, &(0x7f0000000000)={[0x4]}, 0x8, 0x80000) creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x84003ff) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x84003ff) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r4, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) fallocate(r4, 0x20, 0xffffffffffffffff, 0x40) io_submit(0x0, 0x0, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0x9d) 00:08:09 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:09 executing program 4 (fault-call:6 fault-nth:4): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) [ 326.873069][T10899] EXT4-fs (loop1): journaled quota format not specified [ 326.951841][T10899] sctp: [Deprecated]: syz-executor.1 (pid 10899) Use of struct sctp_assoc_value in delayed_ack socket option. [ 326.951841][T10899] Use struct sctp_sack_info instead [ 327.053187][T10930] FAULT_INJECTION: forcing a failure. [ 327.053187][T10930] name failslab, interval 1, probability 0, space 0, times 0 [ 327.092204][T10930] CPU: 0 PID: 10930 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 327.102142][T10930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.112205][T10930] Call Trace: [ 327.115513][T10930] dump_stack+0x188/0x20d [ 327.119871][T10930] should_fail.cold+0x5/0x14 [ 327.124515][T10930] ? lock_downgrade+0x7f0/0x7f0 [ 327.129390][T10930] ? setup_fault_attr+0x1e0/0x1e0 [ 327.134451][T10930] should_failslab+0x5/0xf [ 327.138980][T10930] kmem_cache_alloc+0x29b/0x730 [ 327.143850][T10930] ? find_held_lock+0x2d/0x110 [ 327.148640][T10930] getname_flags+0xd2/0x5b0 [ 327.153168][T10930] user_path_at_empty+0x2a/0x50 [ 327.158034][T10930] do_mount+0x132/0x1a60 [ 327.162284][T10930] ? lock_acquire+0x197/0x420 [ 327.166983][T10930] ? __might_fault+0xef/0x1d0 [ 327.172204][T10930] ? copy_mount_string+0x40/0x40 [ 327.177172][T10930] ? __might_fault+0x190/0x1d0 [ 327.181949][T10930] ? _copy_from_user+0x123/0x190 [ 327.186920][T10930] __x64_sys_mount+0x18f/0x230 [ 327.191717][T10930] do_syscall_64+0xf6/0x790 [ 327.196239][T10930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.202146][T10930] RIP: 0033:0x45c849 [ 327.206049][T10930] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.225663][T10930] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 327.234085][T10930] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 327.242072][T10930] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 327.250055][T10930] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 327.258041][T10930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 327.266043][T10930] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000004 00:08:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:12 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x3}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@dev={0xfe, 0x80, [], 0x32}, @in=@multicast2, 0x4e22, 0x0, 0x4e21, 0x7, 0xa, 0x80, 0xc0, 0x87, r3, r5}, {0xb10, 0x7, 0x2, 0x120, 0x9, 0x800, 0x10000, 0x11d8}, {0x3, 0x401, 0x80000001, 0x200}, 0x5, 0x6e6bb4, 0x1, 0x1, 0x2, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0x3c}, 0x2, @in6=@rand_addr="a56ad0ae5ed7537a78df1d3fc1303b8a", 0x3505, 0x4, 0x3, 0x7e, 0x1f, 0x81, 0x6}}, 0xe8) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64001400450028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r6, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r7, &(0x7f0000000800)={0x0, 0x10, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="0b3e0000000000000000240000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="a93b97f938358f265e690de2c3e3368ef463210110e87b67c065a237fea8f12b14a369fa6c1ce0da35010172b1873bf46081b230fea7494b67"], 0x3c}}, 0x0) r9 = getpgid(r4) sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x80, r8, 0x1, 0x70bd29, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r4}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r9}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x80}, 0x1, 0x0, 0x0, 0x10}, 0x40c4000) 00:08:12 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:12 executing program 4 (fault-call:6 fault-nth:5): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r4, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000100)={0x9c0000, 0x3, 0x5, r4, 0x0, &(0x7f00000000c0)={0x9b0950, 0xc4ac, [], @string=&(0x7f0000000040)=0x7f}}) ioctl$VIDIOC_DV_TIMINGS_CAP(r5, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, [], @bt={0xfc, 0x0, 0xfff, 0xc000, 0xfffffffffffffffb, 0x1f, 0x10, 0x2}}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030082ffffff0100004a0000000480000007a60000000000000000000500000000004200000000000000000000048000000000000000000000000000000055aa", 0x40, 0x1c0}]) 00:08:12 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x4}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 329.710916][T10957] FAULT_INJECTION: forcing a failure. [ 329.710916][T10957] name failslab, interval 1, probability 0, space 0, times 0 [ 329.781956][T10957] CPU: 1 PID: 10957 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 329.791900][T10957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.802408][T10957] Call Trace: [ 329.805721][T10957] dump_stack+0x188/0x20d [ 329.810083][T10957] should_fail.cold+0x5/0x14 [ 329.814696][T10957] ? setup_fault_attr+0x1e0/0x1e0 [ 329.819755][T10957] should_failslab+0x5/0xf [ 329.824292][T10957] __kmalloc+0x2d9/0x7a0 00:08:12 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) [ 329.828553][T10957] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 329.834609][T10957] ? tomoyo_realpath_from_path+0xc2/0x620 [ 329.840349][T10957] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 329.845749][T10957] tomoyo_realpath_from_path+0xc2/0x620 [ 329.851308][T10957] ? tomoyo_fill_path_info+0x22e/0x420 [ 329.857074][T10957] tomoyo_mount_acl+0x149/0x840 [ 329.861933][T10957] ? find_held_lock+0x2d/0x110 [ 329.866747][T10957] ? mark_lock+0xbc/0x1220 [ 329.871194][T10957] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 329.876759][T10957] ? __lock_acquire+0x827/0x5270 [ 329.881731][T10957] ? lock_acquire+0x197/0x420 [ 329.886957][T10957] ? tomoyo_mount_permission+0xfa/0x3f0 [ 329.892633][T10957] tomoyo_mount_permission+0x151/0x3f0 [ 329.898116][T10957] ? tomoyo_mount_permission+0xfa/0x3f0 [ 329.903754][T10957] ? tomoyo_mount_acl+0x840/0x840 [ 329.908829][T10957] ? __phys_addr_symbol+0x2c/0x70 [ 329.914039][T10957] security_sb_mount+0x82/0xc0 [ 329.918817][T10957] do_mount+0x1b4/0x1a60 [ 329.923055][T10957] ? lock_acquire+0x197/0x420 [ 329.927729][T10957] ? __might_fault+0xef/0x1d0 [ 329.932396][T10957] ? copy_mount_string+0x40/0x40 [ 329.937328][T10957] ? _copy_from_user+0x123/0x190 [ 329.942276][T10957] __x64_sys_mount+0x18f/0x230 [ 329.947057][T10957] do_syscall_64+0xf6/0x790 [ 329.951578][T10957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.957453][T10957] RIP: 0033:0x45c849 [ 329.961356][T10957] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.981130][T10957] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 329.989530][T10957] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 329.997503][T10957] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 330.005474][T10957] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 330.013447][T10957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 330.021408][T10957] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000005 00:08:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@dev={0xfe, 0x80, [], 0x32}, @in=@multicast2, 0x4e22, 0x0, 0x4e21, 0x7, 0xa, 0x80, 0xc0, 0x87, r3, r5}, {0xb10, 0x7, 0x2, 0x120, 0x9, 0x800, 0x10000, 0x11d8}, {0x3, 0x401, 0x80000001, 0x200}, 0x5, 0x6e6bb4, 0x1, 0x1, 0x2, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0x3c}, 0x2, @in6=@rand_addr="a56ad0ae5ed7537a78df1d3fc1303b8a", 0x3505, 0x4, 0x3, 0x7e, 0x1f, 0x81, 0x6}}, 0xe8) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64001400450028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r6, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r7, &(0x7f0000000800)={0x0, 0x10, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="0b3e0000000000000000240000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="a93b97f938358f265e690de2c3e3368ef463210110e87b67c065a237fea8f12b14a369fa6c1ce0da35010172b1873bf46081b230fea7494b67"], 0x3c}}, 0x0) r9 = getpgid(r4) sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x80, r8, 0x1, 0x70bd29, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r4}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r9}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x80}, 0x1, 0x0, 0x0, 0x10}, 0x40c4000) 00:08:12 executing program 4 (fault-call:6 fault-nth:6): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) [ 330.032236][T10957] ERROR: Out of memory at tomoyo_realpath_from_path. [ 330.089831][T10960] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 330.121876][T10960] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 330.146602][T10960] loop2: p1 p2 p3 00:08:12 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x5}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 330.213369][T10960] loop2: partition table partially beyond EOD, truncated 00:08:12 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) [ 330.254239][T10986] FAULT_INJECTION: forcing a failure. [ 330.254239][T10986] name failslab, interval 1, probability 0, space 0, times 0 [ 330.290573][T10960] loop2: p1 start 1241513985 is beyond EOD, truncated [ 330.313484][T10986] CPU: 1 PID: 10986 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 330.323418][T10986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.333504][T10986] Call Trace: [ 330.336913][T10986] dump_stack+0x188/0x20d [ 330.341270][T10986] should_fail.cold+0x5/0x14 [ 330.345889][T10986] ? setup_fault_attr+0x1e0/0x1e0 [ 330.350953][T10986] should_failslab+0x5/0xf [ 330.356170][T10986] __kmalloc+0x2d9/0x7a0 [ 330.360430][T10986] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 330.365946][T10986] ? d_absolute_path+0x10c/0x160 [ 330.367347][T10960] loop2: p2 size 327680 extends beyond EOD, truncated [ 330.370898][T10986] ? __d_path+0x140/0x140 [ 330.370935][T10986] tomoyo_encode2.part.0+0xec/0x3b0 [ 330.370957][T10986] tomoyo_encode+0x28/0x50 [ 330.370977][T10986] tomoyo_realpath_from_path+0x184/0x620 [ 330.397717][T10986] tomoyo_mount_acl+0x149/0x840 [ 330.402574][T10986] ? find_held_lock+0x2d/0x110 [ 330.407373][T10986] ? mark_lock+0xbc/0x1220 [ 330.411814][T10986] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 330.417386][T10986] ? __lock_acquire+0x827/0x5270 [ 330.422389][T10986] ? lock_acquire+0x197/0x420 [ 330.427082][T10986] ? tomoyo_mount_permission+0xfa/0x3f0 [ 330.432661][T10986] tomoyo_mount_permission+0x151/0x3f0 [ 330.438136][T10986] ? tomoyo_mount_permission+0xfa/0x3f0 [ 330.443067][T10960] loop2: p3 size 67108864 extends beyond EOD, truncated [ 330.443691][T10986] ? tomoyo_mount_acl+0x840/0x840 [ 330.455647][T10986] ? __phys_addr_symbol+0x2c/0x70 [ 330.460717][T10986] security_sb_mount+0x82/0xc0 [ 330.465508][T10986] do_mount+0x1b4/0x1a60 [ 330.469766][T10986] ? lock_acquire+0x197/0x420 [ 330.474460][T10986] ? __might_fault+0xef/0x1d0 [ 330.479157][T10986] ? copy_mount_string+0x40/0x40 [ 330.484120][T10986] ? _copy_from_user+0x123/0x190 [ 330.489087][T10986] __x64_sys_mount+0x18f/0x230 [ 330.493876][T10986] do_syscall_64+0xf6/0x790 [ 330.498401][T10986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.504303][T10986] RIP: 0033:0x45c849 [ 330.508247][T10986] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.527859][T10986] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 330.536288][T10986] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 330.544265][T10986] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 330.552411][T10986] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 330.560372][T10986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 330.568434][T10986] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000006 [ 330.584849][T10986] ERROR: Out of memory at tomoyo_realpath_from_path. 00:08:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@dev={0xfe, 0x80, [], 0x32}, @in=@multicast2, 0x4e22, 0x0, 0x4e21, 0x7, 0xa, 0x80, 0xc0, 0x87, r3, r5}, {0xb10, 0x7, 0x2, 0x120, 0x9, 0x800, 0x10000, 0x11d8}, {0x3, 0x401, 0x80000001, 0x200}, 0x5, 0x6e6bb4, 0x1, 0x1, 0x2, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0x3c}, 0x2, @in6=@rand_addr="a56ad0ae5ed7537a78df1d3fc1303b8a", 0x3505, 0x4, 0x3, 0x7e, 0x1f, 0x81, 0x6}}, 0xe8) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64001400450028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r6, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r7, &(0x7f0000000800)={0x0, 0x10, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="0b3e0000000000000000240000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="a93b97f938358f265e690de2c3e3368ef463210110e87b67c065a237fea8f12b14a369fa6c1ce0da35010172b1873bf46081b230fea7494b67"], 0x3c}}, 0x0) r9 = getpgid(r4) sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x80, r8, 0x1, 0x70bd29, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r4}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r9}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x80}, 0x1, 0x0, 0x0, 0x10}, 0x40c4000) 00:08:15 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x6}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:15 executing program 4 (fault-call:6 fault-nth:7): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:15 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@dev={0xfe, 0x80, [], 0x32}, @in=@multicast2, 0x4e22, 0x0, 0x4e21, 0x7, 0xa, 0x80, 0xc0, 0x87, r3, r5}, {0xb10, 0x7, 0x2, 0x120, 0x9, 0x800, 0x10000, 0x11d8}, {0x3, 0x401, 0x80000001, 0x200}, 0x5, 0x6e6bb4, 0x1, 0x1, 0x2, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d3, 0x3c}, 0x2, @in6=@rand_addr="a56ad0ae5ed7537a78df1d3fc1303b8a", 0x3505, 0x4, 0x3, 0x7e, 0x1f, 0x81, 0x6}}, 0xe8) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824ca945f64001400450028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a0000000000000000", 0x58}], 0x1) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r6, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r7, &(0x7f0000000800)={0x0, 0x10, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="0b3e0000000000000000240000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="a93b97f938358f265e690de2c3e3368ef463210110e87b67c065a237fea8f12b14a369fa6c1ce0da35010172b1873bf46081b230fea7494b67"], 0x3c}}, 0x0) r9 = getpgid(r4) sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x80, r8, 0x1, 0x70bd29, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r4}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r9}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x80}, 0x1, 0x0, 0x0, 0x10}, 0x40c4000) [ 332.809147][T11017] FAULT_INJECTION: forcing a failure. [ 332.809147][T11017] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 332.822395][T11017] CPU: 1 PID: 11017 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 332.832290][T11017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.843398][T11017] Call Trace: [ 332.846711][T11017] dump_stack+0x188/0x20d [ 332.851069][T11017] should_fail.cold+0x5/0x14 [ 332.855676][T11017] ? __x64_sys_mount+0x18f/0x230 [ 332.860642][T11017] ? setup_fault_attr+0x1e0/0x1e0 [ 332.865674][T11017] ? lock_downgrade+0x7f0/0x7f0 [ 332.870542][T11017] ? lock_acquire+0x197/0x420 [ 332.875338][T11017] ? bpf_image_alloc+0x10/0x10 [ 332.880159][T11017] __alloc_pages_nodemask+0x17a/0x820 [ 332.885681][T11017] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 332.891622][T11017] cache_grow_begin+0x8c/0xc10 [ 332.896408][T11017] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 332.901890][T11017] __kmalloc+0x6d6/0x7a0 [ 332.906152][T11017] ? tomoyo_realpath_from_path+0xc2/0x620 [ 332.911902][T11017] tomoyo_realpath_from_path+0xc2/0x620 [ 332.917478][T11017] ? tomoyo_fill_path_info+0x22e/0x420 [ 332.922972][T11017] tomoyo_mount_acl+0x149/0x840 [ 332.927834][T11017] ? find_held_lock+0x2d/0x110 [ 332.932631][T11017] ? mark_lock+0xbc/0x1220 [ 332.937060][T11017] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 332.942630][T11017] ? __lock_acquire+0x827/0x5270 [ 332.947625][T11017] ? lock_acquire+0x197/0x420 [ 332.952322][T11017] ? tomoyo_mount_permission+0xfa/0x3f0 [ 332.957889][T11017] tomoyo_mount_permission+0x151/0x3f0 [ 332.963357][T11017] ? tomoyo_mount_permission+0xfa/0x3f0 [ 332.968907][T11017] ? tomoyo_mount_acl+0x840/0x840 [ 332.973938][T11017] ? __phys_addr_symbol+0x2c/0x70 [ 332.979001][T11017] security_sb_mount+0x82/0xc0 [ 332.983795][T11017] do_mount+0x1b4/0x1a60 [ 332.988051][T11017] ? lock_acquire+0x197/0x420 [ 332.992745][T11017] ? __might_fault+0xef/0x1d0 [ 332.997439][T11017] ? copy_mount_string+0x40/0x40 [ 333.002577][T11017] ? _copy_from_user+0x123/0x190 [ 333.007556][T11017] __x64_sys_mount+0x18f/0x230 [ 333.012349][T11017] do_syscall_64+0xf6/0x790 [ 333.016874][T11017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.022775][T11017] RIP: 0033:0x45c849 [ 333.026681][T11017] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.046307][T11017] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 00:08:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)) close(0xffffffffffffffff) getdents(r0, &(0x7f0000001f00)=""/4096, 0x1000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000180)={0xa10000, 0xffffff0b, 0x3, r2, 0x0, &(0x7f0000000140)={0x9909c9, 0x1ff, [], @ptr=0x9}}) ioctl$TIOCMIWAIT(r3, 0x545c, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000000)) 00:08:15 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x29}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:15 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x2b}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 333.054731][T11017] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 333.062714][T11017] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 333.070692][T11017] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 333.078669][T11017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 333.086740][T11017] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000007 [ 333.107314][T11017] 9pnet: p9_fd_create_tcp (11017): problem connecting socket to 127.0.0.1 00:08:15 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:15 executing program 4 (fault-call:6 fault-nth:8): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:15 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x2c}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 333.417141][T11051] FAULT_INJECTION: forcing a failure. [ 333.417141][T11051] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 333.430391][T11051] CPU: 1 PID: 11051 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 333.440286][T11051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.450352][T11051] Call Trace: [ 333.453671][T11051] dump_stack+0x188/0x20d [ 333.458029][T11051] should_fail.cold+0x5/0x14 [ 333.462648][T11051] ? __x64_sys_mount+0x18f/0x230 [ 333.467630][T11051] ? setup_fault_attr+0x1e0/0x1e0 [ 333.472674][T11051] ? lock_downgrade+0x7f0/0x7f0 [ 333.477572][T11051] ? lock_acquire+0x197/0x420 [ 333.482275][T11051] ? bpf_image_alloc+0x10/0x10 [ 333.487077][T11051] __alloc_pages_nodemask+0x17a/0x820 [ 333.492493][T11051] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 333.498271][T11051] cache_grow_begin+0x8c/0xc10 [ 333.503063][T11051] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 333.508542][T11051] __kmalloc+0x6d6/0x7a0 [ 333.512801][T11051] ? tomoyo_realpath_from_path+0xc2/0x620 [ 333.518663][T11051] tomoyo_realpath_from_path+0xc2/0x620 [ 333.524327][T11051] ? tomoyo_fill_path_info+0x22e/0x420 [ 333.529811][T11051] tomoyo_mount_acl+0x149/0x840 [ 333.534676][T11051] ? find_held_lock+0x2d/0x110 [ 333.539447][T11051] ? mark_lock+0xbc/0x1220 [ 333.543906][T11051] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 333.549458][T11051] ? __lock_acquire+0x827/0x5270 [ 333.554406][T11051] ? lock_acquire+0x197/0x420 [ 333.559068][T11051] ? tomoyo_mount_permission+0xfa/0x3f0 [ 333.564609][T11051] tomoyo_mount_permission+0x151/0x3f0 [ 333.570060][T11051] ? tomoyo_mount_permission+0xfa/0x3f0 [ 333.575801][T11051] ? tomoyo_mount_acl+0x840/0x840 [ 333.580829][T11051] ? __phys_addr_symbol+0x2c/0x70 [ 333.585882][T11051] security_sb_mount+0x82/0xc0 [ 333.590640][T11051] do_mount+0x1b4/0x1a60 [ 333.594929][T11051] ? lock_acquire+0x197/0x420 [ 333.599593][T11051] ? __might_fault+0xef/0x1d0 [ 333.604260][T11051] ? copy_mount_string+0x40/0x40 [ 333.609197][T11051] ? _copy_from_user+0x123/0x190 [ 333.614149][T11051] __x64_sys_mount+0x18f/0x230 [ 333.618918][T11051] do_syscall_64+0xf6/0x790 [ 333.623425][T11051] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.629392][T11051] RIP: 0033:0x45c849 [ 333.637095][T11051] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.656817][T11051] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 333.665228][T11051] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 333.673194][T11051] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 333.681165][T11051] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 333.689227][T11051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 333.697252][T11051] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000008 [ 333.714127][T11051] 9pnet: p9_fd_create_tcp (11051): problem connecting socket to 127.0.0.1 [ 335.525937][ T0] NOHZ: local_softirq_pending 08 00:08:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:18 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc0045520, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "0104000020200000000000002c72d8a6"}) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000180)=0x800) 00:08:18 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x2f}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)) close(0xffffffffffffffff) getdents(r0, &(0x7f0000001f00)=""/4096, 0x1000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000180)={0xa10000, 0xffffff0b, 0x3, r2, 0x0, &(0x7f0000000140)={0x9909c9, 0x1ff, [], @ptr=0x9}}) ioctl$TIOCMIWAIT(r3, 0x545c, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000000)) 00:08:18 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:18 executing program 4 (fault-call:6 fault-nth:9): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) [ 335.850958][T11059] FAULT_INJECTION: forcing a failure. [ 335.850958][T11059] name failslab, interval 1, probability 0, space 0, times 0 [ 335.863932][T11059] CPU: 1 PID: 11059 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 335.873837][T11059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.884645][T11059] Call Trace: [ 335.887957][T11059] dump_stack+0x188/0x20d [ 335.892321][T11059] should_fail.cold+0x5/0x14 [ 335.896930][T11059] ? lock_downgrade+0x7f0/0x7f0 [ 335.901805][T11059] ? setup_fault_attr+0x1e0/0x1e0 [ 335.906875][T11059] should_failslab+0x5/0xf [ 335.911318][T11059] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 335.916807][T11059] ? lockdep_init_map+0x1b0/0x6c0 [ 335.921859][T11059] legacy_init_fs_context+0x44/0xe0 [ 335.927079][T11059] ? generic_parse_monolithic+0x1f0/0x1f0 [ 335.932819][T11059] alloc_fs_context+0x51a/0x880 [ 335.937690][T11059] do_mount+0x1150/0x1a60 [ 335.942394][T11059] ? copy_mount_string+0x40/0x40 [ 335.947367][T11059] ? _copy_from_user+0x123/0x190 [ 335.952368][T11059] __x64_sys_mount+0x18f/0x230 [ 335.957165][T11059] do_syscall_64+0xf6/0x790 [ 335.961690][T11059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.967717][T11059] RIP: 0033:0x45c849 [ 335.971616][T11059] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 335.991922][T11059] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 00:08:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)) close(0xffffffffffffffff) getdents(r0, &(0x7f0000001f00)=""/4096, 0x1000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000180)={0xa10000, 0xffffff0b, 0x3, r2, 0x0, &(0x7f0000000140)={0x9909c9, 0x1ff, [], @ptr=0x9}}) ioctl$TIOCMIWAIT(r3, 0x545c, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000000)) 00:08:18 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x3a}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 336.000347][T11059] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 336.008337][T11059] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 336.016321][T11059] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 336.024310][T11059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 336.032292][T11059] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000009 00:08:18 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc0045520, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "0104000020200000000000002c72d8a6"}) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000180)=0x800) 00:08:18 executing program 4 (fault-call:6 fault-nth:10): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:18 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:18 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x3c}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 336.275312][T11089] FAULT_INJECTION: forcing a failure. [ 336.275312][T11089] name failslab, interval 1, probability 0, space 0, times 0 [ 336.331083][T11089] CPU: 0 PID: 11089 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 336.341453][T11089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.351956][T11089] Call Trace: [ 336.355261][T11089] dump_stack+0x188/0x20d [ 336.359619][T11089] should_fail.cold+0x5/0x14 [ 336.364237][T11089] ? lock_downgrade+0x7f0/0x7f0 [ 336.369324][T11089] ? setup_fault_attr+0x1e0/0x1e0 [ 336.374354][T11089] should_failslab+0x5/0xf [ 336.378894][T11089] __kmalloc_track_caller+0x2d1/0x790 [ 336.384258][T11089] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 336.389803][T11089] ? vfs_parse_fs_string+0xc0/0x150 [ 336.394996][T11089] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 336.400966][T11089] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 336.406766][T11089] kmemdup_nul+0x2d/0xa0 [ 336.411000][T11089] vfs_parse_fs_string+0xc0/0x150 [ 336.416025][T11089] ? vfs_parse_fs_param+0x610/0x610 [ 336.421216][T11089] ? generic_parse_monolithic+0x1f0/0x1f0 [ 336.426936][T11089] ? alloc_fs_context+0x56c/0x880 [ 336.431973][T11089] do_mount+0x111d/0x1a60 [ 336.436331][T11089] ? copy_mount_string+0x40/0x40 [ 336.441294][T11089] ? _copy_from_user+0x123/0x190 [ 336.446228][T11089] __x64_sys_mount+0x18f/0x230 [ 336.450985][T11089] do_syscall_64+0xf6/0x790 [ 336.455480][T11089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.461356][T11089] RIP: 0033:0x45c849 [ 336.465248][T11089] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.485272][T11089] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 336.493666][T11089] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 336.501641][T11089] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 336.509653][T11089] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 336.517632][T11089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 336.525604][T11089] R13: 000000000000074c R14: 00000000004ca09f R15: 000000000000000a [ 338.723215][ T0] NOHZ: local_softirq_pending 08 00:08:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:21 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0xff}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) geteuid() r2 = memfd_create(&(0x7f0000000000)='dummY0\x00', 0x0) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000000c0)={0x100000, &(0x7f0000000080), 0x0, r1, 0x8}) r4 = geteuid() fsetxattr$system_posix_acl(r2, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000018c0)=ANY=[@ANYBLOB="020000000100000000080000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB], 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x101) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="500000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="6535060090858a5a050000001c0012800c0001006d6163766c61099f0c00080000000a0005000400000000000040000000000000", @ANYRES32, @ANYBLOB="cb833aed434ccfebeec2268130c41a7fb623d1bb903f6469283f2eae0ed143899e2f5185c5cedccf2b62b502962f068109b4046c935222ff066be474029efc5fad9d50e6bb6992597f539ef561f6292f1a2aaa867de700812c85964c9b457140ccc41bff1f48ddad3d264dcbb7b9f7240f74967bfa2ba4238ca800636a06c7d6163a587af0a7f7a04da2d6d5851c5afee55219de1141a5de9a410cb6cf07e8610219bb6293394505932628408659e93b337c77752d6827b7863638c72eaf79ba65df9fde7f20917b0e8304b593d77a31e2bd27d761883e01e561f2f6536182b4348b80741066b2654798c76ba4811273aee6604cd916e14fcf"], 0x50}}, 0x0) r5 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r5, &(0x7f0000000000), 0x4000000000001f2, 0x0) 00:08:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)) close(0xffffffffffffffff) getdents(r0, &(0x7f0000001f00)=""/4096, 0x1000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000180)={0xa10000, 0xffffff0b, 0x3, r2, 0x0, &(0x7f0000000140)={0x9909c9, 0x1ff, [], @ptr=0x9}}) ioctl$TIOCMIWAIT(r3, 0x545c, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000000)) 00:08:21 executing program 4 (fault-call:6 fault-nth:11): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:21 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:21 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 338.982853][T11109] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 339.050464][T11119] FAULT_INJECTION: forcing a failure. [ 339.050464][T11119] name failslab, interval 1, probability 0, space 0, times 0 [ 339.070774][T11119] CPU: 0 PID: 11119 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 339.075038][T11130] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 339.080685][T11119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 00:08:21 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x2}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 339.080692][T11119] Call Trace: [ 339.080718][T11119] dump_stack+0x188/0x20d [ 339.080742][T11119] should_fail.cold+0x5/0x14 [ 339.080762][T11119] ? lock_downgrade+0x7f0/0x7f0 [ 339.117134][T11119] ? setup_fault_attr+0x1e0/0x1e0 [ 339.122193][T11119] should_failslab+0x5/0xf [ 339.126631][T11119] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 339.132019][T11119] ? lock_acquire+0x197/0x420 [ 339.136706][T11119] ? __get_fs_type+0x1d/0xc0 [ 339.141325][T11119] alloc_fs_context+0x57/0x880 [ 339.146098][T11119] ? _raw_read_unlock+0x24/0x40 [ 339.150960][T11119] ? __get_fs_type+0x92/0xc0 [ 339.155576][T11119] do_mount+0x1150/0x1a60 [ 339.159934][T11119] ? copy_mount_string+0x40/0x40 [ 339.164891][T11119] ? _copy_from_user+0x123/0x190 [ 339.169980][T11119] __x64_sys_mount+0x18f/0x230 [ 339.174894][T11119] do_syscall_64+0xf6/0x790 [ 339.179628][T11119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.185538][T11119] RIP: 0033:0x45c849 [ 339.189456][T11119] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.209072][T11119] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 339.217493][T11119] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 339.225475][T11119] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 339.233459][T11119] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 339.242022][T11119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 00:08:21 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x3}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:21 executing program 2: getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@empty, 0x0, 0x4, 0x3}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000000)=0x3f03) [ 339.250004][T11119] R13: 000000000000074c R14: 00000000004ca09f R15: 000000000000000b 00:08:21 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa044}, 0x0, 0x800007, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000140)=0x20, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000240)={0x7e000000, 0x4, {}, {0x0}, 0x5, 0x3}) getresgid(&(0x7f0000000300)=0x0, &(0x7f0000000340), &(0x7f0000000380)) sendmsg$netlink(r2, &(0x7f0000000400)={&(0x7f0000000200)=@proc={0x10, 0x0, 0x25dfdbfe, 0x4000000}, 0xc, &(0x7f0000000280)=[{&(0x7f0000000440)=ANY=[@ANYBLOB="bd7000ffdbdf25e27dbd3b427f0ac568a86494acff5ce6299c6902333bcf"], 0x10}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r4, r5}}}], 0x20, 0x20008014}, 0x4c000) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:08:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:24 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x4}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:24 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x11288, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xfffffffe}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000005c0)=ANY=[@ANYRES32=0x0], 0x1) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000600)=ANY=[@ANYRESDEC, @ANYRES32=r1, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRES64], @ANYRESDEC=0x0, @ANYRESDEC]], 0x1}, 0x1, 0x0, 0x0, 0x2081}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000200)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x4) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="160e90cb39bca59f8c1a2e206eccf94df6a07bc4309e3eb79d874579dd84adef4aad9d8a17240f38f55f57c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc65cba7e700001f04d921442b0a06b135f8a73b68d8904b436f256f50ae7cb980e69ede4210f23240559b8c427000d7ce7862417ab5a50e494b2a54e346d7ffa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640d32c438ad2b24a69f1f9e4000000000000989eee6a9283bf253ca43ad025000000000000000000"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r5, r4, 0x0) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10, 0x0) dup2(r6, r5) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) 00:08:24 executing program 4 (fault-call:6 fault-nth:12): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:24 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, 0x0, 0x0, 0x0) 00:08:24 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0xab, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141942, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U+', 0x9}, 0x16, 0x1) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) dup2(r0, r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="010fea713aa2344e357318b5dddba2e4de57d8c27f09fa2393444995bd4e6b140f8b9516296d96d837a189c88d3e3fe810b3ec077bea7cbf3f0a4183432210869ff1b5b9da0cb9b97671cbd2dbd3842a8697c2375b4ac2ae50bd3070b8c83c84a68afadc03b2", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x10, &(0x7f0000000080)={r4}, 0x8) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000000c0)={0x1000, 0x8008, 0x3, 0xd5a7, r4}, 0x10) [ 342.062532][T11163] FAULT_INJECTION: forcing a failure. [ 342.062532][T11163] name failslab, interval 1, probability 0, space 0, times 0 [ 342.091843][T11163] CPU: 0 PID: 11163 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 342.101774][T11163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.112969][T11163] Call Trace: [ 342.116278][T11163] dump_stack+0x188/0x20d [ 342.120739][T11163] should_fail.cold+0x5/0x14 [ 342.125373][T11163] ? lock_downgrade+0x7f0/0x7f0 [ 342.130251][T11163] ? setup_fault_attr+0x1e0/0x1e0 [ 342.135353][T11163] should_failslab+0x5/0xf [ 342.139632][T11173] sctp: [Deprecated]: syz-executor.2 (pid 11173) Use of struct sctp_assoc_value in delayed_ack socket option. [ 342.139632][T11173] Use struct sctp_sack_info instead [ 342.139831][T11163] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 342.161972][T11163] ? lockdep_init_map+0x1b0/0x6c0 [ 342.167036][T11163] legacy_init_fs_context+0x44/0xe0 [ 342.172252][T11163] ? generic_parse_monolithic+0x1f0/0x1f0 [ 342.178109][T11163] alloc_fs_context+0x51a/0x880 [ 342.182981][T11163] do_mount+0x1150/0x1a60 [ 342.187340][T11163] ? copy_mount_string+0x40/0x40 [ 342.192297][T11163] ? _copy_from_user+0x123/0x190 [ 342.197256][T11163] __x64_sys_mount+0x18f/0x230 [ 342.202049][T11163] do_syscall_64+0xf6/0x790 [ 342.206577][T11163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.212562][T11163] RIP: 0033:0x45c849 [ 342.216475][T11163] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.236087][T11163] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 342.244796][T11163] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 342.252786][T11163] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 00:08:24 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x5}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 342.260784][T11163] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 342.268777][T11163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 342.276774][T11163] R13: 000000000000074c R14: 00000000004ca09f R15: 000000000000000c [ 342.280759][T11175] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 00:08:24 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, 0x0, 0x0, 0x0) 00:08:24 executing program 4 (fault-call:6 fault-nth:13): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:25 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x6}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000406, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x8, 0x2000000, 0x1028, 0x7, 0x4, "1000009e06448f292d6d840000000100"}) socket$inet(0x2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x1, 0x1000b) socket$netlink(0x10, 0x3, 0xf) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000280)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x3, 0x0, "00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006926ed0c00"}, 0xd8) bind$inet(r1, &(0x7f0000000500)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x1}, @timestamp, @timestamp, @mss, @mss={0x2, 0x47d}, @mss={0x2, 0x1}, @timestamp, @window={0x3, 0x9}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000)={0x3, 0x40000007ffe, 0x80000000}, 0x14) shutdown(0xffffffffffffffff, 0x0) 00:08:25 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, 0x0, 0x0, 0x0) [ 342.554964][T11192] FAULT_INJECTION: forcing a failure. [ 342.554964][T11192] name failslab, interval 1, probability 0, space 0, times 0 [ 342.607981][T11192] CPU: 1 PID: 11192 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 342.617927][T11192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.628118][T11192] Call Trace: [ 342.631431][T11192] dump_stack+0x188/0x20d [ 342.635788][T11192] should_fail.cold+0x5/0x14 [ 342.640397][T11192] ? lock_downgrade+0x7f0/0x7f0 [ 342.646051][T11192] ? setup_fault_attr+0x1e0/0x1e0 [ 342.651112][T11192] should_failslab+0x5/0xf [ 342.656036][T11192] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 342.661442][T11192] ? apparmor_cred_prepare+0x760/0x760 [ 342.666956][T11192] ? kfree+0x285/0x2b0 [ 342.671139][T11192] v9fs_mount+0x5a/0x970 [ 342.675425][T11192] ? v9fs_write_inode+0x60/0x60 [ 342.680286][T11192] legacy_get_tree+0x105/0x220 [ 342.685118][T11192] ? ns_capable_common+0xe2/0x100 [ 342.690160][T11192] vfs_get_tree+0x89/0x2f0 [ 342.694592][T11192] do_mount+0x1306/0x1a60 [ 342.698941][T11192] ? copy_mount_string+0x40/0x40 [ 342.703900][T11192] ? _copy_from_user+0x123/0x190 [ 342.709125][T11192] __x64_sys_mount+0x18f/0x230 [ 342.713914][T11192] do_syscall_64+0xf6/0x790 [ 342.718510][T11192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.724498][T11192] RIP: 0033:0x45c849 [ 342.728377][T11192] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.748020][T11192] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 342.756416][T11192] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 342.764369][T11192] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 342.772326][T11192] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 342.780307][T11192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 342.788290][T11192] R13: 000000000000074c R14: 00000000004ca09f R15: 000000000000000d [ 342.895212][T11177] sctp: [Deprecated]: syz-executor.2 (pid 11177) Use of struct sctp_assoc_value in delayed_ack socket option. [ 342.895212][T11177] Use struct sctp_sack_info instead 00:08:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:27 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x29}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:27 executing program 0 (fault-call:4 fault-nth:0): io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:27 executing program 4 (fault-call:6 fault-nth:14): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:27 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000002c0)) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x400, 0x0, 0x0, 0x2}, r0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) open(&(0x7f0000000300)='.\x00', 0x0, 0x24) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) vmsplice(r2, &(0x7f0000001640)=[{&(0x7f0000000280)="440a61f251c1c4e23486312947adcce7af5edab79d00ebb855faa5a27275e95907d782f4e6f980b4ebe9c71ca91341e58485d9296be333e3", 0x38}], 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x10) pipe(&(0x7f0000000200)={0xffffffffffffffff}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4800000340000705000000ffeb00000000000000", @ANYRES32, @ANYBLOB="0000040013000000010000000800010068746262dd000000000002008f770bba2f79ac273166587e0b42b925a40e7a1d68cbf2c8e2f901f84eedf4b4964fb78d8c7b702b5873d9a00afeb43fcc0425d514757551b8e9b987eec4c9d586106a9f7c5e0a6e0f57820faea9e903b85c8e2beba45eabea1d8338d25e6d573e8aa41f08e387503caf650a317e88572e93685f509dd9cc794176e306bb81607be235c9c63004b52645fd8d764d3bc01f792843a2d07709ec54fb443bd9f911ba4681e5a389bd802b9b8a515df775098896c61e654a007fef82f1b26a1f00c79f32f74884db53"], 0x3}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="3800000024000707001d00"/20, @ANYRES32=r4, @ANYBLOB="0900000000000000005a014daab980147a"], 0x3}}, 0x0) splice(r1, 0x0, r3, 0x0, 0xffffffffffff7fff, 0x0) 00:08:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000004c0)={0x0, 0x1}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x80, 0x401, 0x2}}, 0x14) 00:08:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x10, &(0x7f0000000080)={r2}, 0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={r2, 0x9}, &(0x7f0000000100)=0x8) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x2, 0x4) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r3, &(0x7f0000007fc0), 0x40000000000003c, 0x0) 00:08:27 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x2b}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 345.163777][T11226] FAULT_INJECTION: forcing a failure. [ 345.163777][T11226] name failslab, interval 1, probability 0, space 0, times 0 [ 345.180751][T11231] FAULT_INJECTION: forcing a failure. [ 345.180751][T11231] name failslab, interval 1, probability 0, space 0, times 0 [ 345.199133][T11226] CPU: 1 PID: 11226 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 345.209059][T11226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.219124][T11226] Call Trace: [ 345.222431][T11226] dump_stack+0x188/0x20d [ 345.226789][T11226] should_fail.cold+0x5/0x14 [ 345.231394][T11226] ? lock_downgrade+0x7f0/0x7f0 [ 345.236256][T11226] ? setup_fault_attr+0x1e0/0x1e0 [ 345.241303][T11226] should_failslab+0x5/0xf [ 345.245734][T11226] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 345.251124][T11226] ? find_held_lock+0x2d/0x110 [ 345.255997][T11226] p9_client_create+0xcb/0x1430 [ 345.260891][T11226] ? p9_client_zc_rpc.constprop.0+0x1140/0x1140 [ 345.267150][T11226] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 345.272983][T11226] ? __kmalloc_track_caller+0x61c/0x790 [ 345.278548][T11226] ? v9fs_session_init+0xef/0x18c0 [ 345.284635][T11226] ? __lock_acquire+0x18c3/0x5270 [ 345.289704][T11226] ? lockdep_init_map+0x1b0/0x6c0 [ 345.294759][T11226] ? v9fs_session_init+0x1e7/0x18c0 [ 345.299970][T11226] v9fs_session_init+0x1e7/0x18c0 [ 345.305006][T11226] ? find_held_lock+0x2d/0x110 [ 345.309783][T11226] ? fs_reclaim_release+0xa/0x20 [ 345.314745][T11226] ? v9fs_show_options+0x7e0/0x7e0 [ 345.319874][T11226] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 345.325439][T11226] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 345.331442][T11226] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 345.337277][T11226] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 345.342849][T11226] ? apparmor_cred_prepare+0x760/0x760 [ 345.348496][T11226] ? kfree+0x285/0x2b0 [ 345.352589][T11226] v9fs_mount+0x79/0x970 [ 345.356853][T11226] ? v9fs_write_inode+0x60/0x60 [ 345.361719][T11226] legacy_get_tree+0x105/0x220 [ 345.366495][T11226] ? ns_capable_common+0xe2/0x100 [ 345.371541][T11226] vfs_get_tree+0x89/0x2f0 [ 345.375984][T11226] do_mount+0x1306/0x1a60 [ 345.380344][T11226] ? copy_mount_string+0x40/0x40 [ 345.385312][T11226] ? _copy_from_user+0x123/0x190 [ 345.389405][T11242] sctp: [Deprecated]: syz-executor.2 (pid 11242) Use of struct sctp_assoc_value in delayed_ack socket option. [ 345.389405][T11242] Use struct sctp_sack_info instead [ 345.390269][T11226] __x64_sys_mount+0x18f/0x230 [ 345.390296][T11226] do_syscall_64+0xf6/0x790 [ 345.390317][T11226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.390334][T11226] RIP: 0033:0x45c849 [ 345.426027][T11226] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.445897][T11226] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 345.454337][T11226] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 345.462293][T11226] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 345.470250][T11226] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 345.478205][T11226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 345.486173][T11226] R13: 000000000000074c R14: 00000000004ca09f R15: 000000000000000e [ 345.502269][T11229] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 345.512307][T11231] CPU: 0 PID: 11231 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 345.522996][T11231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.533061][T11231] Call Trace: [ 345.536370][T11231] dump_stack+0x188/0x20d [ 345.540723][T11231] should_fail.cold+0x5/0x14 [ 345.544214][T11247] sctp: [Deprecated]: syz-executor.2 (pid 11247) Use of struct sctp_assoc_value in delayed_ack socket option. [ 345.544214][T11247] Use struct sctp_sack_info instead [ 345.545320][T11231] ? lock_downgrade+0x7f0/0x7f0 [ 345.545338][T11231] ? setup_fault_attr+0x1e0/0x1e0 [ 345.545372][T11231] should_failslab+0x5/0xf [ 345.569975][T11229] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 345.571904][T11231] __kmalloc+0x2d9/0x7a0 [ 345.571919][T11231] ? _parse_integer+0x12f/0x180 [ 345.571934][T11231] ? rw_copy_check_uvector+0x31b/0x390 [ 345.571955][T11231] ? mark_lock+0xbc/0x1220 [ 345.571981][T11231] rw_copy_check_uvector+0x31b/0x390 [ 345.572064][T11231] ? smp_apic_timer_interrupt+0x1b6/0x600 [ 345.572084][T11231] import_iovec+0xa6/0x3d0 [ 345.582975][T11229] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 345.587467][T11231] ? dup_iter+0x250/0x250 [ 345.587487][T11231] ? find_held_lock+0x2d/0x110 [ 345.587511][T11231] vfs_readv+0xc6/0x160 [ 345.587563][T11231] ? compat_rw_copy_check_uvector+0x4b0/0x4b0 [ 345.650801][T11231] ? rcu_read_lock_held_common+0x130/0x130 [ 345.656635][T11231] ? __fget_files+0x329/0x4f0 [ 345.661343][T11231] ? do_dup2+0x520/0x520 [ 345.665606][T11231] ? fput_many+0x2f/0x1a0 [ 345.669965][T11231] do_preadv+0x1b6/0x270 [ 345.674227][T11231] ? do_readv+0x2f0/0x2f0 [ 345.678564][T11231] ? __ia32_sys_clock_settime+0x260/0x260 [ 345.684401][T11231] ? trace_hardirqs_off_caller+0x55/0x230 [ 345.690150][T11231] do_syscall_64+0xf6/0x790 [ 345.694677][T11231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.700579][T11231] RIP: 0033:0x45c849 [ 345.704490][T11231] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.724103][T11231] RSP: 002b:00007f1fc404ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 345.732529][T11231] RAX: ffffffffffffffda RBX: 00007f1fc404b6d4 RCX: 000000000045c849 [ 345.740520][T11231] RDX: 10000000000000f7 RSI: 0000000020000480 RDI: 0000000000000004 [ 345.748526][T11231] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 345.756511][T11231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 00:08:28 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x2c}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:28 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x2f}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:28 executing program 2: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, r1, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_MGMT_A_DOMAIN={0x15, 0x1, 'aegis256-generic\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1d}}]}, 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x20000481) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@empty}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x4c, 0x12, {{'aegis256-generic\x00'}}}]}, 0x13c}}, 0x0) 00:08:28 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x3a}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 345.764520][T11231] R13: 000000000000085a R14: 00000000004cb1ac R15: 0000000000000000 [ 345.812576][T11229] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 00:08:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:30 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6, 0xfdc}}, 0xe8) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$BLKRAGET(r5, 0x1263, &(0x7f0000000000)) sendmmsg(r4, &(0x7f0000000480), 0x2e9, 0x0) 00:08:30 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x3c}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:30 executing program 4 (fault-call:6 fault-nth:15): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:30 executing program 0 (fault-call:4 fault-nth:1): io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:30 executing program 1: utimes(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000000)={0x100, 0x4aa2}) syz_emit_ethernet(0xae, &(0x7f0000000440)={@multicast, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x78, 0x3a, 0xff, @local={0xfe, 0x80, [0x2, 0x10, 0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0xd]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x7, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81802"}, {0x0, 0x1, "ffffffffa005000000000000"}]}}}}}}, 0x0) [ 348.350087][T11275] FAULT_INJECTION: forcing a failure. [ 348.350087][T11275] name failslab, interval 1, probability 0, space 0, times 0 [ 348.373120][T11275] CPU: 0 PID: 11275 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 348.383042][T11275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.393117][T11275] Call Trace: [ 348.396442][T11275] dump_stack+0x188/0x20d [ 348.400798][T11275] should_fail.cold+0x5/0x14 [ 348.405413][T11275] ? setup_fault_attr+0x1e0/0x1e0 [ 348.410470][T11275] should_failslab+0x5/0xf [ 348.414939][T11275] kmem_cache_alloc_node_trace+0x27c/0x790 [ 348.420794][T11275] __kmalloc_node+0x38/0x60 [ 348.425312][T11275] kvmalloc_node+0x61/0xf0 [ 348.429752][T11275] seq_read+0x82e/0x1160 [ 348.434031][T11275] do_iter_read+0x47f/0x650 [ 348.438569][T11275] vfs_readv+0xf0/0x160 [ 348.442751][T11275] ? compat_rw_copy_check_uvector+0x4b0/0x4b0 [ 348.448850][T11275] ? rcu_read_lock_held_common+0x130/0x130 [ 348.454685][T11275] ? __fget_files+0x329/0x4f0 [ 348.459401][T11275] ? do_dup2+0x520/0x520 [ 348.463665][T11275] ? lockdep_hardirqs_on+0x417/0x5d0 [ 348.468984][T11275] do_preadv+0x1b6/0x270 [ 348.473243][T11275] ? do_readv+0x2f0/0x2f0 [ 348.477596][T11275] ? do_syscall_64+0xbc/0x790 [ 348.482293][T11275] do_syscall_64+0xf6/0x790 [ 348.486819][T11275] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.492719][T11275] RIP: 0033:0x45c849 00:08:31 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0xff}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 348.496632][T11275] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 348.516281][T11275] RSP: 002b:00007f1fc406bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 348.525057][T11275] RAX: ffffffffffffffda RBX: 00007f1fc406c6d4 RCX: 000000000045c849 [ 348.533162][T11275] RDX: 10000000000000f7 RSI: 0000000020000480 RDI: 0000000000000005 [ 348.541146][T11275] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 00:08:31 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00000000c0)={[0x68]}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r4, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) fstat(r4, &(0x7f0000000100)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r5}}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r5}) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r9}}, 0x20}}, 0x0) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f0000000900)=0x0, &(0x7f0000000940)=0x4) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000b80)={&(0x7f0000000980)=ANY=[@ANYBLOB="e0010000", @ANYRES16=0x0, @ANYBLOB="000129bd7000fedbdf250400000040000180140002006d61637674617030000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="4c0001801400020069705f7674693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006970365f767469300000000000000000080003000600000008000100", @ANYRES32=0x0, @ANYBLOB="340001800800030002000000080003000000000008000300020000000800030002000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="4000018014000200766972745f776966693000000000000008000300030000000800030001000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000300000000000c00018008000300010000006c0001800800030003000000140002007767300000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="1400020069705f76746930000000000000000000080003000300000008000100", @ANYRES32=r9, @ANYBLOB="540001800800030003000000080003000100000008000300000000000800030002000000140002007767310000000000000000000000000008000100", @ANYRES32=r10, @ANYBLOB="14000200636169663000"/20], 0x1e0}, 0x1, 0x0, 0x0, 0xc010}, 0x4800) sendfile(r3, r2, 0x0, 0x20401) [ 348.541894][T11287] FAULT_INJECTION: forcing a failure. [ 348.541894][T11287] name failslab, interval 1, probability 0, space 0, times 0 [ 348.549238][T11275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 348.549263][T11275] R13: 000000000000085a R14: 00000000004cb1ac R15: 0000000000000001 [ 348.611876][T11287] CPU: 0 PID: 11287 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 348.621810][T11287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.633109][T11287] Call Trace: [ 348.636418][T11287] dump_stack+0x188/0x20d [ 348.640776][T11287] should_fail.cold+0x5/0x14 [ 348.645676][T11287] ? lock_downgrade+0x7f0/0x7f0 [ 348.650547][T11287] ? setup_fault_attr+0x1e0/0x1e0 [ 348.655610][T11287] should_failslab+0x5/0xf [ 348.660044][T11287] __kmalloc_track_caller+0x2d1/0x790 [ 348.665531][T11287] ? v9fs_session_init+0xae/0x18c0 [ 348.670664][T11287] ? __lock_acquire+0x18c3/0x5270 [ 348.675719][T11287] kstrdup+0x36/0x70 [ 348.679634][T11287] v9fs_session_init+0xae/0x18c0 [ 348.684589][T11287] ? find_held_lock+0x2d/0x110 [ 348.689383][T11287] ? fs_reclaim_release+0xa/0x20 [ 348.694357][T11287] ? v9fs_show_options+0x7e0/0x7e0 [ 348.699479][T11287] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 348.705041][T11287] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 348.711041][T11287] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 348.716874][T11287] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 348.722441][T11287] ? apparmor_cred_prepare+0x760/0x760 [ 348.727919][T11287] ? kfree+0x285/0x2b0 [ 348.732013][T11287] v9fs_mount+0x79/0x970 [ 348.736276][T11287] ? v9fs_write_inode+0x60/0x60 [ 348.741165][T11287] legacy_get_tree+0x105/0x220 [ 348.745955][T11287] ? ns_capable_common+0xe2/0x100 [ 348.750998][T11287] vfs_get_tree+0x89/0x2f0 [ 348.755441][T11287] do_mount+0x1306/0x1a60 [ 348.759794][T11287] ? copy_mount_string+0x40/0x40 [ 348.764753][T11287] ? _copy_from_user+0x123/0x190 [ 348.769720][T11287] __x64_sys_mount+0x18f/0x230 [ 348.774508][T11287] do_syscall_64+0xf6/0x790 [ 348.779050][T11287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.785040][T11287] RIP: 0033:0x45c849 [ 348.788955][T11287] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:08:31 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:31 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 348.808674][T11287] RSP: 002b:00007f22de119c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 348.817102][T11287] RAX: ffffffffffffffda RBX: 00007f22de11a6d4 RCX: 000000000045c849 [ 348.825172][T11287] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 348.833171][T11287] RBP: 000000000076bfa0 R08: 00000000200004c0 R09: 0000000000000000 [ 348.841161][T11287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 348.849148][T11287] R13: 000000000000074c R14: 00000000004ca09f R15: 000000000000000f 00:08:31 executing program 4 (fault-call:6 fault-nth:16): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:31 executing program 0 (fault-call:4 fault-nth:2): io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) [ 349.028991][T11307] FAULT_INJECTION: forcing a failure. [ 349.028991][T11307] name failslab, interval 1, probability 0, space 0, times 0 [ 349.059040][T11307] CPU: 0 PID: 11307 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 349.068975][T11307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.079062][T11307] Call Trace: [ 349.082370][T11307] dump_stack+0x188/0x20d [ 349.086724][T11307] should_fail.cold+0x5/0x14 [ 349.091440][T11307] ? lock_downgrade+0x7f0/0x7f0 [ 349.096310][T11307] ? setup_fault_attr+0x1e0/0x1e0 [ 349.101368][T11307] should_failslab+0x5/0xf [ 349.105796][T11307] __kmalloc_track_caller+0x2d1/0x790 [ 349.108918][T11311] FAULT_INJECTION: forcing a failure. [ 349.108918][T11311] name failslab, interval 1, probability 0, space 0, times 0 [ 349.111213][T11307] ? v9fs_session_init+0xef/0x18c0 [ 349.111231][T11307] ? __lock_acquire+0x18c3/0x5270 [ 349.111256][T11307] kstrdup+0x36/0x70 [ 349.111275][T11307] v9fs_session_init+0xef/0x18c0 [ 349.142824][T11307] ? find_held_lock+0x2d/0x110 [ 349.147606][T11307] ? fs_reclaim_release+0xa/0x20 [ 349.152565][T11307] ? v9fs_show_options+0x7e0/0x7e0 [ 349.157703][T11307] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 349.163261][T11307] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 349.169263][T11307] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 349.175165][T11307] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 349.180709][T11307] ? apparmor_cred_prepare+0x760/0x760 [ 349.186172][T11307] ? kfree+0x285/0x2b0 [ 349.190268][T11307] v9fs_mount+0x79/0x970 [ 349.194536][T11307] ? v9fs_write_inode+0x60/0x60 [ 349.199401][T11307] legacy_get_tree+0x105/0x220 [ 349.204296][T11307] ? ns_capable_common+0xe2/0x100 [ 349.209364][T11307] vfs_get_tree+0x89/0x2f0 [ 349.213784][T11307] do_mount+0x1306/0x1a60 [ 349.218149][T11307] ? copy_mount_string+0x40/0x40 [ 349.223105][T11307] ? _copy_from_user+0x123/0x190 [ 349.228075][T11307] __x64_sys_mount+0x18f/0x230 [ 349.232847][T11307] do_syscall_64+0xf6/0x790 [ 349.237361][T11307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 349.243252][T11307] RIP: 0033:0x45c849 [ 349.247147][T11307] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 349.266754][T11307] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 349.275209][T11307] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 349.283179][T11307] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 349.291152][T11307] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 349.299334][T11307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 349.307300][T11307] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000010 [ 349.315823][T11311] CPU: 1 PID: 11311 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 349.325726][T11311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.335793][T11311] Call Trace: [ 349.339200][T11311] dump_stack+0x188/0x20d [ 349.343567][T11311] should_fail.cold+0x5/0x14 [ 349.348188][T11311] ? setup_fault_attr+0x1e0/0x1e0 [ 349.353310][T11311] should_failslab+0x5/0xf [ 349.357946][T11311] kmem_cache_alloc_node_trace+0x27c/0x790 [ 349.363831][T11311] __kmalloc_node+0x38/0x60 [ 349.368358][T11311] kvmalloc_node+0x61/0xf0 [ 349.372801][T11311] seq_read+0x82e/0x1160 [ 349.377079][T11311] do_iter_read+0x47f/0x650 [ 349.381622][T11311] vfs_readv+0xf0/0x160 [ 349.385809][T11311] ? compat_rw_copy_check_uvector+0x4b0/0x4b0 [ 349.391895][T11311] ? rcu_read_lock_held_common+0x130/0x130 [ 349.398550][T11311] ? __fget_files+0x329/0x4f0 [ 349.403256][T11311] ? do_dup2+0x520/0x520 [ 349.407539][T11311] do_preadv+0x1b6/0x270 [ 349.411800][T11311] ? do_readv+0x2f0/0x2f0 [ 349.416157][T11311] ? trace_hardirqs_off_caller+0x55/0x230 [ 349.422003][T11311] do_syscall_64+0xf6/0x790 [ 349.426613][T11311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 349.432640][T11311] RIP: 0033:0x45c849 [ 349.436545][T11311] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 349.456274][T11311] RSP: 002b:00007f1fc406bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 349.464701][T11311] RAX: ffffffffffffffda RBX: 00007f1fc406c6d4 RCX: 000000000045c849 [ 349.472688][T11311] RDX: 10000000000000f7 RSI: 0000000020000480 RDI: 0000000000000005 [ 349.480916][T11311] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 349.488902][T11311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 349.496885][T11311] R13: 000000000000085a R14: 00000000004cb1ac R15: 0000000000000002 00:08:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:34 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x531eb1e283e7455}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x9}, r1, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffce8}, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r4, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r5 = accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000700)) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r6, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc, &(0x7f0000000400)=[{&(0x7f0000001580)={0x504, 0x3c, 0x100, 0x70bd27, 0x25dfdbfd, "", [@nested={0x10a, 0x46, 0x0, 0x1, [@typed={0x8, 0x6d, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x34}}, @typed={0x8, 0x8f, 0x0, 0x0, @pid}, @typed={0x8, 0x4c, 0x0, 0x0, @fd}, @generic="a5bebaa8596e6ba54c4c727443d33a1ff17580186b2e48b5ee5d5cd72dbdaeef0b8092a0bf533700868625ad37242895b4d4ef27d9752bce826e74d7ce3d11247f6f4525d6532be0fcf0b5aebf32df35520ba4c2ae8fd40506ad0e5569b8d5d0ed1676affe1b3176e440b6a196163ae9d0bf7645661365f79adb80df9cfd93670eaa48f0693d8800bccff718f1cacc62363558ef58d025c9d78549d95e2dd88b4c10505dbcc13c28d11940ae69f6922bd9aff5a52ce49b060a84ed79d469dcac23279413799c7252d3399698e18b853eb49ec6f7a3a65bdd6b953533d254655bee8a813021875510c92e163322ed"]}, @nested={0x18, 0x5e, 0x0, 0x1, [@typed={0x8, 0x2e, 0x0, 0x0, @fd=r5}, @typed={0xc, 0x2d, 0x0, 0x0, @u64=0x5}]}, @generic="c68168aad42aa53cda9af891a2c9e7e803dc404a19c06144d0c6a42ff9408f37d694f43919fb9c8d009fd0f35e6fa1ad3251064bcc1c8138336fb95d577e0a6655d3ed1b2c3db634934ccf31f7a6a221aad08de30f3857bbe4cb211469fdcbac27f086e4848bae6d811bfebbce5e53041669822543996d3b45bb2a2261e82220e4f54667de06c6e7bf2c1a8f9e444ece906c2034b0a852fa5a49d5783e95167751b82983cd84e464a29401d9c05b1cf84c96189058ccb169de47e04d7d12ed0268be7894f69ab626c9", @generic="d20dd3c41ab210dca81c56440a6f667d2405d589887e61ff3b3084d436cb3025c4c512b457ce41f245f850bbd6bdb977a82caf99cbd62b397bf80c32d5430e50141b94784a15d48a73d119bf85e8b5e9ec5331d9129b1bdfc7d20ea7796b03b0f99a5743b2eab060dd6705c4ab2ec03cc7f246ddfae2ec6f56273637fe669dd871dbf045eefc425cc5c109db1be659e5a9b692f09282034aedab3e4bd8aa18", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x663b}, @nested={0xa4, 0x93, 0x0, 0x1, [@generic="b61f43f5ab859db243ec4420ef9b6f501516de3746a6d27339ee733f158eb85938f8c188a0fed3a13ea5827f13757e867c9c564dc7e5a17549f34af2913bf77a8be3aba9a9d620f7c4067476f0a4d9bc06cfccc1dea174c5639b44a9e47d483a2d8eced35fcf99dc0d76b0f8abf3e452a83a1635f0d4bda45ad3ab642399509e6d30a62d90163be9f16b6970c16625b71bd70fa855001a48510ca1b555bbc533"]}, @nested={0x44, 0x72, 0x0, 0x1, [@generic="d12d162fe02b2db13b89e9f912eaf8c9992edd5a9ff81a8cb4a5c2d84835eef2df04af459503b7cecaf4aeec", @typed={0x14, 0x15, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, @nested={0x168, 0xd, 0x0, 0x1, [@typed={0xc, 0x66, 0x0, 0x0, @u64=0x6}, @typed={0x8, 0x3c, 0x0, 0x0, @fd=r5}, @generic="0deda1a33020820f99e276fd29ee35748fc2d648a17df72a6e411558d73144696f021c8a3a4ee59713fa8c531d381f0d74a8806c14c755fd3bada30f4796694192ef4e830eda31d3b4b3cdb2b365232126368d986f4493d1a6e1fba970a2ba95801800e8353d04b8cf0c3a18c32573ae7c0a0b2d7555925b185ef8ff25f407d7ed39b98c3ea958f22916719020aeaf4b41608ff58126b180c10c18bd8b2e36aa08a7c42c6b0b000000000000000000000000007fce7fcf9a60ea247ee5e16f82ad380d599b18babf9400d561b5cbd730abcf1ba1e6c1517738df94860c9304b48e106a34", @generic="b38c4672c8dce99d477c78cf433e95a5210e63bd653879ad63c1ab1d2c63eb0a5e1d3c5bd3420c0dcc56103bd9aed29e7e16b5aadd4e89784eeb6a46f915b1a2369133adfa12e9074801735b3ef427a8857b2a80d9e18d2b83de457ded2652db5bc01772ee51d1b938a75490"]}, @typed={0x5, 0x81, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x5, 0x0, 0x0, @uid}]}, 0x504}, {&(0x7f0000000140)={0x38, 0x42, 0x3ee3c6027d73378e, 0x70bd27, 0x25dfdbfe, "", [@nested={0x25, 0x85, 0x0, 0x1, [@generic="2ea0d36442ca921bd72e44afdc291af851277fd8e488ce6d2d84e186633c8c1f0e"]}]}, 0x38}], 0x2, &(0x7f0000000d00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r1}}}, @rights={{0x18, 0x1, 0x1, [r2, 0xffffffffffffffff]}}, @rights={{0x10}}], 0xc0, 0x90}, 0x8000) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="5400000030000f00000000000000f43c00000000000001003c000100090001006d706c73000000002800028008000500000000001c00020000000000000000000000000000000000000000000200000004000600"], 0x54}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000280)='\x00', 0xffffffffffffffff}, 0x30) 00:08:34 executing program 1: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@fat=@time_offset={'time_offset', 0x3d, 0x40000000}}]}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{}, {r0, r1/1000+30000}}) 00:08:34 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:34 executing program 4 (fault-call:6 fault-nth:17): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:34 executing program 0 (fault-call:4 fault-nth:3): io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) 00:08:34 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x4}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 351.589381][T11338] FAULT_INJECTION: forcing a failure. [ 351.589381][T11338] name failslab, interval 1, probability 0, space 0, times 0 [ 351.628772][T11335] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. [ 351.629708][T11338] CPU: 1 PID: 11338 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 351.648095][T11338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.658143][T11338] Call Trace: [ 351.661433][T11338] dump_stack+0x188/0x20d [ 351.665779][T11338] should_fail.cold+0x5/0x14 [ 351.670380][T11338] ? lock_downgrade+0x7f0/0x7f0 [ 351.675229][T11338] ? setup_fault_attr+0x1e0/0x1e0 [ 351.680285][T11338] should_failslab+0x5/0xf [ 351.684707][T11338] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 351.690071][T11338] ? find_held_lock+0x2d/0x110 [ 351.694835][T11338] p9_client_create+0xcb/0x1430 [ 351.699716][T11338] ? p9_client_zc_rpc.constprop.0+0x1140/0x1140 [ 351.705947][T11338] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 351.711749][T11338] ? __kmalloc_track_caller+0x61c/0x790 [ 351.717283][T11338] ? v9fs_session_init+0xef/0x18c0 [ 351.722382][T11338] ? perf_trace_lock+0xeb/0x4c0 [ 351.727217][T11338] ? lockdep_init_map+0x1b0/0x6c0 [ 351.732237][T11338] ? v9fs_session_init+0x1e7/0x18c0 [ 351.737578][T11338] v9fs_session_init+0x1e7/0x18c0 [ 351.742601][T11338] ? find_held_lock+0x2d/0x110 [ 351.747358][T11338] ? fs_reclaim_release+0xa/0x20 [ 351.752309][T11338] ? v9fs_show_options+0x7e0/0x7e0 [ 351.757413][T11338] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 351.762953][T11338] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 351.768925][T11338] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 351.774729][T11338] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 351.780266][T11338] ? apparmor_cred_prepare+0x760/0x760 [ 351.785726][T11338] ? kfree+0x285/0x2b0 [ 351.789800][T11338] v9fs_mount+0x79/0x970 [ 351.794037][T11338] ? v9fs_write_inode+0x60/0x60 [ 351.798873][T11338] legacy_get_tree+0x105/0x220 [ 351.803625][T11338] ? ns_capable_common+0xe2/0x100 [ 351.808641][T11338] vfs_get_tree+0x89/0x2f0 [ 351.813048][T11338] do_mount+0x1306/0x1a60 [ 351.817521][T11338] ? copy_mount_string+0x40/0x40 [ 351.822464][T11338] ? _copy_from_user+0x123/0x190 [ 351.827406][T11338] __x64_sys_mount+0x18f/0x230 [ 351.832184][T11338] do_syscall_64+0xf6/0x790 [ 351.836796][T11338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.842692][T11338] RIP: 0033:0x45c849 [ 351.846581][T11338] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 351.866170][T11338] RSP: 002b:00007f22de119c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 351.874581][T11338] RAX: ffffffffffffffda RBX: 00007f22de11a6d4 RCX: 000000000045c849 [ 351.882635][T11338] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 00:08:34 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f7, 0x0) [ 351.890591][T11338] RBP: 000000000076bfa0 R08: 00000000200004c0 R09: 0000000000000000 [ 351.898547][T11338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 351.906516][T11338] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000011 00:08:34 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x5}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:34 executing program 4 (fault-call:6 fault-nth:18): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:34 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x6}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/shm\x00', 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f00000000c0)={0x0, 0x401, 0x2b}) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r2, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_int(r3, 0x0, 0xf, 0x0, &(0x7f0000000040)) [ 352.162373][T11358] FAULT_INJECTION: forcing a failure. [ 352.162373][T11358] name failslab, interval 1, probability 0, space 0, times 0 [ 352.189318][T11335] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. [ 352.251932][T11358] CPU: 1 PID: 11358 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 352.261870][T11358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.271935][T11358] Call Trace: [ 352.275251][T11358] dump_stack+0x188/0x20d [ 352.279617][T11358] should_fail.cold+0x5/0x14 [ 352.284223][T11358] ? lock_downgrade+0x7f0/0x7f0 [ 352.289097][T11358] ? setup_fault_attr+0x1e0/0x1e0 [ 352.294154][T11358] should_failslab+0x5/0xf [ 352.298586][T11358] __kmalloc_track_caller+0x2d1/0x790 [ 352.303969][T11358] ? p9_client_create+0x45d/0x1430 [ 352.309091][T11358] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 352.314667][T11358] kstrdup+0x36/0x70 [ 352.318678][T11358] p9_client_create+0x45d/0x1430 [ 352.323658][T11358] ? p9_client_zc_rpc.constprop.0+0x1140/0x1140 [ 352.329912][T11358] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 352.335756][T11358] ? __kmalloc_track_caller+0x61c/0x790 [ 352.341316][T11358] ? v9fs_session_init+0xef/0x18c0 [ 352.346447][T11358] ? __lock_acquire+0x18c3/0x5270 [ 352.351492][T11358] ? lockdep_init_map+0x1b0/0x6c0 [ 352.356669][T11358] ? v9fs_session_init+0x1e7/0x18c0 [ 352.361866][T11358] v9fs_session_init+0x1e7/0x18c0 [ 352.366883][T11358] ? find_held_lock+0x2d/0x110 [ 352.371653][T11358] ? fs_reclaim_release+0xa/0x20 [ 352.376603][T11358] ? v9fs_show_options+0x7e0/0x7e0 [ 352.381717][T11358] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 352.387251][T11358] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 352.393229][T11358] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 352.399048][T11358] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 352.404586][T11358] ? apparmor_cred_prepare+0x760/0x760 [ 352.410049][T11358] ? kfree+0x285/0x2b0 [ 352.414167][T11358] v9fs_mount+0x79/0x970 [ 352.418852][T11358] ? v9fs_write_inode+0x60/0x60 [ 352.423757][T11358] legacy_get_tree+0x105/0x220 [ 352.428507][T11358] ? ns_capable_common+0xe2/0x100 [ 352.433605][T11358] vfs_get_tree+0x89/0x2f0 [ 352.438007][T11358] do_mount+0x1306/0x1a60 [ 352.442340][T11358] ? copy_mount_string+0x40/0x40 [ 352.447279][T11358] ? _copy_from_user+0x123/0x190 [ 352.452223][T11358] __x64_sys_mount+0x18f/0x230 [ 352.456987][T11358] do_syscall_64+0xf6/0x790 [ 352.461478][T11358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.467351][T11358] RIP: 0033:0x45c849 [ 352.471238][T11358] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.490874][T11358] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 352.499466][T11358] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 352.507436][T11358] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 352.515403][T11358] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 352.523925][T11358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 352.531883][T11358] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000012 00:08:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:37 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x29}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:37 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000002, 0x0) 00:08:37 executing program 4 (fault-call:6 fault-nth:19): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:37 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x531eb1e283e7455}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x9}, r1, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xfffffffffffffce8}, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r4, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r5 = accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000700)) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r6, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc, &(0x7f0000000400)=[{&(0x7f0000001580)={0x504, 0x3c, 0x100, 0x70bd27, 0x25dfdbfd, "", [@nested={0x10a, 0x46, 0x0, 0x1, [@typed={0x8, 0x6d, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x34}}, @typed={0x8, 0x8f, 0x0, 0x0, @pid}, @typed={0x8, 0x4c, 0x0, 0x0, @fd}, @generic="a5bebaa8596e6ba54c4c727443d33a1ff17580186b2e48b5ee5d5cd72dbdaeef0b8092a0bf533700868625ad37242895b4d4ef27d9752bce826e74d7ce3d11247f6f4525d6532be0fcf0b5aebf32df35520ba4c2ae8fd40506ad0e5569b8d5d0ed1676affe1b3176e440b6a196163ae9d0bf7645661365f79adb80df9cfd93670eaa48f0693d8800bccff718f1cacc62363558ef58d025c9d78549d95e2dd88b4c10505dbcc13c28d11940ae69f6922bd9aff5a52ce49b060a84ed79d469dcac23279413799c7252d3399698e18b853eb49ec6f7a3a65bdd6b953533d254655bee8a813021875510c92e163322ed"]}, @nested={0x18, 0x5e, 0x0, 0x1, [@typed={0x8, 0x2e, 0x0, 0x0, @fd=r5}, @typed={0xc, 0x2d, 0x0, 0x0, @u64=0x5}]}, @generic="c68168aad42aa53cda9af891a2c9e7e803dc404a19c06144d0c6a42ff9408f37d694f43919fb9c8d009fd0f35e6fa1ad3251064bcc1c8138336fb95d577e0a6655d3ed1b2c3db634934ccf31f7a6a221aad08de30f3857bbe4cb211469fdcbac27f086e4848bae6d811bfebbce5e53041669822543996d3b45bb2a2261e82220e4f54667de06c6e7bf2c1a8f9e444ece906c2034b0a852fa5a49d5783e95167751b82983cd84e464a29401d9c05b1cf84c96189058ccb169de47e04d7d12ed0268be7894f69ab626c9", @generic="d20dd3c41ab210dca81c56440a6f667d2405d589887e61ff3b3084d436cb3025c4c512b457ce41f245f850bbd6bdb977a82caf99cbd62b397bf80c32d5430e50141b94784a15d48a73d119bf85e8b5e9ec5331d9129b1bdfc7d20ea7796b03b0f99a5743b2eab060dd6705c4ab2ec03cc7f246ddfae2ec6f56273637fe669dd871dbf045eefc425cc5c109db1be659e5a9b692f09282034aedab3e4bd8aa18", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x663b}, @nested={0xa4, 0x93, 0x0, 0x1, [@generic="b61f43f5ab859db243ec4420ef9b6f501516de3746a6d27339ee733f158eb85938f8c188a0fed3a13ea5827f13757e867c9c564dc7e5a17549f34af2913bf77a8be3aba9a9d620f7c4067476f0a4d9bc06cfccc1dea174c5639b44a9e47d483a2d8eced35fcf99dc0d76b0f8abf3e452a83a1635f0d4bda45ad3ab642399509e6d30a62d90163be9f16b6970c16625b71bd70fa855001a48510ca1b555bbc533"]}, @nested={0x44, 0x72, 0x0, 0x1, [@generic="d12d162fe02b2db13b89e9f912eaf8c9992edd5a9ff81a8cb4a5c2d84835eef2df04af459503b7cecaf4aeec", @typed={0x14, 0x15, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, @nested={0x168, 0xd, 0x0, 0x1, [@typed={0xc, 0x66, 0x0, 0x0, @u64=0x6}, @typed={0x8, 0x3c, 0x0, 0x0, @fd=r5}, @generic="0deda1a33020820f99e276fd29ee35748fc2d648a17df72a6e411558d73144696f021c8a3a4ee59713fa8c531d381f0d74a8806c14c755fd3bada30f4796694192ef4e830eda31d3b4b3cdb2b365232126368d986f4493d1a6e1fba970a2ba95801800e8353d04b8cf0c3a18c32573ae7c0a0b2d7555925b185ef8ff25f407d7ed39b98c3ea958f22916719020aeaf4b41608ff58126b180c10c18bd8b2e36aa08a7c42c6b0b000000000000000000000000007fce7fcf9a60ea247ee5e16f82ad380d599b18babf9400d561b5cbd730abcf1ba1e6c1517738df94860c9304b48e106a34", @generic="b38c4672c8dce99d477c78cf433e95a5210e63bd653879ad63c1ab1d2c63eb0a5e1d3c5bd3420c0dcc56103bd9aed29e7e16b5aadd4e89784eeb6a46f915b1a2369133adfa12e9074801735b3ef427a8857b2a80d9e18d2b83de457ded2652db5bc01772ee51d1b938a75490"]}, @typed={0x5, 0x81, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x5, 0x0, 0x0, @uid}]}, 0x504}, {&(0x7f0000000140)={0x38, 0x42, 0x3ee3c6027d73378e, 0x70bd27, 0x25dfdbfe, "", [@nested={0x25, 0x85, 0x0, 0x1, [@generic="2ea0d36442ca921bd72e44afdc291af851277fd8e488ce6d2d84e186633c8c1f0e"]}]}, 0x38}], 0x2, &(0x7f0000000d00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r1}}}, @rights={{0x18, 0x1, 0x1, [r2, 0xffffffffffffffff]}}, @rights={{0x10}}], 0xc0, 0x90}, 0x8000) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="5400000030000f00000000000000f43c00000000000001003c000100090001006d706c73000000002800028008000500000000001c00020000000000000000000000000000000000000000000200000004000600"], 0x54}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000280)='\x00', 0xffffffffffffffff}, 0x30) 00:08:37 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x2010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400c00) 00:08:37 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2b}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 354.689700][T11386] FAULT_INJECTION: forcing a failure. [ 354.689700][T11386] name failslab, interval 1, probability 0, space 0, times 0 [ 354.742887][T11383] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. [ 354.745997][T11386] CPU: 0 PID: 11386 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 354.762172][T11386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.772256][T11386] Call Trace: [ 354.775564][T11386] dump_stack+0x188/0x20d [ 354.779931][T11386] should_fail.cold+0x5/0x14 [ 354.784552][T11386] ? lock_downgrade+0x7f0/0x7f0 [ 354.789761][T11386] ? setup_fault_attr+0x1e0/0x1e0 [ 354.794992][T11386] should_failslab+0x5/0xf [ 354.799438][T11386] __kmalloc_track_caller+0x2d1/0x790 [ 354.804824][T11386] ? parse_opts.part.0+0x94/0x330 [ 354.809843][T11386] ? vfs_get_tree+0x89/0x2f0 [ 354.814560][T11386] ? do_mount+0x1306/0x1a60 [ 354.819124][T11386] kstrdup+0x36/0x70 [ 354.823024][T11386] parse_opts.part.0+0x94/0x330 [ 354.827871][T11386] ? do_mount+0x1306/0x1a60 [ 354.832364][T11386] ? __x64_sys_mount+0x18f/0x230 [ 354.837294][T11386] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 354.843439][T11386] ? p9_fd_show_options+0x1c0/0x1c0 [ 354.848632][T11386] ? find_held_lock+0x2d/0x110 [ 354.853398][T11386] ? debug_check_no_obj_freed+0x20f/0x445 [ 354.859131][T11386] ? lock_downgrade+0x7f0/0x7f0 [ 354.863985][T11386] p9_fd_create_tcp+0xb5/0x4e0 [ 354.868745][T11386] ? p9_fd_create_unix+0x290/0x290 [ 354.874033][T11386] ? trace_hardirqs_off+0x50/0x220 [ 354.879198][T11386] ? quarantine_put+0x119/0x1c0 [ 354.884071][T11386] ? kfree+0x1eb/0x2b0 [ 354.888155][T11386] ? p9_client_create+0x82c/0x1430 [ 354.893271][T11386] ? lockdep_hardirqs_on+0x417/0x5d0 [ 354.898562][T11386] p9_client_create+0x896/0x1430 [ 354.903519][T11386] ? p9_client_zc_rpc.constprop.0+0x1140/0x1140 [ 354.909750][T11386] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 354.915555][T11386] ? __kmalloc_track_caller+0x61c/0x790 [ 354.921101][T11386] ? v9fs_session_init+0xef/0x18c0 [ 354.926224][T11386] ? __lock_acquire+0x18c3/0x5270 [ 354.931235][T11386] ? lockdep_init_map+0x1b0/0x6c0 [ 354.936264][T11386] ? v9fs_session_init+0x1e7/0x18c0 [ 354.941472][T11386] v9fs_session_init+0x1e7/0x18c0 [ 354.946507][T11386] ? find_held_lock+0x2d/0x110 [ 354.951286][T11386] ? fs_reclaim_release+0xa/0x20 [ 354.956248][T11386] ? v9fs_show_options+0x7e0/0x7e0 [ 354.961352][T11386] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 354.966898][T11386] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 354.972878][T11386] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 354.978688][T11386] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 354.984227][T11386] ? apparmor_cred_prepare+0x760/0x760 [ 354.989674][T11386] ? kfree+0x285/0x2b0 [ 354.993747][T11386] v9fs_mount+0x79/0x970 [ 354.997984][T11386] ? v9fs_write_inode+0x60/0x60 [ 355.002828][T11386] legacy_get_tree+0x105/0x220 [ 355.007580][T11386] ? ns_capable_common+0xe2/0x100 [ 355.012600][T11386] vfs_get_tree+0x89/0x2f0 [ 355.017009][T11386] do_mount+0x1306/0x1a60 [ 355.021340][T11386] ? copy_mount_string+0x40/0x40 [ 355.026283][T11386] ? _copy_from_user+0x123/0x190 [ 355.031224][T11386] __x64_sys_mount+0x18f/0x230 [ 355.035985][T11386] do_syscall_64+0xf6/0x790 [ 355.040497][T11386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 355.046377][T11386] RIP: 0033:0x45c849 [ 355.050272][T11386] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 355.069863][T11386] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 355.078262][T11386] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 355.086363][T11386] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 355.094333][T11386] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 355.102399][T11386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 355.110484][T11386] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000013 00:08:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000400)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0x65, 0x0, &(0x7f0000000280)="b95b03b700030009009e40f086dd1fffffe100000900632f77fbac141412e4000001c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42459416a2e10c91196b1fd38f20b33", 0x0, 0xfd, 0x6000000000000000, 0xa7, 0xfe06, &(0x7f0000000440)="72f96c45dbbfc718cb63c344dc932c35b23ac7a55a84b29e1150c8c6d937a55799844a2898bcbe36e772a1d7e028808b7c165443046fce0c618142d3414474efbf9ad5259c0e68504e7230a12a216b1a46ddda302962788da0004ebaf7eb5b9a374d36de72e9cfe6629fdde873b0318a0643dfea3cfdfce9851c115de27c97092e33ab23fdca7f72cfe856c5c0e9e2345770f2b04f1e75341b69000c333a000000000000000000"}, 0x40) r2 = socket$nl_rdma(0x10, 0x3, 0x14) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000004, 0x4010, r2, 0x41c71000) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000040)=""/100) 00:08:37 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000003, 0x0) 00:08:37 executing program 4 (fault-call:6 fault-nth:20): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:37 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2c}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28081) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/40, 0x28}], 0x1, 0x8) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000280)=""/198) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r4, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$void(r4, 0xc0045878) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r6, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) move_mount(r5, &(0x7f0000000380)='./file0\x00', r6, &(0x7f00000003c0)='./file0\x00', 0x6) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000140)={0x101, {{0xa, 0x4e23, 0x4, @remote, 0x800}}}, 0x88) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x18, 0x0, 0x0, 0x0, 0x0}) [ 355.353103][T11407] FAULT_INJECTION: forcing a failure. [ 355.353103][T11407] name failslab, interval 1, probability 0, space 0, times 0 [ 355.396930][T11407] CPU: 0 PID: 11407 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 355.406868][T11407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.416930][T11407] Call Trace: [ 355.420235][T11407] dump_stack+0x188/0x20d [ 355.424584][T11407] should_fail.cold+0x5/0x14 [ 355.429184][T11407] ? lock_downgrade+0x7f0/0x7f0 [ 355.434034][T11407] ? setup_fault_attr+0x1e0/0x1e0 [ 355.439070][T11407] should_failslab+0x5/0xf [ 355.443480][T11407] __kmalloc_track_caller+0x2d1/0x790 [ 355.449536][T11407] ? match_number.isra.0+0x81/0x170 [ 355.454730][T11407] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 355.460273][T11407] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 355.466242][T11407] kmemdup_nul+0x2d/0xa0 [ 355.470483][T11407] match_number.isra.0+0x81/0x170 [ 355.475491][T11407] ? match_strdup+0x80/0x80 [ 355.479986][T11407] ? memcpy+0x35/0x50 [ 355.483961][T11407] parse_opts.part.0+0x207/0x330 [ 355.488889][T11407] ? p9_fd_show_options+0x1c0/0x1c0 [ 355.494100][T11407] ? lock_downgrade+0x7f0/0x7f0 [ 355.498955][T11407] p9_fd_create_tcp+0xb5/0x4e0 [ 355.503705][T11407] ? p9_fd_create_unix+0x290/0x290 [ 355.508799][T11407] ? trace_hardirqs_off+0x50/0x220 [ 355.513917][T11407] ? quarantine_put+0x119/0x1c0 [ 355.518768][T11407] ? kfree+0x1eb/0x2b0 [ 355.522849][T11407] ? p9_client_create+0x82c/0x1430 [ 355.527955][T11407] ? lockdep_hardirqs_on+0x417/0x5d0 [ 355.533234][T11407] p9_client_create+0x896/0x1430 [ 355.538174][T11407] ? p9_client_zc_rpc.constprop.0+0x1140/0x1140 [ 355.544401][T11407] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 355.550202][T11407] ? __kmalloc_track_caller+0x61c/0x790 [ 355.555733][T11407] ? v9fs_session_init+0xef/0x18c0 [ 355.560827][T11407] ? __lock_acquire+0x18c3/0x5270 [ 355.565835][T11407] ? lockdep_init_map+0x1b0/0x6c0 [ 355.570851][T11407] ? v9fs_session_init+0x1e7/0x18c0 [ 355.576033][T11407] v9fs_session_init+0x1e7/0x18c0 [ 355.581218][T11407] ? find_held_lock+0x2d/0x110 [ 355.585970][T11407] ? fs_reclaim_release+0xa/0x20 [ 355.590900][T11407] ? v9fs_show_options+0x7e0/0x7e0 [ 355.596034][T11407] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 355.601584][T11407] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 355.607572][T11407] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 355.613389][T11407] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 355.618930][T11407] ? apparmor_cred_prepare+0x760/0x760 [ 355.624374][T11407] ? kfree+0x285/0x2b0 [ 355.628437][T11407] v9fs_mount+0x79/0x970 [ 355.632682][T11407] ? v9fs_write_inode+0x60/0x60 [ 355.637522][T11407] legacy_get_tree+0x105/0x220 [ 355.642372][T11407] ? ns_capable_common+0xe2/0x100 [ 355.647480][T11407] vfs_get_tree+0x89/0x2f0 [ 355.651884][T11407] do_mount+0x1306/0x1a60 [ 355.656203][T11407] ? copy_mount_string+0x40/0x40 [ 355.661219][T11407] ? _copy_from_user+0x123/0x190 [ 355.666148][T11407] __x64_sys_mount+0x18f/0x230 [ 355.670905][T11407] do_syscall_64+0xf6/0x790 [ 355.675409][T11407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 355.681294][T11407] RIP: 0033:0x45c849 [ 355.685175][T11407] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 355.704763][T11407] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 355.713245][T11407] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 355.721197][T11407] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 355.729161][T11407] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 355.737116][T11407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 355.745159][T11407] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000014 [ 355.833254][T11407] 9pnet: p9_fd_create_tcp (11407): problem connecting socket to 127.0.0.1 00:08:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d6a4cf10ce619a25ac", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:40 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2f}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:40 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000004, 0x0) 00:08:40 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28081) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/40, 0x28}], 0x1, 0x8) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000280)=""/198) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r4, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) ioctl$void(r4, 0xc0045878) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r6, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) move_mount(r5, &(0x7f0000000380)='./file0\x00', r6, &(0x7f00000003c0)='./file0\x00', 0x6) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000140)={0x101, {{0xa, 0x4e23, 0x4, @remote, 0x800}}}, 0x88) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x18, 0x0, 0x0, 0x0, 0x0}) 00:08:40 executing program 4 (fault-call:6 fault-nth:21): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:40 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x3}, 0x10) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='./file0\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20010000) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000000c0)='./file0\x00') 00:08:40 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3a}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x81}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x5, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r5, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) r6 = dup3(r5, 0xffffffffffffffff, 0x80000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0400b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB='<\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r7, @ANYBLOB="0000000000000000080000000900010072737670000000000c00020008000200e0000001ec7210dacea2d1f27f221f619372305ecd21701f72006b721303de"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000004bc0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x24}}, 0x0) [ 357.796141][T11439] FAULT_INJECTION: forcing a failure. [ 357.796141][T11439] name failslab, interval 1, probability 0, space 0, times 0 [ 357.901887][T11439] CPU: 1 PID: 11439 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 357.911820][T11439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.921885][T11439] Call Trace: [ 357.925194][T11439] dump_stack+0x188/0x20d [ 357.929550][T11439] should_fail.cold+0x5/0x14 [ 357.934162][T11439] ? lock_downgrade+0x7f0/0x7f0 [ 357.939170][T11439] ? setup_fault_attr+0x1e0/0x1e0 [ 357.944292][T11439] should_failslab+0x5/0xf [ 357.948821][T11439] __kmalloc_track_caller+0x2d1/0x790 [ 357.954231][T11439] ? match_number.isra.0+0x81/0x170 [ 357.959480][T11439] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 357.965057][T11439] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 357.971052][T11439] kmemdup_nul+0x2d/0xa0 [ 357.975301][T11439] match_number.isra.0+0x81/0x170 [ 357.980505][T11439] ? match_strdup+0x80/0x80 [ 357.985050][T11439] ? memcpy+0x35/0x50 [ 357.989057][T11439] parse_opts.part.0+0x207/0x330 [ 357.994013][T11439] ? p9_fd_show_options+0x1c0/0x1c0 [ 357.999233][T11439] ? lock_downgrade+0x7f0/0x7f0 [ 358.004098][T11439] p9_fd_create_tcp+0xb5/0x4e0 [ 358.008876][T11439] ? p9_fd_create_unix+0x290/0x290 [ 358.014001][T11439] ? trace_hardirqs_off+0x50/0x220 [ 358.019131][T11439] ? quarantine_put+0x119/0x1c0 [ 358.023996][T11439] ? kfree+0x1eb/0x2b0 [ 358.028070][T11439] ? p9_client_create+0x82c/0x1430 [ 358.033279][T11439] ? lockdep_hardirqs_on+0x417/0x5d0 [ 358.038388][T11459] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 358.038597][T11439] p9_client_create+0x896/0x1430 [ 358.038632][T11439] ? p9_client_zc_rpc.constprop.0+0x1140/0x1140 [ 358.058986][T11439] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 358.064814][T11439] ? __kmalloc_track_caller+0x61c/0x790 [ 358.070375][T11439] ? v9fs_session_init+0xef/0x18c0 [ 358.075501][T11439] ? __lock_acquire+0x18c3/0x5270 [ 358.080547][T11439] ? lockdep_init_map+0x1b0/0x6c0 [ 358.085700][T11439] ? v9fs_session_init+0x1e7/0x18c0 [ 358.090910][T11439] v9fs_session_init+0x1e7/0x18c0 [ 358.095953][T11439] ? find_held_lock+0x2d/0x110 [ 358.100836][T11439] ? fs_reclaim_release+0xa/0x20 [ 358.105797][T11439] ? v9fs_show_options+0x7e0/0x7e0 [ 358.110927][T11439] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 358.116490][T11439] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 358.122483][T11439] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 358.128328][T11439] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 358.133900][T11439] ? apparmor_cred_prepare+0x760/0x760 [ 358.139494][T11439] ? kfree+0x285/0x2b0 [ 358.143584][T11439] v9fs_mount+0x79/0x970 [ 358.147984][T11439] ? v9fs_write_inode+0x60/0x60 [ 358.152855][T11439] legacy_get_tree+0x105/0x220 [ 358.157639][T11439] ? ns_capable_common+0xe2/0x100 [ 358.162676][T11439] vfs_get_tree+0x89/0x2f0 [ 358.167107][T11439] do_mount+0x1306/0x1a60 [ 358.171502][T11439] ? copy_mount_string+0x40/0x40 [ 358.176480][T11439] ? _copy_from_user+0x123/0x190 [ 358.181443][T11439] __x64_sys_mount+0x18f/0x230 [ 358.187276][T11439] do_syscall_64+0xf6/0x790 [ 358.191821][T11439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 358.197720][T11439] RIP: 0033:0x45c849 [ 358.201628][T11439] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 358.221243][T11439] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 358.229673][T11439] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 358.237667][T11439] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 358.245652][T11439] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 00:08:40 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000005, 0x0) 00:08:40 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3c}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:40 executing program 2: r0 = socket$inet6(0xa, 0x80805, 0x6) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040), 0x4) sendto$inet6(r0, 0x0, 0x0, 0x8000008800, &(0x7f0000000000)={0xa, 0x200000000004e23, 0x0, @local}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60, 0x800) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x4) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) getsockopt$inet6_buf(r1, 0x29, 0x15, &(0x7f0000000140), &(0x7f0000000180)) [ 358.253635][T11439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 358.261647][T11439] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000015 00:08:40 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xff}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 358.371423][T11439] 9pnet: p9_fd_create_tcp (11439): problem connecting socket to 127.0.0.1 [ 358.454898][T11465] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 358.495735][T11464] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:08:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d6a4cf10ce619a25ac", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:43 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000006, 0x0) 00:08:43 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:43 executing program 2: r0 = socket$inet6(0xa, 0x80805, 0x6) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040), 0x4) sendto$inet6(r0, 0x0, 0x0, 0x8000008800, &(0x7f0000000000)={0xa, 0x200000000004e23, 0x0, @local}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60, 0x800) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x4) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) getsockopt$inet6_buf(r1, 0x29, 0x15, &(0x7f0000000140), &(0x7f0000000180)) 00:08:43 executing program 4 (fault-call:6 fault-nth:22): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:43 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe847a071") r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff14, &(0x7f0000000080)=[{&(0x7f0000000140)="24000000200003041dfffd946f6105008100000a1f0000080010080008000f0012000000140000001a00ffffba16a0aa1c09000000000000", 0x38}], 0x1}, 0x0) [ 360.882600][T11506] FAULT_INJECTION: forcing a failure. [ 360.882600][T11506] name failslab, interval 1, probability 0, space 0, times 0 [ 360.895619][T11506] CPU: 1 PID: 11506 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 360.905523][T11506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.915594][T11506] Call Trace: [ 360.918931][T11506] dump_stack+0x188/0x20d [ 360.923285][T11506] should_fail.cold+0x5/0x14 [ 360.928156][T11506] ? setup_fault_attr+0x1e0/0x1e0 [ 360.933199][T11506] ? mark_held_locks+0xe0/0xe0 [ 360.937990][T11506] should_failslab+0x5/0xf [ 360.942428][T11506] kmem_cache_alloc+0x44/0x730 [ 360.947209][T11506] ? do_raw_spin_lock+0x129/0x2e0 [ 360.952362][T11506] ? rwlock_bug.part.0+0x90/0x90 [ 360.957371][T11506] inet_bind_bucket_create+0x2b/0x290 [ 360.962769][T11506] inet_csk_get_port+0x3f5/0x24b0 [ 360.967813][T11506] ? find_held_lock+0x2d/0x110 [ 360.972620][T11506] ? inet_csk_listen_stop+0xb20/0xb20 [ 360.978016][T11506] ? mark_held_locks+0x9f/0xe0 [ 360.982798][T11506] ? __local_bh_enable_ip+0x159/0x270 [ 360.988243][T11506] __inet_bind+0x5b2/0xbd0 [ 360.992657][T11506] inet_bind+0xf3/0x160 [ 360.996824][T11506] p9_fd_create_tcp+0x432/0x4e0 [ 361.001670][T11506] ? p9_fd_create_unix+0x290/0x290 [ 361.006777][T11506] ? trace_hardirqs_off+0x50/0x220 [ 361.011972][T11506] ? quarantine_put+0x119/0x1c0 [ 361.016811][T11506] ? kfree+0x1eb/0x2b0 [ 361.020864][T11506] ? p9_client_create+0x82c/0x1430 [ 361.025960][T11506] ? lockdep_hardirqs_on+0x417/0x5d0 [ 361.031234][T11506] p9_client_create+0x896/0x1430 [ 361.036862][T11506] ? p9_client_zc_rpc.constprop.0+0x1140/0x1140 [ 361.043103][T11506] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 361.048896][T11506] ? __kmalloc_track_caller+0x61c/0x790 [ 361.054427][T11506] ? v9fs_session_init+0xef/0x18c0 [ 361.059521][T11506] ? __lock_acquire+0x18c3/0x5270 [ 361.064532][T11506] ? lockdep_init_map+0x1b0/0x6c0 [ 361.069547][T11506] ? v9fs_session_init+0x1e7/0x18c0 [ 361.074732][T11506] v9fs_session_init+0x1e7/0x18c0 [ 361.079744][T11506] ? find_held_lock+0x2d/0x110 [ 361.084493][T11506] ? fs_reclaim_release+0xa/0x20 [ 361.089420][T11506] ? v9fs_show_options+0x7e0/0x7e0 [ 361.094534][T11506] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 361.100066][T11506] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 361.106040][T11506] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 361.111839][T11506] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 361.117373][T11506] ? apparmor_cred_prepare+0x760/0x760 [ 361.122819][T11506] ? kfree+0x285/0x2b0 [ 361.126891][T11506] v9fs_mount+0x79/0x970 [ 361.131121][T11506] ? v9fs_write_inode+0x60/0x60 [ 361.135980][T11506] legacy_get_tree+0x105/0x220 [ 361.140737][T11506] ? ns_capable_common+0xe2/0x100 [ 361.145882][T11506] vfs_get_tree+0x89/0x2f0 [ 361.150841][T11506] do_mount+0x1306/0x1a60 [ 361.155180][T11506] ? copy_mount_string+0x40/0x40 [ 361.160120][T11506] ? _copy_from_user+0x123/0x190 [ 361.165056][T11506] __x64_sys_mount+0x18f/0x230 [ 361.169902][T11506] do_syscall_64+0xf6/0x790 [ 361.174405][T11506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.180280][T11506] RIP: 0033:0x45c849 [ 361.184164][T11506] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.203848][T11506] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 361.212248][T11506] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 361.220202][T11506] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 00:08:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0xb, 0x4) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={0x0}}, 0x0) [ 361.228158][T11506] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 361.236113][T11506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 361.244066][T11506] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000016 00:08:43 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x2, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 361.346208][T11506] 9pnet: p9_fd_create_tcp (11506): problem connecting socket to 127.0.0.1 00:08:44 executing program 4 (fault-call:6 fault-nth:23): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:44 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000007, 0x0) 00:08:44 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x3, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:44 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) rt_sigaction(0x1c, &(0x7f0000000140)={&(0x7f00000000c0)="c423356975021564660f3a161001c4210de5f4c481fbf07d9ac4a2b5b998219c0000400f8309000000c482c52960adc4e3c97bc0030f18da64667600", 0x80000005, &(0x7f0000000100)="c4e3b55f7d000065660f3a0c0a84c4a11d62580040d3ffdf22c4c18dfaf1c4617e2dad04000000400f8b00008020660f3a40f800c4e2f930f7", {[0x200]}}, &(0x7f0000000240)={&(0x7f0000000180)="65f0111ac4a22d067e05dbea65dbe4c4e12857db66450f38f602c4a1f81012f3440fa7e8c4a17e701a3c0f7e6be6", 0x0, &(0x7f00000001c0)="c442f1a69705100000660ff4f7c4a139769f0e790000c4e1fdecc6c4a3817a3397660f3a633caf00c46115d15d0b8f0978c1410cc403695dc28f640f49a299899999"}, 0x8, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x80000000) getsockname(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x80) [ 361.570800][T11538] FAULT_INJECTION: forcing a failure. [ 361.570800][T11538] name failslab, interval 1, probability 0, space 0, times 0 [ 361.588375][T11538] CPU: 0 PID: 11538 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 361.598299][T11538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.608360][T11538] Call Trace: [ 361.611671][T11538] dump_stack+0x188/0x20d [ 361.616032][T11538] should_fail.cold+0x5/0x14 [ 361.620879][T11538] ? lock_downgrade+0x7f0/0x7f0 [ 361.625759][T11538] ? setup_fault_attr+0x1e0/0x1e0 [ 361.630815][T11538] should_failslab+0x5/0xf [ 361.636032][T11538] kmem_cache_alloc+0x29b/0x730 [ 361.640904][T11538] ? inet_create+0x2ef/0xe00 [ 361.645550][T11538] sk_prot_alloc+0x5f/0x2f0 [ 361.650347][T11538] sk_alloc+0x36/0xfa0 [ 361.654442][T11538] inet_create+0x364/0xe00 [ 361.658887][T11538] __sock_create+0x3cb/0x730 [ 361.663512][T11538] p9_fd_create_tcp+0x2ab/0x4e0 [ 361.668385][T11538] ? p9_fd_create_unix+0x290/0x290 [ 361.673508][T11538] ? trace_hardirqs_off+0x50/0x220 [ 361.678639][T11538] ? quarantine_put+0x119/0x1c0 [ 361.683505][T11538] ? kfree+0x1eb/0x2b0 [ 361.687588][T11538] ? p9_client_create+0x82c/0x1430 [ 361.692717][T11538] ? lockdep_hardirqs_on+0x417/0x5d0 [ 361.698022][T11538] p9_client_create+0x896/0x1430 [ 361.702990][T11538] ? p9_client_zc_rpc.constprop.0+0x1140/0x1140 [ 361.709384][T11538] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 361.715403][T11538] ? __kmalloc_track_caller+0x61c/0x790 [ 361.720983][T11538] ? v9fs_session_init+0xef/0x18c0 [ 361.726196][T11538] ? __lock_acquire+0x18c3/0x5270 [ 361.731222][T11538] ? lockdep_init_map+0x1b0/0x6c0 [ 361.736299][T11538] ? v9fs_session_init+0x1e7/0x18c0 [ 361.741513][T11538] v9fs_session_init+0x1e7/0x18c0 [ 361.746554][T11538] ? find_held_lock+0x2d/0x110 [ 361.751333][T11538] ? fs_reclaim_release+0xa/0x20 [ 361.756303][T11538] ? v9fs_show_options+0x7e0/0x7e0 [ 361.761437][T11538] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 361.767005][T11538] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 361.773150][T11538] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 361.778982][T11538] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 361.784590][T11538] ? apparmor_cred_prepare+0x760/0x760 [ 361.790064][T11538] ? kfree+0x285/0x2b0 [ 361.794158][T11538] v9fs_mount+0x79/0x970 [ 361.798423][T11538] ? v9fs_write_inode+0x60/0x60 [ 361.803292][T11538] legacy_get_tree+0x105/0x220 [ 361.808072][T11538] ? ns_capable_common+0xe2/0x100 [ 361.813117][T11538] vfs_get_tree+0x89/0x2f0 [ 361.817558][T11538] do_mount+0x1306/0x1a60 [ 361.821915][T11538] ? copy_mount_string+0x40/0x40 [ 361.826876][T11538] ? _copy_from_user+0x123/0x190 [ 361.831845][T11538] __x64_sys_mount+0x18f/0x230 [ 361.836638][T11538] do_syscall_64+0xf6/0x790 [ 361.841169][T11538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.847156][T11538] RIP: 0033:0x45c849 [ 361.851057][T11538] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.870679][T11538] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 361.879104][T11538] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 361.887091][T11538] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 361.895857][T11538] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 361.903849][T11538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 361.911830][T11538] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000017 [ 361.941324][T11538] 9pnet: p9_fd_create_tcp (11538): problem creating socket 00:08:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d6a4cf10ce619a25ac", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x501e00, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r3, 0x400442c9, &(0x7f0000000080)={0x5, @random="3438468f8ac1"}) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_TXQLEN={0x8, 0xd, 0xffffffff}]}, 0x40}}, 0x0) 00:08:46 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x4, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:46 executing program 4 (fault-call:6 fault-nth:24): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:46 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000008, 0x0) 00:08:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004100)=[{{&(0x7f0000000000)={0x2, 0x4e24, @local}, 0x10, 0x0}}, {{&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x10}}], 0x10}}], 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x102, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=@ipv4_newaddr={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFA_ADDRESS={0x4, 0x3, @empty}]}, 0x28}, 0x1, 0xf0ffffff}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14010894}, 0x800) sendmsg$NLBL_MGMT_C_LISTALL(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x44, r3, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x10}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, [], 0x11}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast2}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x4000007) socket$inet_icmp_raw(0x2, 0x3, 0x1) pkey_alloc(0x0, 0x1) 00:08:46 executing program 2: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/140, 0x8c}, {0x0}], 0x2, 0x7) syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0]) 00:08:46 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x5, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:46 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x6, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 363.984960][T11574] FAULT_INJECTION: forcing a failure. [ 363.984960][T11574] name failslab, interval 1, probability 0, space 0, times 0 [ 364.000924][T11573] ntfs: (device loop2): parse_options(): Unrecognized mount option 0x0000000000000003. 00:08:46 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000009, 0x0) 00:08:46 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0xf, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 364.106588][T11574] CPU: 1 PID: 11574 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 364.116517][T11574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.126581][T11574] Call Trace: [ 364.129886][T11574] dump_stack+0x188/0x20d [ 364.134208][T11574] should_fail.cold+0x5/0x14 [ 364.138852][T11574] ? lock_downgrade+0x7f0/0x7f0 [ 364.143714][T11574] ? setup_fault_attr+0x1e0/0x1e0 [ 364.148737][T11574] should_failslab+0x5/0xf [ 364.153148][T11574] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 364.158524][T11574] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 364.164564][T11574] apparmor_sk_alloc_security+0x81/0x100 [ 364.170208][T11574] security_sk_alloc+0x6c/0xb0 [ 364.174979][T11574] sk_prot_alloc+0xae/0x2f0 [ 364.179483][T11574] sk_alloc+0x36/0xfa0 [ 364.183545][T11574] inet_create+0x364/0xe00 [ 364.187975][T11574] __sock_create+0x3cb/0x730 [ 364.192580][T11574] p9_fd_create_tcp+0x2ab/0x4e0 [ 364.197432][T11574] ? p9_fd_create_unix+0x290/0x290 [ 364.202554][T11574] ? trace_hardirqs_off+0x50/0x220 [ 364.207665][T11574] ? quarantine_put+0x119/0x1c0 [ 364.212514][T11574] ? kfree+0x1eb/0x2b0 [ 364.216648][T11574] ? p9_client_create+0x82c/0x1430 [ 364.221746][T11574] ? lockdep_hardirqs_on+0x417/0x5d0 [ 364.227020][T11574] p9_client_create+0x896/0x1430 [ 364.231951][T11574] ? p9_client_zc_rpc.constprop.0+0x1140/0x1140 [ 364.238179][T11574] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 364.243984][T11574] ? __kmalloc_track_caller+0x61c/0x790 [ 364.249514][T11574] ? v9fs_session_init+0xef/0x18c0 [ 364.254606][T11574] ? __lock_acquire+0x18c3/0x5270 [ 364.259610][T11574] ? lockdep_init_map+0x1b0/0x6c0 [ 364.264711][T11574] ? v9fs_session_init+0x1e7/0x18c0 [ 364.269890][T11574] v9fs_session_init+0x1e7/0x18c0 [ 364.274904][T11574] ? find_held_lock+0x2d/0x110 [ 364.279655][T11574] ? fs_reclaim_release+0xa/0x20 [ 364.284582][T11574] ? v9fs_show_options+0x7e0/0x7e0 [ 364.289689][T11574] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 364.295219][T11574] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 364.301183][T11574] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 364.306991][T11574] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 364.312660][T11574] ? apparmor_cred_prepare+0x760/0x760 [ 364.318108][T11574] ? kfree+0x285/0x2b0 [ 364.322184][T11574] v9fs_mount+0x79/0x970 [ 364.326410][T11574] ? v9fs_write_inode+0x60/0x60 [ 364.331244][T11574] legacy_get_tree+0x105/0x220 [ 364.335992][T11574] ? ns_capable_common+0xe2/0x100 [ 364.341009][T11574] vfs_get_tree+0x89/0x2f0 [ 364.345643][T11574] do_mount+0x1306/0x1a60 [ 364.350150][T11574] ? copy_mount_string+0x40/0x40 [ 364.355093][T11574] ? _copy_from_user+0x123/0x190 [ 364.360031][T11574] __x64_sys_mount+0x18f/0x230 [ 364.365321][T11574] do_syscall_64+0xf6/0x790 [ 364.369813][T11574] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.375684][T11574] RIP: 0033:0x45c849 [ 364.379570][T11574] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 364.400042][T11574] RSP: 002b:00007f22de119c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 364.408444][T11574] RAX: ffffffffffffffda RBX: 00007f22de11a6d4 RCX: 000000000045c849 [ 364.416417][T11574] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 364.424371][T11574] RBP: 000000000076bfa0 R08: 00000000200004c0 R09: 0000000000000000 [ 364.432362][T11574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 364.440354][T11574] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000018 [ 364.482778][T11574] 9pnet: p9_fd_create_tcp (11574): problem creating socket [ 364.499100][T11590] ntfs: (device loop2): parse_options(): Unrecognized mount option 0x0000000000000003. [ 364.508953][ C0] [ 364.508958][ C0] ===================================== [ 364.509030][ C0] WARNING: bad unlock balance detected! [ 364.509038][ C0] 5.6.0-rc3-next-20200228-syzkaller #0 Not tainted [ 364.509040][ C0] ------------------------------------- [ 364.509045][ C0] syz-executor.2/11590 is trying to release lock (rcu_callback) at: [ 364.509126][ C0] [] rcu_core+0x592/0x1370 [ 364.509129][ C0] but there are no more locks to release! [ 364.509132][ C0] [ 364.509132][ C0] other info that might help us debug this: [ 364.509139][ C0] 1 lock held by syz-executor.2/11590: [ 364.509141][ C0] #0: ffff88804a8520d8 (&type->s_umount_key#54/1){+.+.}, at: alloc_super+0x152/0x910 [ 364.509167][ C0] [ 364.509167][ C0] stack backtrace: [ 364.509178][ C0] CPU: 0 PID: 11590 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 364.509183][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.509187][ C0] Call Trace: [ 364.509192][ C0] [ 364.509205][ C0] dump_stack+0x188/0x20d [ 364.509217][ C0] ? rcu_core+0x592/0x1370 [ 364.509228][ C0] lock_release+0x586/0x7c0 [ 364.509240][ C0] ? lock_downgrade+0x7f0/0x7f0 [ 364.509252][ C0] ? lockdep_unregister_key+0x490/0x490 [ 364.509266][ C0] rcu_core+0x5b2/0x1370 [ 364.509280][ C0] ? __rcu_read_unlock+0x560/0x560 [ 364.509328][ C0] ? sched_clock_cpu+0x18/0x1b0 [ 364.509342][ C0] ? clockevents_program_event+0x134/0x350 [ 364.509358][ C0] __do_softirq+0x26c/0x99d [ 364.509379][ C0] irq_exit+0x192/0x1d0 [ 364.509392][ C0] smp_apic_timer_interrupt+0x19e/0x600 [ 364.509405][ C0] apic_timer_interrupt+0xf/0x20 [ 364.509409][ C0] [ 364.509452][ C0] RIP: 0010:console_unlock+0xba8/0xf00 00:08:47 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 364.509463][ C0] Code: 89 48 c1 e8 03 42 80 3c 38 00 0f 85 36 03 00 00 48 83 3d 52 d6 37 08 00 0f 84 8e 01 00 00 e8 8f a3 16 00 48 8b 7c 24 28 57 9d <0f> 1f 44 00 00 eb 88 e8 7c a3 16 00 c7 05 72 1c 04 0b 00 00 00 00 [ 364.509469][ C0] RSP: 0018:ffffc90001cb7880 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff13 [ 364.509480][ C0] RAX: 0000000000040000 RBX: 0000000000000200 RCX: ffffc9000e48a000 [ 364.509487][ C0] RDX: 00000000000134d2 RSI: ffffffff815bf1f1 RDI: 0000000000000206 [ 364.509494][ C0] RBP: 0000000000000000 R08: ffff888043450040 R09: fffffbfff1334569 [ 364.509500][ C0] R10: fffffbfff1334568 R11: 0000000000000001 R12: ffffffff84a5da50 [ 364.509507][ C0] R13: ffffffff8a15c930 R14: 000000000000006c R15: dffffc0000000000 [ 364.509548][ C0] ? netconsole_netdev_event+0x2a0/0x2a0 [ 364.509562][ C0] ? console_unlock+0xba1/0xf00 [ 364.509580][ C0] vprintk_emit+0x2a7/0x710 [ 364.509593][ C0] vprintk_func+0x79/0x17e [ 364.509605][ C0] printk+0xba/0xed [ 364.509617][ C0] ? kmsg_dump_rewind_nolock+0xd9/0xd9 [ 364.509627][ C0] ? trace_hardirqs_on+0x55/0x220 [ 364.509639][ C0] ? _raw_spin_unlock_irqrestore+0x9b/0xe0 [ 364.509655][ C0] ? ___ratelimit+0x59/0x573 [ 364.509691][ C0] __ntfs_error.cold+0x91/0xc7 [ 364.509702][ C0] ? __ntfs_warning+0x160/0x160 [ 364.509712][ C0] ? __lock_acquire+0x18c3/0x5270 [ 364.509726][ C0] ? pointer+0x10b/0x680 [ 364.509738][ C0] ? file_dentry_name+0x120/0x120 [ 364.509781][ C0] parse_options+0x1949/0x1c60 [ 364.509799][ C0] ? kasan_unpoison_shadow+0x30/0x40 [ 364.509810][ C0] ? ntfs_put_super+0x1710/0x1710 [ 364.509824][ C0] ? kmem_cache_alloc_trace+0x340/0x7d0 [ 364.509838][ C0] ? __raw_spin_lock_init+0x28/0x100 [ 364.509850][ C0] ntfs_fill_super+0x1cb/0x3080 [ 364.509864][ C0] ? set_blocksize+0x24f/0x2c0 [ 364.509878][ C0] mount_bdev+0x305/0x3c0 [ 364.509889][ C0] ? load_system_files+0x6f50/0x6f50 [ 364.509901][ C0] ? ntfs_rl_punch_nolock+0x1da0/0x1da0 [ 364.509913][ C0] legacy_get_tree+0x105/0x220 [ 364.509925][ C0] ? ns_capable_common+0xe2/0x100 [ 364.509936][ C0] vfs_get_tree+0x89/0x2f0 [ 364.509948][ C0] do_mount+0x1306/0x1a60 [ 364.509970][ C0] ? copy_mount_string+0x40/0x40 [ 364.509983][ C0] ? _copy_from_user+0x123/0x190 [ 364.509997][ C0] __x64_sys_mount+0x18f/0x230 [ 364.510010][ C0] do_syscall_64+0xf6/0x790 [ 364.510023][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.510031][ C0] RIP: 0033:0x45f29a [ 364.510042][ C0] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 364.510048][ C0] RSP: 002b:00007ffb492d0a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 364.510058][ C0] RAX: ffffffffffffffda RBX: 00007ffb492d16d4 RCX: 000000000045f29a [ 364.510065][ C0] RDX: 00007ffb492d0ae0 RSI: 00000000200001c0 RDI: 00007ffb492d0b00 [ 364.510070][ C0] RBP: 000000000076bfa0 R08: 00007ffb492d0b40 R09: 00007ffb492d0ae0 [ 364.510075][ C0] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000ffffffff [ 364.510081][ C0] R13: 0000000000000be7 R14: 00000000004ce08e R15: 000000000076bfac 00:08:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d6a4cf10ce619a25ac9fa07fdffed203782ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15", 0xcf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:49 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x2, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:49 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0xf, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:49 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x100000000000000a, 0x0) 00:08:49 executing program 4 (fault-call:6 fault-nth:25): clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:49 executing program 1: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000009, 0x0) 00:08:49 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x3, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:49 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x4, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:49 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0xf, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 366.976164][T11627] FAULT_INJECTION: forcing a failure. [ 366.976164][T11627] name failslab, interval 1, probability 0, space 0, times 0 00:08:49 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x5, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:49 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0xf, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 367.034076][T11627] CPU: 0 PID: 11627 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 367.044177][T11627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.054268][T11627] Call Trace: [ 367.058184][T11627] dump_stack+0x188/0x20d [ 367.062534][T11627] should_fail.cold+0x5/0x14 [ 367.067139][T11627] ? setup_fault_attr+0x1e0/0x1e0 [ 367.072299][T11627] should_failslab+0x5/0xf [ 367.076726][T11627] kmem_cache_alloc+0x44/0x730 00:08:49 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) [ 367.081573][T11627] ? nf_conntrack_in+0x479/0x12b0 [ 367.086619][T11627] __nf_conntrack_alloc+0xd6/0x6a0 [ 367.091749][T11627] init_conntrack.isra.0+0xd7e/0x1080 [ 367.097134][T11627] ? nf_conntrack_alloc+0x40/0x40 [ 367.102166][T11627] ? hash_conntrack_raw+0x2d9/0x460 [ 367.107460][T11627] ? ipt_do_table+0xcca/0x1880 [ 367.112263][T11627] ? __local_bh_enable_ip+0x159/0x270 [ 367.117656][T11627] nf_conntrack_in+0x9a8/0x12b0 [ 367.122523][T11627] ? nf_conntrack_update+0x9f0/0x9f0 [ 367.127829][T11627] ? stack_trace_consume_entry+0x160/0x160 [ 367.133740][T11627] ipv4_conntrack_local+0x119/0x210 [ 367.139018][T11627] nf_hook_slow+0xba/0x1e0 [ 367.143449][T11627] __ip_local_out+0x3d4/0x850 [ 367.148152][T11627] ? ip_finish_output+0x1f0/0x1f0 [ 367.153203][T11627] ? __ip_flush_pending_frames.isra.0+0x300/0x300 [ 367.160328][T11627] ip_local_out+0x26/0x1a0 [ 367.164764][T11627] __ip_queue_xmit+0x863/0x1c20 [ 367.169699][T11627] ? tcp_options_write+0x2cd/0xa90 [ 367.174822][T11627] __tcp_transmit_skb+0x19d6/0x3740 [ 367.180041][T11627] ? __tcp_select_window+0x880/0x880 [ 367.185337][T11627] ? lock_acquire+0x197/0x420 [ 367.190100][T11627] ? ktime_get+0x1f8/0x2f0 [ 367.194539][T11627] tcp_connect+0x2d06/0x42a0 [ 367.199180][T11627] ? __tcp_transmit_skb+0x3740/0x3740 [ 367.204560][T11627] ? siphash_1u64+0x13/0x260 [ 367.209189][T11627] ? secure_ipv6_port_ephemeral+0x250/0x250 [ 367.215262][T11627] ? xfrm_lookup_route+0x65/0x1e0 [ 367.220302][T11627] ? dst_release+0xd/0xe0 [ 367.224711][T11627] ? prandom_u32_state+0xe/0x170 [ 367.229639][T11627] tcp_v4_connect+0x14f0/0x1c10 [ 367.234503][T11627] ? tcp_v4_md5_lookup+0x240/0x240 [ 367.239655][T11627] ? mark_held_locks+0xe0/0xe0 [ 367.244405][T11627] __inet_stream_connect+0x80f/0xe30 [ 367.249797][T11627] ? lock_downgrade+0x7f0/0x7f0 [ 367.254646][T11627] ? ipv4_mib_init_net+0x570/0x570 [ 367.259919][T11627] ? lock_acquire+0x197/0x420 [ 367.264595][T11627] ? inet_stream_connect+0x3f/0xa0 [ 367.269698][T11627] ? trace_hardirqs_on+0x55/0x220 [ 367.274778][T11627] ? lock_sock_nested+0x94/0x110 [ 367.279721][T11627] inet_stream_connect+0x53/0xa0 [ 367.284696][T11627] p9_fd_create_tcp+0x339/0x4e0 [ 367.289540][T11627] ? p9_fd_create_unix+0x290/0x290 [ 367.294644][T11627] ? trace_hardirqs_off+0x50/0x220 [ 367.299741][T11627] ? quarantine_put+0x119/0x1c0 [ 367.304708][T11627] ? trace_hardirqs_on+0x55/0x220 [ 367.309815][T11627] p9_client_create+0x896/0x1430 [ 367.314749][T11627] ? save_stack+0x32/0x40 [ 367.319077][T11627] ? p9_client_zc_rpc.constprop.0+0x1140/0x1140 [ 367.325374][T11627] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 367.331173][T11627] ? __kmalloc_track_caller+0x342/0x790 [ 367.336709][T11627] ? v9fs_session_init+0xef/0x18c0 [ 367.341835][T11627] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.347905][T11627] ? lockdep_init_map+0x1b0/0x6c0 [ 367.352932][T11627] ? v9fs_session_init+0x1e7/0x18c0 [ 367.358130][T11627] v9fs_session_init+0x1e7/0x18c0 [ 367.363154][T11627] ? mark_held_locks+0xe0/0xe0 [ 367.367915][T11627] ? v9fs_show_options+0x7e0/0x7e0 [ 367.373028][T11627] ? kasan_unpoison_shadow+0x30/0x40 [ 367.378445][T11627] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 367.384339][T11627] ? kmem_cache_alloc_trace+0x340/0x7d0 [ 367.389867][T11627] ? apparmor_cred_prepare+0x760/0x760 [ 367.395309][T11627] ? kfree+0x21d/0x2b0 [ 367.399380][T11627] v9fs_mount+0x79/0x970 [ 367.403623][T11627] ? v9fs_write_inode+0x60/0x60 [ 367.408457][T11627] legacy_get_tree+0x105/0x220 [ 367.413217][T11627] ? ns_capable_common+0xe2/0x100 [ 367.418232][T11627] vfs_get_tree+0x89/0x2f0 [ 367.422630][T11627] do_mount+0x1306/0x1a60 [ 367.426942][T11627] ? copy_mount_string+0x40/0x40 [ 367.431875][T11627] ? _copy_from_user+0x123/0x190 [ 367.436803][T11627] __x64_sys_mount+0x18f/0x230 [ 367.441555][T11627] do_syscall_64+0xf6/0x790 [ 367.446055][T11627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.451933][T11627] RIP: 0033:0x45c849 [ 367.455816][T11627] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 367.475430][T11627] RSP: 002b:00007f22de13ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 367.483824][T11627] RAX: ffffffffffffffda RBX: 00007f22de13b6d4 RCX: 000000000045c849 [ 367.492328][T11627] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 0000000020000040 [ 367.500289][T11627] RBP: 000000000076bf00 R08: 00000000200004c0 R09: 0000000000000000 [ 367.508438][T11627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 367.516405][T11627] R13: 000000000000074c R14: 00000000004ca09f R15: 0000000000000019 [ 367.729752][T11627] 9pnet: p9_fd_create_tcp (11627): problem connecting socket to 127.0.0.1 00:08:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d6a4cf10ce619a25ac9fa07fdffed203782ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15", 0xcf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:52 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x6, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:52 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 00:08:52 executing program 1: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000009, 0x0) 00:08:52 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x100000000000000b, 0x0) 00:08:52 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:52 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 00:08:52 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x29, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:52 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x0, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:52 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x2, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:52 executing program 1: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000009, 0x0) [ 370.082986][T11663] 9pnet: p9_fd_create_tcp (11663): problem connecting socket to 127.0.0.1 00:08:52 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x0, 0x0, 0x0, @dev, @mcast2}}}}, 0x0) [ 370.207135][T11693] 9pnet: p9_fd_create_tcp (11693): problem connecting socket to 127.0.0.1 [ 370.232333][T11698] 9pnet: p9_fd_create_tcp (11698): problem connecting socket to 127.0.0.1 00:08:55 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x4, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070002053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d6a4cf10ce619a25ac9fa07fdffed203782ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15", 0xcf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000013c0)="5d2729b603243f67980834bfb9393787", 0x10}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:08:55 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x100000000000000c, 0x0) 00:08:55 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x3, &(0x7f00000004c0)={'trans=tcp,', {'port'}, 0x2c, {[{@privport='privport'}]}}) 00:08:55 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x2b, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:55 executing program 1: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') 00:08:55 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x4, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:55 executing program 1: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) 00:08:55 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x2c, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) [ 373.110453][T11721] 9pnet: p9_fd_create_tcp (11721): problem connecting socket to 127.0.0.1 00:08:55 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "cdd0c5", 0x18, 0x4, 0x0, @dev, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:08:55 executing program 1: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 373.198412][T11745] 9pnet: p9_fd_create_tcp (11745): problem connecting socket to 127.0.0.1 00:08:55 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 00:08:55 executing program 0: io_uring_setup(0xd66, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x100000000000000d, 0x0)