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", 0x1000}, {&(0x7f0000005d80)="033e066a2caba3b68ef834e47c7bde205fd319443ce6", 0x16}, {&(0x7f0000005dc0)="343abeda28861ded56c42e87b6f59650b30fe912b5efde60b2d681a10d7d1b7db64b66a5a88c2d201325b6100b7d7c90a6cb8b76bc14be600cdf43026fae94339aa40250ba498acf5959b719d215a464380f89449144a5c77f1de5b12b68cad668200bb629839b1244b49960cd4f761774b653a9e0f34e3c1a7ed4efe9b8c88a6c61bbf6eb0edca4641e7c20afd9994a0f5457fc83fe0922442833c182ab6671ee013388439f9912b6447962b79bf1ab8441a70b357500f7d98140", 0xbb}], 0x6, &(0x7f0000005f00)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0xc0, 0x117, 0x2, 0xac, "0882b4821941d40e772cc714a85fb0f28233911c0146c85ed7366e41b799bd436dff91482b9e91e1de3608d09032d5911de467ae45735cb5d707e63d638223d174be08060a0e872f0eec4a8ed3d9a464023f2d681a22b30fb9a6b24e25fcc86a5e29142e2f1890a76606c3211e7423af840b3d05ebf634815f0d37bb16cea6799a296b1e25f38177ab08b760df6c1fde5a6d856ca76a6402e9ca9622f666e3cf0bf990e48cf93e96f84f103d"}], 0xd8, 0x20000000}, {0x0, 0x0, &(0x7f00000061c0)=[{&(0x7f0000006000)="04323a053d35f17a5d3993c128142d29dfe54a620ac90888528f18c83d88a636635cb2a6a1e420c8ffe6336bf3ca6d174f0862210902a19fd45c766b74d11f89c5da035c3cfa35c307eedcc7ae257dc2d976cee4c96e048c25e8dba87f9d2f7b867a1e1ece889a5dd8898ff085e8c4763934b059b3d0fc8af1bdf6c5f7436261744664320319d9db54e6100d05025780de29403bb8d4e3436fab5162dc68c7b744f153557eb0d48679310db3e80e01e49b974a91eb1355ea80fc1fd56a2f39e2c4fa8ff5d485fee0ed404301c6884a446f18a1d837ed066c9f92", 0xda}, {&(0x7f0000006100)="fafc856262da9a03673df11eb994a6fb48c34a9a2f215999397da60b091cd2ad6bac66652d07bcb175065ca36f4691a6da8c8f91153db882cddcbd06d4f5a77f88200c6ce155f8f73e64ad8ba34a62520ce200ed7c2ec84a061d2f5143777710bb4a8afc0034caece06bc1aa8b85fa068716d32225a752d3536eec16b0cfcf16eb40fc96c85f87ad53da66481bd3e98423014ef7a62af8b71898", 0x9a}], 0x2, &(0x7f0000006200)=[@op={0x18}, @assoc={0x18, 0x117, 0x4, 0xffffffffffffff7f}, @iv={0xd8, 0x117, 0x2, 0xbd, "7901955f09f9a7dbd7feff23ae9d1a82601c860dfddbd9c18ae7176c63dc07ec055859e491ebe0f91800ca8146c57ce62a2490e7792a022a64f522c759540d833d3f8dd5fb77648156db6e2bdc558e12c2d260e62e368fb8ccce78e01e2a69eec364be44a2010793ea91e8874ef511cbc31e97e629b1de6c4e3fda004b88a2a2d3737afcc199dc7ef6d56ec2759724d0c71ecb9ce4df7785c6969cc6b988f28cac4e90d1eba74600ee590101ae9e4319ab81a5cfd8798a6a517f1892e1"}, @assoc={0x18, 0x117, 0x4, 0x9}, @iv={0xb8, 0x117, 0x2, 0xa1, "9fd6843b962d19fc1d3560af033f7370611a055d2be588c4cdcc25aa71f8e343141fe2e02b6a51b6dc2df660e411722b5a64abaa4dccdcd7e197d5e83f005967bf7bf50b1cc15f61c4945a34e575677e92bf81de333af95972a4095e27cbac8bbfb54f906fb08670f002efc7add8f7140c715b1736ce521ca39d05761aaa78acef6437dbbda8f3c4e346ca790336d1385decabe588de8705b8aa7523d0d7633daf"}, @assoc={0x18, 0x117, 0x4, 0x5}, @iv={0x78, 0x117, 0x2, 0x61, "9a15402541270b5a45f9e63f10995cd56e42d87606a6e70d4d75b6df2aee5636099fc2a9deaa35a45ed60debaaf3c055856514c9e454e6284f90269ecd8acc252885d632e88acd700aa8da895c683fa0bdfdae517dee932214b98cab18510f8735"}], 0x268, 0x20040000}], 0x8, 0x44004) r4 = request_key(&(0x7f0000006640)='keyring\x00', &(0x7f0000006680)={'syz', 0x1}, &(0x7f00000066c0)='bridge0\x00', 0xfffffffffffffffa) keyctl$get_security(0x11, r4, &(0x7f0000006700)=""/128, 0x80) r5 = syz_open_dev$admmidi(&(0x7f0000006780)='/dev/admmidi#\x00', 0x6, 0x800) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f00000067c0)=""/210) syz_open_dev$amidi(&(0x7f00000068c0)='/dev/amidi#\x00', 0x5, 0x80) openat$uinput(0xffffffffffffff9c, &(0x7f0000006900)='/dev/uinput\x00', 0x802, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000006940)='/dev/ashmem\x00', 0x10000, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000006980)={r2, 0x5}, 0x8) ioctl$TIOCOUTQ(r5, 0x5411, &(0x7f00000069c0)) r6 = syz_open_dev$vcsn(&(0x7f0000006a00)='/dev/vcs#\x00', 0x10000, 0x80) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000006a40)='/dev/snapshot\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f0000006a80)={r2, 0x759}, &(0x7f0000006ac0)=0x8) setsockopt$inet_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000006b00)={0x2}, 0x4) [ 250.999717] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.013414] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.020785] device bridge_slave_1 entered promiscuous mode [ 251.119072] IPVS: ftp: loaded support on port[0] = 21 [ 251.190068] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.196739] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.204652] device bridge_slave_0 entered promiscuous mode [ 251.234891] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 251.354809] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.371231] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.379642] device bridge_slave_1 entered promiscuous mode [ 251.389028] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 251.513673] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 08:43:49 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000000)=""/209) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000200)={0x3, 0x0, [0x0, 0x0, 0x0]}) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000240)=""/33, &(0x7f0000000280)=0x21) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x3) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000340)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000380)={'nat\x00', 0x4, [{}, {}, {}, {}]}, 0x68) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dsp\x00', 0x200000, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000480)={0xa43}, 0x4) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) r3 = dup2(r1, r2) r4 = memfd_create(&(0x7f00000004c0)='nat\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000500)={0x0, 0x80000000, 0x30, 0x0, 0x3}, &(0x7f0000000540)=0x18) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000580)={r5, 0x800, 0x10, 0x3b, 0xffffffffffffbc8b}, &(0x7f00000005c0)=0x18) setsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f0000000600)={0x0, 0xe9e, 0x100000000, 0x0, 0x1, 0x2, 0x55}, 0xc) setsockopt$inet6_buf(r4, 0x29, 0xce, &(0x7f0000000640)="5e27d0096bdd454c6320429b8795bc579f2b0554dc98e5ae5c0902a4edf200361e289f3fb2ca8520abbdd957784b54486f854e406f169af272d85dc46bd9611146ae8b643e2f6086f201fbd73ac6b6e21aa3a585909ffc19e27e21355a65cb6e382c0c21b57a36e1857249c68304670d51d5105dc54de6aa619de972bd447af84032ef8760dd01faea22d59520c64407ec0406b5133a2b58fc58ef17d65dd681f3663aa4e1dff2bfbf164c5c59992ba6ac5bf199942628e1ab0d077a0fdad115a3510b042dddb515fb940b9e10302e770a97bc3e2ee649", 0xd7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000740)={r6, @in6={{0xa, 0x4e24, 0x8, @local, 0x7fffffff}}, 0x3, 0x35200000000000, 0x60, 0xfff, 0x22}, &(0x7f0000000800)=0x98) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000840)={'vcan0\x00', {0x2, 0x4e24, @rand_addr=0x3}}) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0xe) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000880)) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000008c0)={r7, 0x10001, 0x40, 0x1f, 0x3, 0x3}, 0x14) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000900)={'filter\x00', 0xde, "7db6eb6549c7ffb8ea5f3dc1f56e3db30b371e1d9b1fe8128d1cc8fc0b38a88fc8f5ff28c91ca6ed8cc2e5458e2e8de657dfba9c3ef31234344f1fac5233dc8d7d99c46dea31f3cf8f29e7cd69a11b5ad00c79a9102f6d89840746102db05020d27c1dd139544531b72fef0faa25f6f46644c04cdff9b2dd863964ad17e0967779432ce31ab9eb9be26531f23995eac743fe9acf2d51b6bf0c987e871ce37bf67805f4ba1136bead0f5954172b97cd940329cbaf1e63c07b1ada98c14bd7310d01c5d9c8674b6924fe6ca258ba3339bba9016a32e480b228d3b7174eb8e3"}, &(0x7f0000000a40)=0x102) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000bc0)={'vcan0\x00', 0x0}) bind$packet(r3, &(0x7f0000000c00)={0x11, 0x19, r8, 0x1, 0xe2}, 0x14) ioctl$VT_WAITACTIVE(r1, 0x5607) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f0000000c40)={{0x40, 0x3}, {0x1f, 0x9}, 0x6, 0x2, 0x3ff}) [ 251.651006] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 251.766561] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.861848] IPVS: ftp: loaded support on port[0] = 21 [ 251.926970] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 252.143235] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 252.209521] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.239175] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.256327] device bridge_slave_0 entered promiscuous mode [ 252.328516] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 252.387434] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.401494] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.408980] device bridge_slave_1 entered promiscuous mode [ 252.492398] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 252.499349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.560808] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 252.635786] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 252.643857] team0: Port device team_slave_0 added [ 252.649256] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 252.659331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 252.735184] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 252.840076] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.848943] team0: Port device team_slave_1 added [ 252.873411] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.879810] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.902751] device bridge_slave_0 entered promiscuous mode [ 252.990646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 253.017374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.028650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.081458] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 253.091943] team0: Port device team_slave_0 added [ 253.099515] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.113761] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.131382] device bridge_slave_1 entered promiscuous mode [ 253.146426] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 253.172215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.219128] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 253.252020] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 253.259446] team0: Port device team_slave_1 added [ 253.312593] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 253.323261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.333344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.350974] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 253.390125] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 253.406224] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 253.426360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.443567] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.464526] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.491279] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.499379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.515336] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 253.526097] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.542898] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.550355] device bridge_slave_0 entered promiscuous mode [ 253.580874] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 253.589781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.602932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.610919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.657509] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 253.689133] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.711959] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.719605] device bridge_slave_1 entered promiscuous mode [ 253.742054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.760234] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 253.816581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.838806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.870252] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 253.908136] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.925887] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 253.939240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.956308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.006272] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 254.057868] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 254.167002] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 254.202733] team0: Port device team_slave_0 added [ 254.335551] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 254.351721] team0: Port device team_slave_1 added [ 254.364408] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.385511] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.399891] device bridge_slave_0 entered promiscuous mode [ 254.414506] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 254.502710] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 254.509781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 254.521844] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.530791] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.542156] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.557089] device bridge_slave_1 entered promiscuous mode [ 254.603018] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 254.661387] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 254.668249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 254.676260] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.704041] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 254.732438] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 254.739897] team0: Port device team_slave_0 added [ 254.783500] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 254.791668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 254.808517] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 254.827608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.841907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.858156] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 254.880009] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 254.891855] team0: Port device team_slave_1 added [ 254.909486] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 254.937410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 254.980402] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 255.002565] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.012793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.041678] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 255.163188] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.255371] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 255.282785] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 255.293736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.318571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.341518] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.348034] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.355032] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.361430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.402923] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.410151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.429439] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 255.438150] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 255.448282] team0: Port device team_slave_0 added [ 255.482056] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 255.489247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.507890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.573101] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 255.579967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 255.613406] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.619807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.626567] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.633032] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.651798] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.660187] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 255.671702] team0: Port device team_slave_1 added [ 255.706625] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 255.728818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 255.796333] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 255.811707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 255.819729] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 255.964305] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 255.987932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 256.011951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.119997] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 256.135417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.146428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.158227] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 256.166782] team0: Port device team_slave_0 added [ 256.182950] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 256.199261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.222762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.325061] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 256.341981] team0: Port device team_slave_1 added [ 256.411596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.449855] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 256.471403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.487886] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.611518] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 256.618395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 256.626986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.651832] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.658228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.664967] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.671377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.685684] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 256.809678] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 256.841808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.849768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.946676] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 256.961433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.977791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 257.173168] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.179588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.186310] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.192739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.231448] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 257.422082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 257.439794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 257.634099] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.640542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.647308] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.653730] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.670182] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 258.455261] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.461714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.468395] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.474836] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.513828] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 258.520237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.528751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.920223] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.161980] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.394622] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 261.654757] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 261.821576] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 261.827918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 261.844848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.052614] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.249593] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.263083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.277249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.301411] 8021q: adding VLAN 0 to HW filter on device team0 [ 262.543878] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 262.686579] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.751280] 8021q: adding VLAN 0 to HW filter on device team0 [ 262.906030] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.969169] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 262.975792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.991428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.238378] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 263.381814] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.399672] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 263.638353] 8021q: adding VLAN 0 to HW filter on device bond0 [ 263.731438] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 263.737648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 263.757632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.902075] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 263.908299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 263.919405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 264.200398] 8021q: adding VLAN 0 to HW filter on device team0 [ 264.210844] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 264.449357] 8021q: adding VLAN 0 to HW filter on device team0 [ 264.709092] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 264.729418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 264.768770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.192467] 8021q: adding VLAN 0 to HW filter on device team0 08:44:03 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4205, r1, 0x20000000000202, &(0x7f0000000080)={&(0x7f0000002100)=""/4096, 0x1306}) 08:44:03 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) accept$unix(r0, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000580)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@local, @ipv4={[], [], @rand_addr=0x9}, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x12}}, 0x401, 0x0, 0x1, 0x0, 0x5, 0x60, r2}) 08:44:03 executing program 1: r0 = socket$inet(0x2, 0x3, 0x800000000000b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x20000800, 0x0, 0x0, 0x20000830, 0x20000a68], 0x0, &(0x7f0000000000), &(0x7f0000000800)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, "030073663000001000", 'dummy0\x00', 'ifb0\x00', 'lo\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x1b0) 08:44:03 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x0, 0x995f, 0x4, 0x0, 0x300, 0x6, 0x0, {0x0, @in6={{0xa, 0x4e22, 0x0, @mcast1, 0x200}}, 0x0, 0x7c, 0x1, 0x3, 0x9}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={r0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x3d41c695}}, 0xffffffff}, 0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x10000, 0x6, 0x0, 0x3}, &(0x7f0000000600)=0x98) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000380)={0x7ff, 0xb46, 0xa715}) [ 265.843478] hrtimer: interrupt took 30114 ns [ 265.849877] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 265.915089] kernel msg: ebtables bug: please report to author: Valid hook without chain 08:44:03 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x0, 0x80, 0x5, 0x1ff, 0x4, 0x23, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x0, 0x995f, 0x4, 0xff, 0x300, 0x6, 0x1, {0x0, @in6={{0xa, 0x4e22, 0x0, @mcast1, 0x200}}, 0x0, 0x7c, 0x1, 0x3, 0x9}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={r1, @in6={{0xa, 0x4e23, 0x0, @remote, 0x3d41c695}}, 0xffffffff}, 0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x10000, 0x6, 0x0, 0x3}, &(0x7f0000000600)=0x98) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000380)={0x7ff, 0xb46, 0xa715}) 08:44:03 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x0, 0x995f, 0x4, 0xff, 0x300, 0x6, 0x1, {0x0, @in6={{0xa, 0x4e22, 0x0, @mcast1, 0x200}}, 0x0, 0x7c, 0x1, 0x3}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={r0, @in6={{0xa, 0x4e23, 0x0, @remote}}, 0xffffffff}, 0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x10000, 0x0, 0x0, 0x3}, &(0x7f0000000600)=0x98) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000380)={0x7ff, 0x0, 0xa715}) [ 266.503391] EXT4-fs (sda1): re-mounted. Opts: [ 266.534707] EXT4-fs (sda1): re-mounted. Opts: [ 266.658210] EXT4-fs (sda1): re-mounted. Opts: 08:44:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 266.683987] EXT4-fs (sda1): re-mounted. Opts: 08:44:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000340), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xbc, 0x1d, 0xfffffffffffffffd, 0x0, 0x0, {0x7592da67}}, 0x21b}}, 0x0) 08:44:04 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000380)={0x7ff, 0xb46, 0xa715}) [ 266.915395] XFS (loop2): Invalid superblock magic number [ 266.922021] netlink: 168 bytes leftover after parsing attributes in process `syz-executor0'. [ 266.955812] netlink: 168 bytes leftover after parsing attributes in process `syz-executor0'. 08:44:05 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x800000000000001) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") getsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000534000), &(0x7f0000000180)=0xfe9d) 08:44:05 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0), 0x14) move_pages(0x0, 0x0, &(0x7f0000000ac0), 0x0, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000900)=[@in6={0xa, 0x4e20, 0x6, @remote, 0x465}, @in6={0xa, 0x4e22, 0x101, @empty, 0xffff}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e23, 0x2, @mcast2, 0x2}, @in6={0xa, 0x4e23, 0x8, @mcast1, 0x3}, @in={0x2, 0x4e21, @multicast2}], 0x90) r1 = accept$unix(r0, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000300)) 08:44:05 executing program 5: 08:44:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) 08:44:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:05 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000380)={0x7ff, 0xb46, 0xa715}) 08:44:05 executing program 3: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x0, 0x995f, 0x4, 0xff, 0x300, 0x6, 0x1, {0x0, @in6={{0xa, 0x4e22, 0x0, @mcast1, 0x200}}, 0x0, 0x7c, 0x1, 0x3, 0x9}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={r1, @in6={{0xa, 0x0, 0x0, @remote, 0x3d41c695}}, 0xffffffff}, 0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000600)=0x98) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000380)={0x0, 0xb46, 0xa715}) 08:44:05 executing program 0: [ 267.823900] EXT4-fs (sda1): re-mounted. Opts: [ 267.873145] XFS (loop2): Invalid superblock magic number 08:44:05 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xa) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x6, 0x7, 0x1, 0x0, 0xffffffffffffff9c}, 0x2c) [ 267.923075] EXT4-fs (sda1): re-mounted. Opts: 08:44:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) close(r0) 08:44:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004ba90f798058439ed554fa07422dda75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fadvise64(r0, 0x0, 0xb8e0, 0x4) 08:44:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:05 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000480)) [ 268.178816] mmap: syz-executor5 (7330) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 268.260198] XFS (loop2): Invalid superblock magic number 08:44:06 executing program 0: 08:44:06 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000380)={0x7ff, 0xb46, 0xa715}) 08:44:06 executing program 4: 08:44:06 executing program 3: 08:44:06 executing program 5: 08:44:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:06 executing program 0: 08:44:06 executing program 4: 08:44:06 executing program 5: 08:44:06 executing program 3: [ 268.616743] XFS (loop2): Invalid superblock magic number 08:44:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"65716c0000dfdd94448f15cf2100", 0xec38ed91f1c74952}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000080)={"65716c0000a1a95b00", @ifru_mtu=0x1}) 08:44:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r2}) 08:44:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"65716c0000dfdd94448f15cf2100", 0xec38ed91f1c74952}) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000080)={"65716c0000a1a95b00", @ifru_mtu=0x1}) 08:44:06 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000380)={0x7ff, 0xb46, 0xa715}) 08:44:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 08:44:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}]}) [ 268.795956] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 268.916009] irq bypass consumer (token 000000005adc7fc3) registration fails: -16 [ 268.928350] XFS (loop2): sunit and swidth must be specified together [ 268.952443] : renamed from eql 08:44:06 executing program 4: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x0, 0x995f, 0x4, 0xff, 0x300, 0x6, 0x1, {0x0, @in6={{0xa, 0x4e22, 0x0, @mcast1, 0x200}}, 0x0, 0x7c, 0x1, 0x3, 0x9}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={r1, @in6={{0xa, 0x4e23, 0x0, @remote, 0x3d41c695}}, 0xffffffff}, 0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x10000, 0x6, 0x0, 0x3}, &(0x7f0000000600)=0x98) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000380)={0x7ff, 0xb46, 0xa715}) [ 269.049174] EXT4-fs (sda1): re-mounted. Opts: 08:44:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}]}) 08:44:06 executing program 5: perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xb, 0xe, 0x6, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000100)={0x0, 0x9, 0x30, 0x3, 0x2}, &(0x7f0000000140)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0x59, 0x20}, 0xc) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000003c0), 0x7d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x5cd1, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2000000000, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x9f000000, 0xfffffffe, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) write$P9_RREADDIR(r0, &(0x7f0000000280)={0x68, 0x29, 0x2, {0x0, [{{0x33612d2c73a83d92}, 0x7ff, 0x10000, 0x7, './file0'}, {{0x0, 0x3, 0x1}, 0x5, 0xeea1f90, 0x7, './file0'}, {{0x42, 0x3, 0x7}, 0x9, 0x8, 0x7, './file0'}]}}, 0x68) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000200)={0x0, 0x1, {0x1}}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000a99ba404"], &(0x7f00002bf000)='syzkaller\x00', 0x4000000001, 0xb7, &(0x7f0000000500)=""/183, 0x41f00, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x29, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={r2, 0x100, 0x30}, &(0x7f00000001c0)=0xc) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) [ 269.105835] : renamed from eql 08:44:06 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) [ 269.208898] XFS (loop2): sunit and swidth must be specified together 08:44:06 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x598fe02074f3d4cb, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x3, 0x9, 0x3f, 0xfeb3, 0x3eb}, &(0x7f00000003c0)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000400)={0x6, 0x89, 0x0, 0xff3, 0x2, 0x1f, 0x0, 0x8, r1}, 0x20) capset(&(0x7f0000002ffa)={0x20080522}, &(0x7f0000002000)) write$UHID_INPUT2(r0, &(0x7f0000000100)={0xc, 0x26, "e74c38e0e954f0b40c2726083398ee8bb0b3b5e040fe7cd1e64905c1441019b9c63fce74f11b"}, 0x2c) syz_extract_tcp_res(&(0x7f0000000280), 0x40, 0x400) r2 = semget(0xffffffffffffffff, 0x7, 0x0) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f00000000c0)=""/53) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x0) ioctl$TCGETS(r3, 0x5401, &(0x7f0000000080)) r4 = msgget(0x2, 0x100) msgrcv(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000008992704328bcba056eb81ded0dac49913025b9d67b876ccfc8bfe733984810ece391842b368c78c4ab3889a67e8f6361950659a6b53d10e6e650f322952b790edd53bac82a295f53bedcd1f949b45e081c195f01d845b0e040876bc9786b1c2992e636e5ba9e92"], 0x9d, 0x3, 0x3800) msgsnd(r4, &(0x7f00000001c0)={0x0, "abcf5d780081eba7f3fd3a1fbdf4c67b85ffb331ab10bf4835ed0a857eec81866e5908b2ab2d36ffec9b0a38fe44ba5b6368cbc5d45c8ee5687d88bae2651d073af48071dfca65055b0a8533ed64b21931cd5a38cb7dc41574af88c44672aa5386c1938105f0e3b7a9e4c923dbf88862e8727a980c2810c5f3a7b0308f08b38b00e4007bf4f22ac025fa65cb017253ac"}, 0x98, 0x800) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000040)) ioctl$RTC_AIE_ON(r3, 0x7001) [ 269.273111] EXT4-fs (sda1): re-mounted. Opts: 08:44:06 executing program 0: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000100)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) 08:44:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}]}) [ 269.394435] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 08:44:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.syz\x00') write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000100)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'rootmode'}}, 0x29) umount2(&(0x7f0000000040)='./file0\x00', 0x1) 08:44:07 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{0x10080}, "706f727431000000000000000000000000000000000000000000000000000000000000000100", 0xa9824f69d1376637, 0x10800b}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{0x0, 0x1}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000440)={0x0, 0x0, 'client0\x00', 0x0, "7a4f808588443243", "0cf17c1f2f0700000000000090c62f5187ed53d953702fdf09fefeffffff51d1", 0x0, 0x80000000}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ppp\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000840)={0x0, 0x39, "19860c47988a68b06d76df78698d8e2b20d545382317b1f9264c10dd99824453960bf4c7cafeb4c4f1ac1dc199b9608e81d0bb9d422493aec9"}, &(0x7f00000008c0)=0x41) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000900)={0x8, 0x2, 0x9, 0x0, r2}, &(0x7f0000000d00)=0x10) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000a80)={0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000e00)={r3, 0x0, 0x6}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000b00)={r3, r4, 0x69}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000400)=0xc3) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000e40)={0x2, 0x0, [{0xc0000008, 0x4, 0x2, 0x955, 0x10001, 0x5, 0x8001}, {0x40000001, 0x2f4, 0x0, 0x3, 0x9, 0x20, 0x2}]}) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_evm(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)='security.evm\x00', &(0x7f0000000dc0)=@v1={0x2, "da0ab2"}, 0x4, 0x3) syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x4, &(0x7f0000000600)=[{&(0x7f00000001c0)="2c21d9e5d471451f7f9d86b844bc3c658bdbafd16543109ad1e1a2aab53c4b0d9eb7dd1e365b5f406fb13763a8f01cb585f5a9b37dee0b78e01c17ca04e2c4b378ccac948a0e7bad30fbb4c079a887f12f0cda9ad406a6448b0dab", 0x5b, 0xec7}, {&(0x7f0000000240)="2e79a9ae134d0ecf55d54310c175d331c1e99dc94b9a754540c5d20404e4c6343cd5183719e27e8c5127e11a884f4feaa8d961f981bb5637e5b591cb18ea8e8ce589969c8e3e145ca308d0aa8b42e001a4c1152487e776eff461fc02", 0x5c, 0x3ff}, {&(0x7f0000000500)="4fab1edb4fb2191e9725be1afc42fed20c293424d3b9521c706365246e3c240d7f24e8d87d2d8a680f8a9e4dd852661bccfa22261043d80a488712b0adfdb71d509368a18702bb517a496f67e288473b578c26fdda2a72382440018afce715594e727375247fa5e7c7c902c8df8a77fc2afb0ee07ac33315590a488347b12d1e2cfeb055d5e649a345ba71dec944d75a5b077f557a813be36ae3b6ee66a81cd0be8c31875f38cf52e6668743655e634ca5ca7bfb17857a19ebdd1c162000c4b098d3552f95b587112c0ace68d4c4a3e7cd975fcc50a3b301d255102eb8f21abfc18acb28007c5c6dc96c5db7281eb312d19992", 0xf3, 0x8}, {&(0x7f0000000380)="2d6a92859f04f5a7111b161f555c7b42d5928931ab9f00d4b423263e0c02dc63d43f2901d971b0a5a1366b5e2337107b6647e95c5a592c7236c1a5c50393faab6341a423eba300ca6de1fdd7af86af2171d2013e95b543704eb23f69624d0c0b14", 0x61, 0x2d3}], 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="6e6c733d63703933362c6e6f6465636f6d706f73652c756d61736b3d30313737373737373737373737373737373737373737312c756d61736b3d30303030303030303030303030303030303030373437312c63726561746f723df5a7238a2c6e6c733d6d6163726f6d616e69616e2c73657373696f6e3d3078303030303030303030303030303430312c626172726965722c7569643d", @ANYRESHEX=r5, @ANYBLOB="2c65f25e14c356c737770dc69d61efdd85eaa818257d59777fb74299b162f5c3a0bb996ed32e90b950514774fc4f2556c9aad319efbfcfdd00dc6307991638557e31e460624c9e645887fa73cb25111a395f0f08429ab0ecde74bdb33f23eb3e313c3e37b53ab266f99380bc94a0143773b02eb86a1206eafb95312539f388352a7153a3fade58366c539098bc330061dd925f55836cf8810f3f448438eb389d9ee62e3e822bb75a23ae9e91d832eee9ecfc3ae4b70772e5a272fbd03a97be2d365be4b3d32e15ec13d8bb1e4ad92bf38b002cb1c7ee1795e28dee5f1b5f289cbb68f9631a705195c2608f14bf52e149dd735039", @ANYRESDEC=r6, @ANYBLOB='\b ']) r7 = gettid() wait4(r7, &(0x7f0000000940), 0xa100000b, &(0x7f0000000980)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 269.476763] EXT4-fs (sda1): re-mounted. Opts: 08:44:07 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000440)=[0xee00]) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') recvmmsg(0xffffffffffffff9c, &(0x7f0000004440)=[{{&(0x7f0000001bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001c40)=""/37, 0x25}, {&(0x7f0000001c80)=""/27, 0x1b}, {&(0x7f0000001cc0)=""/160, 0xa0}, {&(0x7f0000001ec0)=""/156, 0x9c}], 0x4, &(0x7f0000002000)=""/112, 0x70}}, {{&(0x7f0000002080)=@xdp, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/124, 0x7c}], 0x1, &(0x7f00000024c0)=""/85, 0x55, 0x1}, 0x7f}], 0x2, 0x0, &(0x7f00000045c0)={0x0, 0x989680}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) connect(r0, &(0x7f00000004c0)=@nfc_llcp={0x27, 0x1, 0x0, 0x7, 0x4, 0x3, "3c9b1f416b83e64da1a5eb889766e53c232003cdd64f3772cf08fae814074b8530e21d6e910e77e0f21b1c11924f8cac92f34b470b95ced6e37c4329c190c9", 0x28}, 0x80) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000480)='\x00', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000540)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_security(0x11, r1, &(0x7f0000000280)=""/190, 0xbe) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x80000001, 0x0, 0x10000}, &(0x7f0000000040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007180)={0x0, @broadcast, @broadcast}, &(0x7f00000071c0)=0xc) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') renameat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000005c0)='status\x00') ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000600)=ANY=[]) preadv(r2, &(0x7f00000017c0), 0x8c, 0x0) [ 269.540121] XFS (loop2): sunit and swidth must be specified together 08:44:07 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth'}}]}) 08:44:07 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) [ 269.773528] XFS (loop2): sunit and swidth must be specified together [ 269.794511] EXT4-fs (sda1): re-mounted. Opts: [ 269.808930] hfsplus: unable to change nls mapping 08:44:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r1, 0x1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x4, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'veth1_to_bridge\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="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"]}) ioctl$int_out(r0, 0x5460, &(0x7f0000000000)) [ 269.865422] hfsplus: unable to parse mount options 08:44:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth'}}]}) 08:44:07 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:07 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) [ 270.060555] XFS (loop2): sunit and swidth must be specified together [ 270.075696] hfsplus: unable to change nls mapping [ 270.080813] hfsplus: unable to parse mount options 08:44:07 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:07 executing program 3: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) get_robust_list(r0, &(0x7f0000000200)=&(0x7f0000000180)={&(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000240)=0x18) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000700)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x3ff, 0x1}, &(0x7f00000004c0)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000500)={r3, 0xba57, 0x1, 0x3d4}, &(0x7f00000007c0)=0x10) bind$alg(r1, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(camellia)\x00'}, 0x58) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80400, 0x0) r5 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x8, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000640)=0xe8) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000440)={0x79d7, 0x2966, 0x5}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x10, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="1800181700000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000035ffcfffcfdffff0000000000000000181a0000", @ANYRES32=r5, @ANYBLOB="0000000000000000b767fcfff0ffffff0000000000000000850000004600000000000000000000009500000000000000"], &(0x7f0000000380)='GPL\x00', 0xcd99, 0x63, &(0x7f00000003c0)=""/99, 0x41100, 0x1, [], r6}, 0x48) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$TCSBRKP(r7, 0x5425, 0x7) 08:44:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth'}}]}) 08:44:08 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x5, 0x2) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000001c0)={0x6, 0xffffffffffffffff}) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6423dc5ae292e1026500"], &(0x7f0000000300)='./file0\x00', &(0x7f0000000000)='squashfs\x00', 0x0, &(0x7f0000000380)="231a2a2800") setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='system.sockprotoname\x00', &(0x7f0000000140)=']\x00', 0x2, 0x3) 08:44:08 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 270.494421] XFS (loop2): sunit and swidth must be specified together 08:44:08 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001240)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x6, 0x0, 0x0, 0xa, 0xa0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000003}, {0x0, 0x7f}, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, {{@in=@remote, 0x0, 0xff}, 0x0, @in=@multicast2, 0x0, 0x3, 0x0, 0x3f}}, 0xe8) r2 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000240), 0x4) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x8000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100)=0xfd0, 0x4) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000040)='selfsystem-\x00') recvmmsg(r2, &(0x7f0000000f00), 0x400000000000308, 0x10000, &(0x7f0000001000)={0x77359400}) 08:44:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xaf2}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000040)=[{0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000200)={r3, 0x2}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000003c0)="0f20d86635080000000f22d866b80500000066b9060d20500f01c1ba6100b01aeed9a6390b0f0174170f009a0050670f01caba610066b80010000066ef260f22276766c74424004edeac976766c74424022c0000006766c744240600000000670f011424", 0x64}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) fcntl$setsig(r0, 0xa, 0x33) read(r1, &(0x7f0000000080)=""/19, 0xffffff5c) 08:44:08 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:08 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 270.741953] XFS (loop2): sunit and swidth must be specified together 08:44:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:08 executing program 0: r0 = socket(0x1, 0x5, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8, 0x48000) ioctl$TIOCGETD(r1, 0x5424, &(0x7f00000000c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) close(r0) setreuid(r2, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff7, 0x0) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000180)=0x4) setpriority(0x2, 0x0, 0x0) 08:44:08 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:08 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 271.037235] XFS (loop2): sunit and swidth must be specified together 08:44:08 executing program 0: syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r2, 0x4) fcntl$dupfd(r1, 0x0, r0) write(r2, &(0x7f00000001c0), 0xffffffea) socket$bt_hidp(0x1f, 0x3, 0x6) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000280)=@known='trusted.overlay.redirect\x00') pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 08:44:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:08 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) [ 271.276353] XFS (loop2): sunit and swidth must be specified together 08:44:09 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:09 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 271.638211] EXT4-fs: 9 callbacks suppressed [ 271.638231] EXT4-fs (sda1): re-mounted. Opts: 08:44:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit'}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:09 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) 08:44:09 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:09 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:09 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 271.786389] XFS (loop2): sunit and swidth must be specified together 08:44:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit'}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000003) ioctl(r0, 0x8912, &(0x7f0000000040)="153f62344885d25d766070") unshare(0x2000400) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x20802) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x2018}) lseek(r1, 0xfffffffffffffffd, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)="3dbac4e89b3c312b6848650f7cb39363c52b25732a502e667173635e1f703a4784e10683f903cb1577c3502889bdbddc368dab4f7f1afeb43dd2b90907a80907c711e52c72fcd2f3b0ee92a2d06628c567af55e740d45d6466c21129458d423f156390c8acffea0adc2b19972fd791b1b1a290ca80aede6e88061b", 0x7b}, {&(0x7f0000000180)="61b15409d4576d4e4cda44eefd3d0b4394d7e6b64ba4c03daefc4b987aedc07299f31ee9db5394175636dbf6f0938ef82513db2f2026a345fc8370f8403b8007147713a843d553a6117a8eaaf2f75c31920039b8e655deb1f165ee05b26c32ce11ab5c6a98be1a08ac8c072c67d6a74fbbfb32c95610b58a521fb4d1fbed80f6526a9f7db8dcca589be42b10ea96630405ce42c8758b1efd1850360691529eaf999589ef0554ef0ea4c4fe7a481244d1", 0xb0}, {&(0x7f0000000240)="d2353ea2544dfb3379e087af3171d5f8011e2fa6", 0x14}, {&(0x7f0000000280)="22d2b90d42271885eb390d43f292aafac54eab7d13d4813b6f5936d4432c4eea2a4d8c58791c298c24c3bdf0084e2043fe9a5d526eeb4bdf5fdc8768c34e973981fc5ef3748835a7948000d858afdeec8393cd3c236f5f1ffa0da1a4ee0a08a4b60047b328928dfd983d9b39af7ff0fa4ed20e564294a18a6d5c5d44d0f0b44b138dc9c060963cdbdfe82f44", 0x8c}, {&(0x7f0000000340)="76df65d0f96712147c768d41b134d201a1cbd47a9fd542cf8cf5a287cf2235c791eb4c2eb369c7dfa30fc29ec629bcb7219d608908880cb09d8e9eb13668dc267e0991ac11b58015886daf8afc0f701aa78ed1d112e26434dde0ed0688141eee2249412c914a18084bb026cacfe357dce28101fea4466f9de204f4169a7147dd801095aea8e5b6a3563fb021a88023bd13432b5d2731a637476694cd60257193c05d8eacabc8b464ae6d2a47b7f3d36397064fc2e7102bc7826c0b2c0782c102d50b3b06659c7e8ffcb87aac72d42aa38fda15369ea24c34c7cf50f5e2784c6f6e66c72a8d406bd1a361280647389a8acc25686a3e2ed346522cfd26def2ae", 0xff}], 0x5) [ 271.995754] EXT4-fs (sda1): re-mounted. Opts: [ 272.010525] EXT4-fs (sda1): re-mounted. Opts: [ 272.028779] XFS (loop2): sunit and swidth must be specified together 08:44:09 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit'}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:09 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) 08:44:09 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:09 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x13, &(0x7f0000000040)=',(/em0({}security+\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)=':!') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x20, 0x40980) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080)=r2, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x5a) close(r3) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000140)={0x0, 0x0}) r6 = getpid() r7 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, r6, 0x0, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SYNC(r5, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=""/1}, 0xe) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000003c0)='sit0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f0, &(0x7f0000000140)='sit0\x00') sendmsg(r8, &(0x7f0000003a00)={0x0, 0x0, &(0x7f00000039c0)=[{&(0x7f00000038c0)="967cd8b02bcfdb2b0e1af281874d4605ae447c5a4aa65fcbf4a34454711d87ae82065a87e6611f14f00cf067021c58cad893f47fc9ee9a2a8e73b37a3f364bba01c40acf6da57d3e7b5ab9f644b65918ee9897d73a9a607b1bb67c001148d9f480ff2aeaf35d23afa0d5f1df8c65a58b474007ac844a9f051476d0cf5d4bd0de8236711d18367787c222defc43aef826f39d269bc661d72e5b90ef3581ae97dd725a7e765b90895b0e699c3289744119c2465ee778f800e8c535b4b4c3aa69b8308b0111b3dfe07eedaacd16bbeba8e901d5dc9e84afddc43e8c53f362768480ef70", 0xe2}], 0x1, 0x0, 0x0, 0x40080}, 0x10) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={"766574000000000000000000bd6800", 0x43732e5398417f1a}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r8, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r10, 0x4) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x4) socketpair(0x100000d, 0x0, 0x81, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0xfd7, 0xffffffff, 0x401, 0x0, 0x2, 0x8, 0x8, 0x3, 0x2, 0xffffffffffffa37a, 0x40b, 0x10000000, 0xb, 0x80000000, 0xe6, 0x8, 0xfffffffffffffffc, 0xb3, 0x3c3, 0x2, 0x20, 0xffff, 0x8, 0x9, 0x0, 0x1, 0xa3dc, 0x2, 0x1, 0xff, 0x20, 0x1, 0x59bf, 0x2, 0x32, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000400), 0x2}, 0x34820, 0x3f, 0x0, 0x4, 0x401, 0x2, 0x3}, r6, 0x3, r9, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x89f1, &(0x7f0000000140)='sit0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x2400, 0x8) recvmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffffaf}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r12) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000500)=r8, 0xffffffffffffffaa) 08:44:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx\x00'}, 0x407) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="b7f25df5cf1cdd8b5500000000000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/107, 0x6b}, {&(0x7f00000012c0)=""/194, 0xc2}], 0x2, &(0x7f0000001400)=""/123, 0x7b}, 0x0) [ 272.258051] XFS (loop2): sunit and swidth must be specified together [ 272.332882] EXT4-fs (sda1): re-mounted. Opts: 08:44:10 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) 08:44:10 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:10 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:10 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:10 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 272.702345] FAULT_INJECTION: forcing a failure. [ 272.702345] name failslab, interval 1, probability 0, space 0, times 1 [ 272.733819] CPU: 0 PID: 7731 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 272.742276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.751631] Call Trace: [ 272.751679] dump_stack+0x244/0x39d [ 272.751708] ? dump_stack_print_info.cold.1+0x20/0x20 [ 272.751739] ? lock_downgrade+0x900/0x900 [ 272.767371] should_fail.cold.4+0xa/0x17 [ 272.771476] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.776601] ? lock_downgrade+0x900/0x900 [ 272.780775] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 272.786325] ? proc_fail_nth_write+0x9e/0x210 [ 272.790837] ? proc_cwd_link+0x1d0/0x1d0 [ 272.794919] ? find_held_lock+0x36/0x1c0 [ 272.799021] ? perf_trace_sched_process_exec+0x860/0x860 [ 272.804497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.810060] __should_failslab+0x124/0x180 [ 272.814320] should_failslab+0x9/0x14 [ 272.818136] __kmalloc+0x2e0/0x760 [ 272.821696] ? strncpy_from_user+0x5a0/0x5a0 [ 272.826119] ? fput+0x130/0x1a0 [ 272.826139] ? do_syscall_64+0x9a/0x820 [ 272.826153] ? __x64_sys_memfd_create+0x142/0x4f0 [ 272.826167] ? do_syscall_64+0x9a/0x820 [ 272.826187] __x64_sys_memfd_create+0x142/0x4f0 [ 272.826203] ? memfd_fcntl+0x1910/0x1910 08:44:10 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) [ 272.851106] do_syscall_64+0x1b9/0x820 [ 272.855013] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.860398] ? syscall_return_slowpath+0x5e0/0x5e0 [ 272.865350] ? trace_hardirqs_on_caller+0x310/0x310 [ 272.870398] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 272.875426] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 272.882111] ? __switch_to_asm+0x40/0x70 [ 272.886196] ? __switch_to_asm+0x34/0x70 [ 272.890276] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.895128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.900339] RIP: 0033:0x457569 [ 272.903536] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.922454] RSP: 002b:00007fcd82263a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 272.930179] RAX: ffffffffffffffda RBX: 00000000200003c0 RCX: 0000000000457569 [ 272.937448] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 272.944717] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 272.951984] R10: 00000000200003c0 R11: 0000000000000246 R12: 00007fcd822646d4 [ 272.959253] R13: 00000000004c4b63 R14: 00000000004d7ef0 R15: 0000000000000003 [ 273.025952] EXT4-fs (sda1): re-mounted. Opts: 08:44:10 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:10 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:10 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 273.253456] FAULT_INJECTION: forcing a failure. [ 273.253456] name failslab, interval 1, probability 0, space 0, times 0 08:44:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001d80)=[{{&(0x7f0000000a80)=@in={0x2, 0x0, @rand_addr}, 0x80, &(0x7f0000001bc0), 0x0, &(0x7f0000000040)}}], 0x1, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xaf3a, 0x80080) r1 = memfd_create(&(0x7f0000000100)="1b73656c6600", 0x2) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)=r1) r2 = socket$inet6(0xa, 0x80003, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmmsg(r2, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) 08:44:10 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) [ 273.358339] CPU: 0 PID: 7767 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 273.366837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.376194] Call Trace: [ 273.378801] dump_stack+0x244/0x39d [ 273.382450] ? dump_stack_print_info.cold.1+0x20/0x20 [ 273.387672] should_fail.cold.4+0xa/0x17 [ 273.391749] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 273.396877] ? zap_class+0x640/0x640 [ 273.400614] ? __lock_acquire+0x62f/0x4c20 [ 273.404868] ? lock_downgrade+0x900/0x900 [ 273.409019] ? check_preemption_disabled+0x48/0x280 [ 273.414060] ? find_held_lock+0x36/0x1c0 [ 273.418146] ? expand_files.part.8+0x571/0x9a0 [ 273.422737] ? perf_trace_sched_process_exec+0x860/0x860 [ 273.428196] ? find_held_lock+0x36/0x1c0 [ 273.432288] __should_failslab+0x124/0x180 [ 273.436535] should_failslab+0x9/0x14 [ 273.440357] kmem_cache_alloc+0x2be/0x730 [ 273.444519] ? shmem_destroy_callback+0xc0/0xc0 [ 273.449197] shmem_alloc_inode+0x1b/0x40 [ 273.453269] alloc_inode+0x63/0x190 [ 273.456904] new_inode_pseudo+0x71/0x1a0 [ 273.460971] ? prune_icache_sb+0x1c0/0x1c0 [ 273.465215] ? _raw_spin_unlock+0x2c/0x50 [ 273.469369] new_inode+0x1c/0x40 [ 273.472743] shmem_get_inode+0xf1/0x920 [ 273.476733] ? shmem_encode_fh+0x340/0x340 [ 273.480973] ? lock_downgrade+0x900/0x900 [ 273.485129] ? lock_release+0xa10/0xa10 [ 273.489134] ? perf_trace_sched_process_exec+0x860/0x860 [ 273.494595] ? usercopy_warn+0x110/0x110 [ 273.498689] __shmem_file_setup.part.50+0x83/0x2a0 [ 273.503632] shmem_file_setup+0x65/0x90 [ 273.507626] __x64_sys_memfd_create+0x2af/0x4f0 [ 273.512319] ? memfd_fcntl+0x1910/0x1910 [ 273.516416] do_syscall_64+0x1b9/0x820 [ 273.520308] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 273.525694] ? syscall_return_slowpath+0x5e0/0x5e0 [ 273.530680] ? trace_hardirqs_on_caller+0x310/0x310 [ 273.535704] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 273.540728] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 273.547409] ? __switch_to_asm+0x40/0x70 [ 273.551502] ? __switch_to_asm+0x34/0x70 [ 273.555577] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.560433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.565633] RIP: 0033:0x457569 [ 273.568866] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.587774] RSP: 002b:00007fcd82263a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 273.595496] RAX: ffffffffffffffda RBX: 00000000200003c0 RCX: 0000000000457569 08:44:11 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) [ 273.602771] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 273.610039] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 273.617308] R10: 00000000200003c0 R11: 0000000000000246 R12: 00007fcd822646d4 [ 273.624576] R13: 00000000004c4b63 R14: 00000000004d7ef0 R15: 0000000000000003 [ 273.647843] EXT4-fs (sda1): re-mounted. Opts: 08:44:11 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) [ 273.865457] EXT4-fs (sda1): re-mounted. Opts: 08:44:11 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x801, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) write(r3, &(0x7f00000001c0), 0xffffffea) add_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000440), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000480), &(0x7f0000002440), &(0x7f0000002480)) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) mknod$loop(&(0x7f0000000440)='./file0\x00', 0xc000, 0x1) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000002400)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000280)=0x4) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f00000005c0)=0x100) recvmmsg(0xffffffffffffffff, &(0x7f0000000600), 0x0, 0x0, &(0x7f0000000b40)) ioctl(r0, 0x2, &(0x7f0000000340)="2cb1f52b4716bd5271bee409a391f3cfed8fa41c7a24fabb3c66ad3449b6826386e94ce50fa56fafda0652756f8672d2d5293dec3faaeb3e05535aa2805198bc5a2fc1117ce834e0dbfbbf26a50a6fe53946b0b9e7028ecdd74f2e2a99e7528d38a5b4ea159c5a7e5e3c3ce90977baa78702a1d5692e4ccd8bf886004ac91310151010adf46dd61bf78be86d386dfc26153ac842f80b49fc86b7f47f94da661e0be8437359c73d89c0843e45e3017d669941885cecc8bab26ba3d174cdb2d2a90167ee05d9a8151b") ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000600)={0x2, 0x0, &(0x7f0000000680)=""/255, &(0x7f0000000780)=""/171, &(0x7f00000005c0)}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 273.942088] EXT4-fs (sda1): re-mounted. Opts: [ 274.006568] FAULT_INJECTION: forcing a failure. [ 274.006568] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 274.018450] CPU: 0 PID: 7807 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 274.026861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.036216] Call Trace: [ 274.038819] dump_stack+0x244/0x39d [ 274.042462] ? dump_stack_print_info.cold.1+0x20/0x20 [ 274.047674] ? zap_class+0x640/0x640 [ 274.051415] ? print_usage_bug+0xc0/0xc0 [ 274.055489] should_fail.cold.4+0xa/0x17 [ 274.059559] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.064682] ? find_held_lock+0x36/0x1c0 [ 274.068778] ? get_mem_cgroup_from_mm.part.62+0x204/0x880 [ 274.074340] ? lock_downgrade+0x900/0x900 [ 274.078516] ? check_preemption_disabled+0x48/0x280 [ 274.083544] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 274.088498] ? kasan_check_read+0x11/0x20 [ 274.092676] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 274.097977] ? zap_class+0x640/0x640 [ 274.101707] ? rcu_softirq_qs+0x20/0x20 [ 274.105744] ? rcu_read_unlock+0x16/0x60 [ 274.110000] __alloc_pages_nodemask+0x34b/0xdd0 [ 274.114724] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 274.119679] ? kasan_check_read+0x11/0x20 [ 274.123838] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 274.128859] ? __lock_is_held+0xb5/0x140 [ 274.132944] ? rcu_read_unlock+0x33/0x60 [ 274.137035] ? trace_hardirqs_off+0xb8/0x310 [ 274.141467] cache_grow_begin+0xa5/0x8c0 [ 274.145541] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 274.151084] ? check_preemption_disabled+0x48/0x280 [ 274.156117] kmem_cache_alloc+0x66b/0x730 [ 274.160274] ? shmem_destroy_callback+0xc0/0xc0 [ 274.164960] shmem_alloc_inode+0x1b/0x40 [ 274.169024] alloc_inode+0x63/0x190 [ 274.172680] new_inode_pseudo+0x71/0x1a0 [ 274.176748] ? prune_icache_sb+0x1c0/0x1c0 [ 274.181000] ? _raw_spin_unlock+0x2c/0x50 [ 274.185155] new_inode+0x1c/0x40 [ 274.188541] shmem_get_inode+0xf1/0x920 [ 274.192529] ? shmem_encode_fh+0x340/0x340 [ 274.196769] ? lock_downgrade+0x900/0x900 [ 274.200922] ? lock_release+0xa10/0xa10 [ 274.204904] ? perf_trace_sched_process_exec+0x860/0x860 [ 274.210364] ? usercopy_warn+0x110/0x110 [ 274.214446] __shmem_file_setup.part.50+0x83/0x2a0 [ 274.219390] shmem_file_setup+0x65/0x90 [ 274.223379] __x64_sys_memfd_create+0x2af/0x4f0 [ 274.228077] ? memfd_fcntl+0x1910/0x1910 [ 274.232157] do_syscall_64+0x1b9/0x820 [ 274.236069] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 274.241442] ? syscall_return_slowpath+0x5e0/0x5e0 [ 274.246378] ? trace_hardirqs_on_caller+0x310/0x310 [ 274.251413] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 274.256437] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 274.263108] ? __switch_to_asm+0x40/0x70 [ 274.267169] ? __switch_to_asm+0x34/0x70 [ 274.271242] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.276106] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.281315] RIP: 0033:0x457569 [ 274.284559] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:44:11 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 274.303463] RSP: 002b:00007fcd82263a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 274.311173] RAX: ffffffffffffffda RBX: 00000000200003c0 RCX: 0000000000457569 [ 274.318442] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 274.325713] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 274.332987] R10: 00000000200003c0 R11: 0000000000000246 R12: 00007fcd822646d4 [ 274.340255] R13: 00000000004c4b63 R14: 00000000004d7ef0 R15: 0000000000000003 08:44:12 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:12 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x7ff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) mremap(&(0x7f000000b000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000003000/0x1000)=nil) 08:44:12 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) [ 274.555676] XFS (loop2): Invalid superblock magic number [ 274.562886] EXT4-fs (sda1): re-mounted. Opts: [ 274.650742] EXT4-fs (sda1): re-mounted. Opts: 08:44:12 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) 08:44:12 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:12 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:12 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) 08:44:12 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) [ 274.875744] FAULT_INJECTION: forcing a failure. [ 274.875744] name failslab, interval 1, probability 0, space 0, times 0 [ 274.973060] CPU: 0 PID: 7858 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 274.981540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.981547] Call Trace: [ 274.981575] dump_stack+0x244/0x39d [ 274.981601] ? dump_stack_print_info.cold.1+0x20/0x20 [ 274.981622] ? __save_stack_trace+0x8d/0xf0 [ 274.981677] should_fail.cold.4+0xa/0x17 [ 274.981712] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.981746] ? save_stack+0x43/0xd0 [ 274.981761] ? kasan_kmalloc+0xc7/0xe0 [ 274.981791] ? percpu_ref_put_many+0x11c/0x260 [ 274.981827] ? zap_class+0x640/0x640 [ 275.031979] ? find_held_lock+0x36/0x1c0 [ 275.036093] ? perf_trace_sched_process_exec+0x860/0x860 [ 275.041564] ? lock_downgrade+0x900/0x900 [ 275.045763] __should_failslab+0x124/0x180 [ 275.050026] should_failslab+0x9/0x14 [ 275.050045] kmem_cache_alloc+0x2be/0x730 [ 275.050063] ? d_set_d_op+0x31d/0x410 [ 275.050091] __alloc_file+0xa8/0x470 [ 275.050110] ? file_free_rcu+0xd0/0xd0 [ 275.050128] ? d_instantiate+0x79/0xa0 [ 275.050156] ? lock_downgrade+0x900/0x900 [ 275.077562] ? kasan_check_read+0x11/0x20 [ 275.081740] ? do_raw_spin_unlock+0xa7/0x330 [ 275.086168] ? do_raw_spin_trylock+0x270/0x270 [ 275.090777] alloc_empty_file+0x72/0x170 [ 275.094863] alloc_file+0x5e/0x4d0 [ 275.098435] ? _raw_spin_unlock+0x2c/0x50 [ 275.102606] alloc_file_pseudo+0x261/0x3f0 [ 275.107734] ? alloc_file+0x4d0/0x4d0 [ 275.111549] ? usercopy_warn+0x110/0x110 [ 275.115660] __shmem_file_setup.part.50+0x110/0x2a0 [ 275.120731] shmem_file_setup+0x65/0x90 [ 275.124753] __x64_sys_memfd_create+0x2af/0x4f0 [ 275.129448] ? memfd_fcntl+0x1910/0x1910 [ 275.133542] do_syscall_64+0x1b9/0x820 [ 275.137444] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.142819] ? syscall_return_slowpath+0x5e0/0x5e0 [ 275.147758] ? trace_hardirqs_on_caller+0x310/0x310 [ 275.152781] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 275.157804] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 275.164471] ? __switch_to_asm+0x40/0x70 [ 275.168535] ? __switch_to_asm+0x34/0x70 [ 275.172609] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.177475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.182677] RIP: 0033:0x457569 [ 275.185876] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.204788] RSP: 002b:00007fcd82263a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 275.212508] RAX: ffffffffffffffda RBX: 00000000200003c0 RCX: 0000000000457569 [ 275.219784] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 275.227078] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 275.234370] R10: 00000000200003c0 R11: 0000000000000246 R12: 00007fcd822646d4 [ 275.241660] R13: 00000000004c4b63 R14: 00000000004d7ef0 R15: 0000000000000003 08:44:12 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:12 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:13 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) 08:44:13 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:13 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:13 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 275.438881] FAULT_INJECTION: forcing a failure. [ 275.438881] name failslab, interval 1, probability 0, space 0, times 0 [ 275.511320] CPU: 0 PID: 7888 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 275.519780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.519793] Call Trace: [ 275.519820] dump_stack+0x244/0x39d [ 275.519843] ? dump_stack_print_info.cold.1+0x20/0x20 [ 275.519861] ? lock_downgrade+0x900/0x900 [ 275.519879] ? check_preemption_disabled+0x48/0x280 [ 275.549898] should_fail.cold.4+0xa/0x17 [ 275.553988] ? rcu_softirq_qs+0x20/0x20 [ 275.557979] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.563110] ? is_bpf_text_address+0xd3/0x170 [ 275.563131] ? kernel_text_address+0x79/0xf0 [ 275.563148] ? __kernel_text_address+0xd/0x40 [ 275.563166] ? unwind_get_return_address+0x61/0xa0 [ 275.563185] ? __save_stack_trace+0x8d/0xf0 [ 275.563207] ? find_held_lock+0x36/0x1c0 [ 275.589938] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 275.594804] ? perf_trace_sched_process_exec+0x860/0x860 [ 275.600287] __should_failslab+0x124/0x180 [ 275.604544] should_failslab+0x9/0x14 [ 275.608360] kmem_cache_alloc_trace+0x2d7/0x750 [ 275.613051] ? __might_sleep+0x95/0x190 [ 275.617058] apparmor_file_alloc_security+0x17b/0xac0 [ 275.622281] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 275.627885] ? apparmor_path_rename+0xcd0/0xcd0 [ 275.632580] ? rcu_read_lock_sched_held+0x14f/0x180 [ 275.632600] ? kmem_cache_alloc+0x33a/0x730 [ 275.632616] ? d_set_d_op+0x31d/0x410 [ 275.632649] security_file_alloc+0x4c/0xa0 [ 275.632680] __alloc_file+0x12a/0x470 [ 275.632699] ? file_free_rcu+0xd0/0xd0 [ 275.632720] ? d_instantiate+0x79/0xa0 [ 275.642069] ? lock_downgrade+0x900/0x900 [ 275.642096] ? kasan_check_read+0x11/0x20 [ 275.642111] ? do_raw_spin_unlock+0xa7/0x330 [ 275.642126] ? do_raw_spin_trylock+0x270/0x270 [ 275.642149] alloc_empty_file+0x72/0x170 [ 275.642170] alloc_file+0x5e/0x4d0 [ 275.642186] ? _raw_spin_unlock+0x2c/0x50 [ 275.642208] alloc_file_pseudo+0x261/0x3f0 [ 275.642229] ? alloc_file+0x4d0/0x4d0 [ 275.698831] ? usercopy_warn+0x110/0x110 [ 275.702935] __shmem_file_setup.part.50+0x110/0x2a0 [ 275.707970] shmem_file_setup+0x65/0x90 [ 275.711952] __x64_sys_memfd_create+0x2af/0x4f0 [ 275.716623] ? memfd_fcntl+0x1910/0x1910 [ 275.720727] do_syscall_64+0x1b9/0x820 [ 275.724621] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.730011] ? syscall_return_slowpath+0x5e0/0x5e0 [ 275.734946] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.739800] ? trace_hardirqs_on_caller+0x310/0x310 [ 275.744835] ? prepare_exit_to_usermode+0x291/0x3b0 [ 275.749865] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.754722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.759913] RIP: 0033:0x457569 [ 275.763113] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.782021] RSP: 002b:00007fcd82263a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 275.789741] RAX: ffffffffffffffda RBX: 00000000200003c0 RCX: 0000000000457569 [ 275.797020] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 275.804299] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 275.811573] R10: 00000000200003c0 R11: 0000000000000246 R12: 00007fcd822646d4 [ 275.818848] R13: 00000000004c4b63 R14: 00000000004d7ef0 R15: 0000000000000003 08:44:13 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:13 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:13 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:13 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:13 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:13 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) [ 276.272192] FAULT_INJECTION: forcing a failure. [ 276.272192] name failslab, interval 1, probability 0, space 0, times 0 [ 276.293771] CPU: 0 PID: 7942 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 276.302223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.311580] Call Trace: [ 276.314217] dump_stack+0x244/0x39d [ 276.317903] ? dump_stack_print_info.cold.1+0x20/0x20 [ 276.323168] ? lock_downgrade+0x900/0x900 [ 276.327390] ? check_preemption_disabled+0x48/0x280 [ 276.332443] should_fail.cold.4+0xa/0x17 [ 276.336510] ? rcu_softirq_qs+0x20/0x20 [ 276.340487] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.345620] ? is_bpf_text_address+0xd3/0x170 [ 276.350148] ? kernel_text_address+0x79/0xf0 [ 276.354563] ? __kernel_text_address+0xd/0x40 [ 276.359054] ? unwind_get_return_address+0x61/0xa0 [ 276.363995] ? __save_stack_trace+0x8d/0xf0 [ 276.368337] ? find_held_lock+0x36/0x1c0 [ 276.372414] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 276.377247] ? perf_trace_sched_process_exec+0x860/0x860 [ 276.382695] __should_failslab+0x124/0x180 [ 276.386957] should_failslab+0x9/0x14 [ 276.390792] kmem_cache_alloc_trace+0x2d7/0x750 [ 276.395495] ? __might_sleep+0x95/0x190 [ 276.399492] apparmor_file_alloc_security+0x17b/0xac0 [ 276.404693] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 276.410255] ? apparmor_path_rename+0xcd0/0xcd0 [ 276.414934] ? rcu_read_lock_sched_held+0x14f/0x180 [ 276.419959] ? kmem_cache_alloc+0x33a/0x730 [ 276.424370] ? d_set_d_op+0x31d/0x410 [ 276.428185] security_file_alloc+0x4c/0xa0 [ 276.432430] __alloc_file+0x12a/0x470 [ 276.436233] ? file_free_rcu+0xd0/0xd0 [ 276.440126] ? d_instantiate+0x79/0xa0 [ 276.444025] ? lock_downgrade+0x900/0x900 [ 276.448188] ? kasan_check_read+0x11/0x20 [ 276.452341] ? do_raw_spin_unlock+0xa7/0x330 [ 276.456758] ? do_raw_spin_trylock+0x270/0x270 [ 276.461351] alloc_empty_file+0x72/0x170 [ 276.465418] alloc_file+0x5e/0x4d0 [ 276.468963] ? _raw_spin_unlock+0x2c/0x50 [ 276.473119] alloc_file_pseudo+0x261/0x3f0 [ 276.477385] ? alloc_file+0x4d0/0x4d0 [ 276.481194] ? usercopy_warn+0x110/0x110 [ 276.485274] __shmem_file_setup.part.50+0x110/0x2a0 [ 276.490315] shmem_file_setup+0x65/0x90 [ 276.494320] __x64_sys_memfd_create+0x2af/0x4f0 [ 276.499013] ? memfd_fcntl+0x1910/0x1910 [ 276.503101] do_syscall_64+0x1b9/0x820 [ 276.506995] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 276.512365] ? syscall_return_slowpath+0x5e0/0x5e0 [ 276.517312] ? trace_hardirqs_on_caller+0x310/0x310 [ 276.522359] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 276.527404] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 276.534076] ? __switch_to_asm+0x40/0x70 [ 276.538141] ? __switch_to_asm+0x34/0x70 [ 276.542213] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.547067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.552256] RIP: 0033:0x457569 [ 276.555492] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.574403] RSP: 002b:00007fcd82263a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 276.582114] RAX: ffffffffffffffda RBX: 00000000200003c0 RCX: 0000000000457569 [ 276.589382] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 276.596679] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 276.603949] R10: 00000000200003c0 R11: 0000000000000246 R12: 00007fcd822646d4 [ 276.611237] R13: 00000000004c4b63 R14: 00000000004d7ef0 R15: 0000000000000003 08:44:14 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:14 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:14 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) [ 276.691262] EXT4-fs: 10 callbacks suppressed [ 276.691308] EXT4-fs (sda1): re-mounted. Opts: [ 276.768021] FAULT_INJECTION: forcing a failure. [ 276.768021] name failslab, interval 1, probability 0, space 0, times 0 08:44:14 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:14 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:14 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) [ 276.866696] CPU: 0 PID: 7959 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 276.875182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.884572] Call Trace: [ 276.887187] dump_stack+0x244/0x39d [ 276.890845] ? dump_stack_print_info.cold.1+0x20/0x20 [ 276.896067] ? find_held_lock+0x36/0x1c0 [ 276.900161] should_fail.cold.4+0xa/0x17 [ 276.904242] ? find_held_lock+0x36/0x1c0 [ 276.908329] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.913460] ? lock_downgrade+0x900/0x900 [ 276.917621] ? current_time+0x72/0x1b0 [ 276.921550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.927105] ? timespec64_trunc+0xea/0x180 [ 276.931355] ? inode_init_owner+0x340/0x340 [ 276.935712] ? find_held_lock+0x36/0x1c0 [ 276.939815] ? perf_trace_sched_process_exec+0x860/0x860 [ 276.945280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.950846] __should_failslab+0x124/0x180 [ 276.955105] should_failslab+0x9/0x14 [ 276.958935] kmem_cache_alloc+0x2be/0x730 [ 276.963102] ? do_sys_ftruncate+0x428/0x550 [ 276.967535] ? lock_downgrade+0x900/0x900 [ 276.971704] getname_flags+0xd0/0x590 [ 276.975510] ? __lock_is_held+0xb5/0x140 [ 276.979584] getname+0x19/0x20 [ 276.982790] do_sys_open+0x383/0x700 [ 276.986532] ? filp_open+0x80/0x80 [ 276.990087] ? trace_hardirqs_off_caller+0x300/0x300 [ 276.995200] ? do_sys_ftruncate+0x449/0x550 [ 276.999531] __x64_sys_open+0x7e/0xc0 [ 277.003839] do_syscall_64+0x1b9/0x820 [ 277.007737] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 277.013123] ? syscall_return_slowpath+0x5e0/0x5e0 [ 277.018062] ? trace_hardirqs_on_caller+0x310/0x310 [ 277.023084] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 277.028110] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 277.034828] ? __switch_to_asm+0x40/0x70 [ 277.038897] ? __switch_to_asm+0x34/0x70 [ 277.042971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.047829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.053020] RIP: 0033:0x4111a1 [ 277.056218] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 277.075161] RSP: 002b:00007fcd82263a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 277.082887] RAX: ffffffffffffffda RBX: 00000000200003d0 RCX: 00000000004111a1 [ 277.090172] RDX: 00007fcd82263afa RSI: 0000000000000002 RDI: 00007fcd82263af0 [ 277.097447] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 277.104719] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 277.111992] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 08:44:14 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 277.274426] FAULT_INJECTION: forcing a failure. [ 277.274426] name failslab, interval 1, probability 0, space 0, times 0 08:44:14 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) [ 277.405756] EXT4-fs (sda1): re-mounted. Opts: [ 277.406872] CPU: 0 PID: 7990 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 277.418916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.428279] Call Trace: [ 277.430885] dump_stack+0x244/0x39d [ 277.430910] ? dump_stack_print_info.cold.1+0x20/0x20 [ 277.430930] ? print_usage_bug+0xc0/0xc0 [ 277.430957] should_fail.cold.4+0xa/0x17 [ 277.430972] ? find_held_lock+0x36/0x1c0 08:44:15 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) [ 277.430993] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.439881] ? lock_downgrade+0x900/0x900 [ 277.439900] ? check_preemption_disabled+0x48/0x280 [ 277.439924] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 277.439944] ? kasan_check_read+0x11/0x20 [ 277.439972] ? find_held_lock+0x36/0x1c0 [ 277.440018] ? perf_trace_sched_process_exec+0x860/0x860 [ 277.485017] __should_failslab+0x124/0x180 [ 277.489280] should_failslab+0x9/0x14 [ 277.493102] kmem_cache_alloc+0x2be/0x730 [ 277.497278] ? zap_class+0x640/0x640 [ 277.501000] ? print_usage_bug+0xc0/0xc0 [ 277.505066] ? mark_held_locks+0x130/0x130 [ 277.509318] __alloc_file+0xa8/0x470 [ 277.513041] ? file_free_rcu+0xd0/0xd0 [ 277.516940] ? find_held_lock+0x36/0x1c0 [ 277.521021] ? is_bpf_text_address+0xac/0x170 [ 277.525545] ? lock_downgrade+0x900/0x900 [ 277.529697] ? check_preemption_disabled+0x48/0x280 [ 277.534725] alloc_empty_file+0x72/0x170 [ 277.538793] path_openat+0x170/0x5150 [ 277.542615] ? rcu_softirq_qs+0x20/0x20 [ 277.546617] ? unwind_dump+0x190/0x190 [ 277.550548] ? zap_class+0x640/0x640 [ 277.554275] ? path_lookupat.isra.43+0xc00/0xc00 [ 277.559032] ? unwind_get_return_address+0x61/0xa0 [ 277.563972] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 277.568996] ? expand_files.part.8+0x571/0x9a0 [ 277.573591] ? find_held_lock+0x36/0x1c0 [ 277.577682] ? __alloc_fd+0x347/0x6e0 [ 277.581502] ? lock_downgrade+0x900/0x900 [ 277.585665] ? getname+0x19/0x20 [ 277.589046] ? kasan_check_read+0x11/0x20 [ 277.593196] ? do_raw_spin_unlock+0xa7/0x330 [ 277.597607] ? do_raw_spin_trylock+0x270/0x270 [ 277.602193] ? __lock_is_held+0xb5/0x140 [ 277.606265] ? __check_object_size+0xb1/0x782 [ 277.610773] ? _raw_spin_unlock+0x2c/0x50 [ 277.614930] ? __alloc_fd+0x347/0x6e0 [ 277.618750] do_filp_open+0x255/0x380 [ 277.622578] ? may_open_dev+0x100/0x100 [ 277.626570] ? get_unused_fd_flags+0x122/0x1a0 [ 277.631156] ? __alloc_fd+0x6e0/0x6e0 [ 277.634966] ? __lock_is_held+0xb5/0x140 [ 277.639037] do_sys_open+0x568/0x700 [ 277.642760] ? filp_open+0x80/0x80 [ 277.646312] ? trace_hardirqs_off_caller+0x300/0x300 [ 277.651418] ? do_sys_ftruncate+0x449/0x550 [ 277.655749] __x64_sys_open+0x7e/0xc0 [ 277.659561] do_syscall_64+0x1b9/0x820 [ 277.663457] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 277.668830] ? syscall_return_slowpath+0x5e0/0x5e0 [ 277.673774] ? trace_hardirqs_on_caller+0x310/0x310 [ 277.678798] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 277.683823] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 277.690490] ? __switch_to_asm+0x40/0x70 [ 277.694554] ? __switch_to_asm+0x34/0x70 [ 277.698652] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.703553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.708769] RIP: 0033:0x4111a1 [ 277.711968] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 277.730894] RSP: 002b:00007fcd82263a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 277.738609] RAX: ffffffffffffffda RBX: 00000000200003d0 RCX: 00000000004111a1 [ 277.745894] RDX: 00007fcd82263afa RSI: 0000000000000002 RDI: 00007fcd82263af0 08:44:15 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) [ 277.753164] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 277.760436] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 277.767710] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 08:44:15 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:15 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:15 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:15 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 278.027468] EXT4-fs (sda1): re-mounted. Opts: 08:44:15 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:15 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) [ 278.162739] EXT4-fs (sda1): re-mounted. Opts: 08:44:15 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 278.283176] FAULT_INJECTION: forcing a failure. [ 278.283176] name failslab, interval 1, probability 0, space 0, times 0 [ 278.316636] EXT4-fs (sda1): re-mounted. Opts: [ 278.353532] CPU: 1 PID: 8038 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 278.361993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.371377] Call Trace: [ 278.373987] dump_stack+0x244/0x39d [ 278.377630] ? dump_stack_print_info.cold.1+0x20/0x20 [ 278.382843] ? lock_downgrade+0x900/0x900 [ 278.387003] ? check_preemption_disabled+0x48/0x280 [ 278.392037] should_fail.cold.4+0xa/0x17 [ 278.396115] ? rcu_softirq_qs+0x20/0x20 [ 278.400123] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 278.405250] ? is_bpf_text_address+0xd3/0x170 [ 278.409758] ? kernel_text_address+0x79/0xf0 [ 278.414178] ? __kernel_text_address+0xd/0x40 [ 278.418683] ? unwind_get_return_address+0x61/0xa0 [ 278.423623] ? __save_stack_trace+0x8d/0xf0 [ 278.427967] ? find_held_lock+0x36/0x1c0 [ 278.432069] ? do_syscall_64+0x1b9/0x820 [ 278.436137] ? perf_trace_sched_process_exec+0x860/0x860 [ 278.441639] __should_failslab+0x124/0x180 [ 278.445900] should_failslab+0x9/0x14 [ 278.449721] kmem_cache_alloc_trace+0x2d7/0x750 [ 278.454418] ? __might_sleep+0x95/0x190 [ 278.458409] apparmor_file_alloc_security+0x17b/0xac0 [ 278.463608] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 278.469165] ? apparmor_path_rename+0xcd0/0xcd0 [ 278.473852] ? rcu_read_lock_sched_held+0x14f/0x180 [ 278.478874] ? kmem_cache_alloc+0x33a/0x730 [ 278.483202] ? zap_class+0x640/0x640 [ 278.486926] security_file_alloc+0x4c/0xa0 [ 278.491178] __alloc_file+0x12a/0x470 [ 278.494985] ? file_free_rcu+0xd0/0xd0 [ 278.498879] ? find_held_lock+0x36/0x1c0 [ 278.502955] ? is_bpf_text_address+0xac/0x170 [ 278.507459] ? lock_downgrade+0x900/0x900 [ 278.511612] ? check_preemption_disabled+0x48/0x280 [ 278.516659] alloc_empty_file+0x72/0x170 [ 278.520746] path_openat+0x170/0x5150 [ 278.524556] ? rcu_softirq_qs+0x20/0x20 [ 278.528534] ? unwind_dump+0x190/0x190 [ 278.532438] ? zap_class+0x640/0x640 [ 278.536168] ? path_lookupat.isra.43+0xc00/0xc00 [ 278.540930] ? unwind_get_return_address+0x61/0xa0 [ 278.545871] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 278.550894] ? expand_files.part.8+0x571/0x9a0 [ 278.555489] ? find_held_lock+0x36/0x1c0 [ 278.559564] ? __alloc_fd+0x347/0x6e0 [ 278.563374] ? lock_downgrade+0x900/0x900 [ 278.567526] ? getname+0x19/0x20 [ 278.570910] ? kasan_check_read+0x11/0x20 [ 278.575081] ? do_raw_spin_unlock+0xa7/0x330 [ 278.579499] ? do_raw_spin_trylock+0x270/0x270 [ 278.584088] ? __lock_is_held+0xb5/0x140 [ 278.588175] ? __check_object_size+0xb1/0x782 [ 278.592696] ? _raw_spin_unlock+0x2c/0x50 [ 278.596853] ? __alloc_fd+0x347/0x6e0 [ 278.600682] do_filp_open+0x255/0x380 [ 278.604497] ? may_open_dev+0x100/0x100 [ 278.608491] ? get_unused_fd_flags+0x122/0x1a0 [ 278.613077] ? __alloc_fd+0x6e0/0x6e0 [ 278.616885] ? __lock_is_held+0xb5/0x140 [ 278.620964] do_sys_open+0x568/0x700 [ 278.624693] ? filp_open+0x80/0x80 [ 278.628246] ? trace_hardirqs_off_caller+0x300/0x300 [ 278.633364] ? do_sys_ftruncate+0x449/0x550 [ 278.637697] __x64_sys_open+0x7e/0xc0 [ 278.641506] do_syscall_64+0x1b9/0x820 [ 278.645402] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 278.650776] ? syscall_return_slowpath+0x5e0/0x5e0 [ 278.655729] ? trace_hardirqs_on_caller+0x310/0x310 [ 278.660753] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 278.665777] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 278.672460] ? __switch_to_asm+0x40/0x70 [ 278.676524] ? __switch_to_asm+0x34/0x70 [ 278.680597] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.685458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.690659] RIP: 0033:0x4111a1 [ 278.693865] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 278.712785] RSP: 002b:00007fcd82263a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 278.720502] RAX: ffffffffffffffda RBX: 00000000200003d0 RCX: 00000000004111a1 [ 278.727790] RDX: 00007fcd82263afa RSI: 0000000000000002 RDI: 00007fcd82263af0 [ 278.735060] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 278.742329] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 278.749597] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 08:44:16 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 278.803790] EXT4-fs (sda1): re-mounted. Opts: 08:44:16 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:16 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) [ 278.918031] EXT4-fs (sda1): re-mounted. Opts: 08:44:16 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:16 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) [ 279.093706] FAULT_INJECTION: forcing a failure. [ 279.093706] name failslab, interval 1, probability 0, space 0, times 0 08:44:16 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 279.182020] CPU: 0 PID: 8083 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 279.190486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.199850] Call Trace: [ 279.202463] dump_stack+0x244/0x39d [ 279.206115] ? dump_stack_print_info.cold.1+0x20/0x20 [ 279.211334] should_fail.cold.4+0xa/0x17 [ 279.215410] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.220526] ? down_write_nested+0x130/0x130 [ 279.224943] ? down_read+0x120/0x120 [ 279.228686] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 279.234239] ? zap_class+0x640/0x640 [ 279.237982] ? lock_acquire+0x1ed/0x520 [ 279.241969] ? lo_ioctl+0x8e/0x1d60 [ 279.245618] ? find_held_lock+0x36/0x1c0 [ 279.249714] ? __lock_is_held+0xb5/0x140 [ 279.253805] ? perf_trace_sched_process_exec+0x860/0x860 [ 279.259279] __should_failslab+0x124/0x180 [ 279.263540] should_failslab+0x9/0x14 [ 279.267364] kmem_cache_alloc_trace+0x2d7/0x750 [ 279.272061] ? check_preemption_disabled+0x48/0x280 [ 279.277112] __kthread_create_on_node+0x137/0x540 [ 279.281971] ? loop_get_status64+0x140/0x140 [ 279.286408] ? kthread_parkme+0xb0/0xb0 [ 279.290409] ? __lockdep_init_map+0x105/0x590 [ 279.294928] ? __lockdep_init_map+0x105/0x590 [ 279.299441] ? loop_get_status64+0x140/0x140 [ 279.303863] kthread_create_on_node+0xb1/0xe0 [ 279.308371] ? __kthread_create_on_node+0x540/0x540 [ 279.313405] ? kasan_check_read+0x11/0x20 [ 279.317572] lo_ioctl+0x7f6/0x1d60 [ 279.321153] ? lo_rw_aio+0x1ef0/0x1ef0 [ 279.325051] blkdev_ioctl+0x9ac/0x2010 [ 279.328947] ? blkpg_ioctl+0xc10/0xc10 [ 279.332846] ? lock_downgrade+0x900/0x900 [ 279.337002] ? check_preemption_disabled+0x48/0x280 [ 279.342036] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 279.346978] ? kasan_check_read+0x11/0x20 [ 279.351230] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 279.356515] ? rcu_softirq_qs+0x20/0x20 [ 279.360519] ? __fget+0x4d1/0x740 [ 279.363989] ? ksys_dup3+0x680/0x680 [ 279.367733] block_ioctl+0xee/0x130 [ 279.371374] ? blkdev_fallocate+0x400/0x400 [ 279.375722] do_vfs_ioctl+0x1de/0x1720 [ 279.379626] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 279.385193] ? ioctl_preallocate+0x300/0x300 [ 279.389615] ? __fget_light+0x2e9/0x430 [ 279.393618] ? fget_raw+0x20/0x20 [ 279.397119] ? rcu_read_lock_sched_held+0x14f/0x180 [ 279.402160] ? kmem_cache_free+0x24f/0x290 [ 279.406405] ? putname+0xf7/0x130 [ 279.409871] ? do_syscall_64+0x9a/0x820 [ 279.413861] ? do_syscall_64+0x9a/0x820 [ 279.417848] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 279.422448] ? security_file_ioctl+0x94/0xc0 [ 279.426873] ksys_ioctl+0xa9/0xd0 [ 279.430344] __x64_sys_ioctl+0x73/0xb0 [ 279.434244] do_syscall_64+0x1b9/0x820 [ 279.438144] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 279.443522] ? syscall_return_slowpath+0x5e0/0x5e0 [ 279.448466] ? trace_hardirqs_on_caller+0x310/0x310 [ 279.453494] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 279.458522] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 279.465201] ? __switch_to_asm+0x40/0x70 [ 279.469271] ? __switch_to_asm+0x34/0x70 [ 279.473348] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.478210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.483405] RIP: 0033:0x4573d7 [ 279.486610] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.505534] RSP: 002b:00007fcd82263a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 279.513260] RAX: ffffffffffffffda RBX: 00000000200003d0 RCX: 00000000004573d7 [ 279.520535] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:44:17 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 279.527845] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 279.535121] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 279.542395] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 08:44:17 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:17 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:17 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) [ 279.846892] EXT4-fs (sda1): re-mounted. Opts: 08:44:17 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:17 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 279.952996] EXT4-fs (sda1): re-mounted. Opts: 08:44:17 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:17 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) [ 280.103244] FAULT_INJECTION: forcing a failure. [ 280.103244] name failslab, interval 1, probability 0, space 0, times 0 [ 280.115291] CPU: 1 PID: 8110 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 280.123712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.123720] Call Trace: [ 280.123750] dump_stack+0x244/0x39d [ 280.123776] ? dump_stack_print_info.cold.1+0x20/0x20 [ 280.123811] should_fail.cold.4+0xa/0x17 [ 280.135749] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.135768] ? pick_next_task_fair+0xa35/0x1c90 [ 280.135792] ? rcu_read_lock_sched_held+0x14f/0x180 [ 280.144627] ? zap_class+0x640/0x640 [ 280.144657] ? print_usage_bug+0xc0/0xc0 [ 280.144674] ? __account_cfs_rq_runtime+0x790/0x790 [ 280.144696] ? find_held_lock+0x36/0x1c0 [ 280.144718] ? __lock_is_held+0xb5/0x140 [ 280.144752] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 280.144770] ? perf_trace_sched_process_exec+0x860/0x860 [ 280.144801] __should_failslab+0x124/0x180 [ 280.144823] should_failslab+0x9/0x14 [ 280.167399] kmem_cache_alloc+0x2be/0x730 [ 280.167435] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 280.167471] __kernfs_new_node+0x127/0x8d0 [ 280.167494] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 280.167528] ? _raw_spin_unlock_irq+0x56/0x80 [ 280.184733] ? _raw_spin_unlock_irq+0x60/0x80 [ 280.184752] ? __schedule+0x168b/0x21d0 [ 280.184773] ? zap_class+0x640/0x640 [ 280.194971] ? zap_class+0x640/0x640 [ 280.194992] ? trace_hardirqs_on+0xbd/0x310 [ 280.195008] ? kasan_check_read+0x11/0x20 [ 280.195034] ? find_held_lock+0x36/0x1c0 [ 280.195062] kernfs_new_node+0x95/0x120 [ 280.195086] kernfs_create_dir_ns+0x4d/0x160 [ 280.195122] internal_create_group+0x5fc/0xd80 [ 280.195171] ? remove_files.isra.1+0x190/0x190 [ 280.195185] ? up_write+0x7b/0x220 [ 280.195201] ? down_write_nested+0x130/0x130 [ 280.195218] ? down_read+0x120/0x120 [ 280.195251] sysfs_create_group+0x1f/0x30 [ 280.195268] lo_ioctl+0x1307/0x1d60 [ 280.195290] ? lo_rw_aio+0x1ef0/0x1ef0 [ 280.295140] blkdev_ioctl+0x9ac/0x2010 [ 280.299039] ? blkpg_ioctl+0xc10/0xc10 [ 280.302935] ? lock_downgrade+0x900/0x900 [ 280.307088] ? check_preemption_disabled+0x48/0x280 [ 280.312128] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 280.317091] ? kasan_check_read+0x11/0x20 [ 280.321254] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 280.326542] ? rcu_softirq_qs+0x20/0x20 [ 280.330531] ? __fget+0x4d1/0x740 [ 280.333996] ? ksys_dup3+0x680/0x680 [ 280.337729] block_ioctl+0xee/0x130 [ 280.341366] ? blkdev_fallocate+0x400/0x400 [ 280.345709] do_vfs_ioctl+0x1de/0x1720 [ 280.349606] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 280.355184] ? ioctl_preallocate+0x300/0x300 [ 280.359604] ? __fget_light+0x2e9/0x430 [ 280.363636] ? fget_raw+0x20/0x20 [ 280.367122] ? rcu_read_lock_sched_held+0x14f/0x180 [ 280.372148] ? kmem_cache_free+0x24f/0x290 [ 280.376393] ? putname+0xf7/0x130 [ 280.379886] ? do_syscall_64+0x9a/0x820 [ 280.383876] ? do_syscall_64+0x9a/0x820 [ 280.387856] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 280.392457] ? security_file_ioctl+0x94/0xc0 [ 280.396919] ksys_ioctl+0xa9/0xd0 [ 280.400380] __x64_sys_ioctl+0x73/0xb0 [ 280.404290] do_syscall_64+0x1b9/0x820 [ 280.408183] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 280.413575] ? syscall_return_slowpath+0x5e0/0x5e0 [ 280.418513] ? trace_hardirqs_on_caller+0x310/0x310 [ 280.423540] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 280.428590] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 280.435264] ? __switch_to_asm+0x40/0x70 [ 280.439326] ? __switch_to_asm+0x34/0x70 [ 280.443406] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.448263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.453466] RIP: 0033:0x4573d7 [ 280.456673] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.475584] RSP: 002b:00007fcd82263a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 280.483300] RAX: ffffffffffffffda RBX: 00000000200003d0 RCX: 00000000004573d7 [ 280.490581] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 280.497854] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 08:44:18 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) [ 280.505129] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 280.512404] R13: 0000000000000000 R14: 00000000004d7ef0 R15: 0000000000000003 08:44:18 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 280.709124] EXT4-fs (sda1): re-mounted. Opts: 08:44:18 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:18 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:18 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:18 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) [ 280.985046] XFS (loop2): Invalid superblock magic number 08:44:18 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 08:44:18 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='%fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:18 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:18 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:18 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:19 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='x.s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:19 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) 08:44:19 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:19 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:19 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:19 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:19 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 281.905516] EXT4-fs: 5 callbacks suppressed [ 281.905528] EXT4-fs (sda1): re-mounted. Opts: 08:44:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='x/s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:19 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) [ 282.009226] EXT4-fs (sda1): re-mounted. Opts: [ 282.098824] EXT4-fs (sda1): re-mounted. Opts: 08:44:19 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:19 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:19 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 282.320682] EXT4-fs (sda1): re-mounted. Opts: 08:44:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='x%s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:20 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) [ 282.418916] EXT4-fs (sda1): re-mounted. Opts: [ 282.535905] EXT4-fs (sda1): re-mounted. Opts: 08:44:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:20 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:20 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:20 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:20 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfl\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 282.957357] EXT4-fs (sda1): re-mounted. Opts: 08:44:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:20 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:20 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:20 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:20 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfo\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:21 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:21 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 283.419167] EXT4-fs (sda1): re-mounted. Opts: 08:44:21 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 283.487923] EXT4-fs (sda1): re-mounted. Opts: 08:44:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xf#\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:21 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:21 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:21 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 283.803401] EXT4-fs (sda1): re-mounted. Opts: 08:44:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xf+\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:21 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:21 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:21 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:21 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) 08:44:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfp\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:21 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:22 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:22 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:22 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) 08:44:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xf%\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:22 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:22 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:22 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:22 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:22 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfd\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:22 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:22 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:22 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfu\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:23 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:23 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 08:44:23 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:23 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:23 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xf-\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:23 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:23 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:23 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xf*\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:23 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:23 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:24 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:24 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfc\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:24 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:24 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:24 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:24 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:24 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:24 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) [ 286.917104] EXT4-fs: 16 callbacks suppressed [ 286.917117] EXT4-fs (sda1): re-mounted. Opts: 08:44:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xf\n\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 286.969793] EXT4-fs (sda1): re-mounted. Opts: 08:44:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:24 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:24 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:24 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) [ 287.255790] EXT4-fs (sda1): re-mounted. Opts: 08:44:24 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 287.292735] EXT4-fs (sda1): re-mounted. Opts: [ 287.309908] EXT4-fs (sda1): re-mounted. Opts: 08:44:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xf0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:25 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:25 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:25 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:25 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 287.578634] EXT4-fs (sda1): re-mounted. Opts: [ 287.633024] EXT4-fs (sda1): re-mounted. Opts: [ 287.656214] EXT4-fs (sda1): re-mounted. Opts: 08:44:25 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}], 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfi\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:25 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:25 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:25 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 287.930492] EXT4-fs (sda1): re-mounted. Opts: [ 287.943387] EXT4-fs (sda1): re-mounted. Opts: 08:44:25 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}], 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:25 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfX\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:25 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:25 executing program 3: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:26 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}], 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:26 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:26 executing program 0: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfx\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:26 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:26 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}], 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:26 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:26 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xf.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:26 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:26 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}], 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:26 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:26 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfsd', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:26 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:26 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}], 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:27 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:27 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:27 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:27 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="786673c0", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:27 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd"]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:27 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:27 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:27 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:27 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:27 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:27 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:27 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:28 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:28 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:28 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:28 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 08:44:28 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 290.723849] XFS (loop2): Invalid superblock magic number 08:44:28 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 08:44:28 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:28 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:28 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:28 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 08:44:28 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:28 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 291.214500] XFS (loop2): Invalid superblock magic number 08:44:28 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="786673f9", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:29 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:29 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 08:44:29 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:29 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 08:44:29 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:29 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:29 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:29 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 291.971216] EXT4-fs: 28 callbacks suppressed [ 291.971228] EXT4-fs (sda1): re-mounted. Opts: [ 292.024617] EXT4-fs (sda1): re-mounted. Opts: 08:44:29 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}], 0x4) 08:44:29 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 08:44:29 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 292.138396] XFS (loop2): Invalid superblock magic number [ 292.298226] EXT4-fs (sda1): re-mounted. Opts: 08:44:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 292.408599] EXT4-fs (sda1): re-mounted. Opts: 08:44:30 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}], 0x4) 08:44:30 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:30 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:30 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:30 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:30 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}], 0x4) [ 292.673010] XFS (loop2): Invalid superblock magic number [ 292.684586] EXT4-fs (sda1): re-mounted. Opts: 08:44:30 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:30 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:30 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:30 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 292.987849] EXT4-fs (sda1): re-mounted. Opts: 08:44:30 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:30 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) [ 293.046822] XFS (loop2): Invalid superblock magic number 08:44:30 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:30 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:30 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:30 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 293.335832] EXT4-fs (sda1): re-mounted. Opts: 08:44:31 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) 08:44:31 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 293.470932] XFS (loop2): Invalid superblock magic number 08:44:31 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 08:44:31 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 08:44:31 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="78667302", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 293.735004] EXT4-fs (sda1): re-mounted. Opts: 08:44:31 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) 08:44:31 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:31 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:31 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 08:44:31 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 294.091319] EXT4-fs (sda1): re-mounted. Opts: 08:44:31 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) 08:44:31 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 08:44:31 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:31 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 294.296870] EXT4-fs (sda1): re-mounted. Opts: [ 294.400347] XFS (loop2): Invalid superblock magic number 08:44:32 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:32 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:32 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:32 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) 08:44:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="78667301", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:32 executing program 4: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)={0x1, [0x0]}, &(0x7f0000000500)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:32 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:32 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) 08:44:32 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:32 executing program 5: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 08:44:32 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) 08:44:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:32 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) 08:44:32 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:32 executing program 5 (fault-call:5 fault-nth:0): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:32 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:32 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) [ 295.297543] XFS (loop2): Invalid superblock magic number [ 295.384117] FAULT_INJECTION: forcing a failure. [ 295.384117] name failslab, interval 1, probability 0, space 0, times 0 [ 295.406452] CPU: 1 PID: 9901 Comm: syz-executor5 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 295.414884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.414892] Call Trace: [ 295.414922] dump_stack+0x244/0x39d [ 295.414955] ? dump_stack_print_info.cold.1+0x20/0x20 [ 295.435706] ? lock_downgrade+0x900/0x900 [ 295.439889] should_fail.cold.4+0xa/0x17 [ 295.439910] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.439935] ? lock_downgrade+0x900/0x900 [ 295.439958] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 295.453255] ? proc_fail_nth_write+0x9e/0x210 [ 295.453271] ? proc_cwd_link+0x1d0/0x1d0 [ 295.453295] ? find_held_lock+0x36/0x1c0 [ 295.453335] ? cfq_set_request+0x1788/0x1e90 [ 295.453365] ? perf_trace_sched_process_exec+0x860/0x860 [ 295.453387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 295.486878] __should_failslab+0x124/0x180 [ 295.491123] should_failslab+0x9/0x14 [ 295.494933] __kmalloc+0x2e0/0x760 [ 295.498508] ? strncpy_from_user+0x5a0/0x5a0 [ 295.502955] ? fput+0x130/0x1a0 [ 295.506255] ? do_syscall_64+0x9a/0x820 [ 295.510231] ? __x64_sys_memfd_create+0x142/0x4f0 [ 295.515090] ? do_syscall_64+0x9a/0x820 [ 295.519075] __x64_sys_memfd_create+0x142/0x4f0 [ 295.523749] ? memfd_fcntl+0x1910/0x1910 [ 295.527828] do_syscall_64+0x1b9/0x820 [ 295.531721] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 295.537093] ? syscall_return_slowpath+0x5e0/0x5e0 [ 295.542029] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.546880] ? trace_hardirqs_on_caller+0x310/0x310 [ 295.551903] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 295.556964] ? prepare_exit_to_usermode+0x291/0x3b0 [ 295.561990] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.566847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.572036] RIP: 0033:0x457569 [ 295.575237] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.594154] RSP: 002b:00007f41c59d9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 295.601870] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 295.609143] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 295.616418] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 295.623694] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f41c59da6d4 08:44:33 executing program 4: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x5, 0xc65b, 0x9, 0x0, 0x5, 0x1ff, 0x4, 0x0, 0x5}, 0xb) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}, 0xffffffff}, 0x90) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="007b4fd21cb30215ee4e69bc800f2e65bd8018a0f5cc69bcf5ab58c59ce1688681bf"]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) [ 295.630962] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 08:44:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:33 executing program 5 (fault-call:5 fault-nth:1): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:33 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:33 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:33 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) [ 295.847157] XFS (loop2): Invalid superblock magic number [ 295.882235] FAULT_INJECTION: forcing a failure. [ 295.882235] name failslab, interval 1, probability 0, space 0, times 0 [ 295.948241] CPU: 0 PID: 9945 Comm: syz-executor5 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 295.956699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.956707] Call Trace: [ 295.956736] dump_stack+0x244/0x39d [ 295.956763] ? dump_stack_print_info.cold.1+0x20/0x20 [ 295.977567] should_fail.cold.4+0xa/0x17 [ 295.981637] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.986779] ? zap_class+0x640/0x640 [ 295.990500] ? __lock_acquire+0x62f/0x4c20 [ 295.994741] ? lock_downgrade+0x900/0x900 [ 295.998897] ? check_preemption_disabled+0x48/0x280 [ 296.004388] ? find_held_lock+0x36/0x1c0 [ 296.008476] ? expand_files.part.8+0x571/0x9a0 [ 296.013072] ? perf_trace_sched_process_exec+0x860/0x860 [ 296.018534] ? find_held_lock+0x36/0x1c0 [ 296.022607] __should_failslab+0x124/0x180 [ 296.026852] should_failslab+0x9/0x14 [ 296.030665] kmem_cache_alloc+0x2be/0x730 [ 296.034857] ? shmem_destroy_callback+0xc0/0xc0 [ 296.039552] shmem_alloc_inode+0x1b/0x40 [ 296.043623] alloc_inode+0x63/0x190 [ 296.047282] new_inode_pseudo+0x71/0x1a0 [ 296.051352] ? prune_icache_sb+0x1c0/0x1c0 [ 296.055628] ? _raw_spin_unlock+0x2c/0x50 [ 296.059797] new_inode+0x1c/0x40 [ 296.063168] shmem_get_inode+0xf1/0x920 [ 296.067151] ? shmem_encode_fh+0x340/0x340 [ 296.071392] ? lock_downgrade+0x900/0x900 [ 296.075565] ? lock_release+0xa10/0xa10 [ 296.079543] ? perf_trace_sched_process_exec+0x860/0x860 [ 296.085002] ? usercopy_warn+0x110/0x110 [ 296.089085] __shmem_file_setup.part.50+0x83/0x2a0 [ 296.094026] shmem_file_setup+0x65/0x90 [ 296.098006] __x64_sys_memfd_create+0x2af/0x4f0 [ 296.102691] ? memfd_fcntl+0x1910/0x1910 [ 296.107851] do_syscall_64+0x1b9/0x820 [ 296.111740] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 296.117109] ? syscall_return_slowpath+0x5e0/0x5e0 [ 296.122045] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.126897] ? trace_hardirqs_on_caller+0x310/0x310 [ 296.131922] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 296.136947] ? prepare_exit_to_usermode+0x291/0x3b0 [ 296.141978] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.146833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.152021] RIP: 0033:0x457569 [ 296.155236] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.174156] RSP: 002b:00007f41c59d9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 296.181867] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 296.189134] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 296.196401] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 296.203683] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f41c59da6d4 [ 296.210968] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 08:44:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:33 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) 08:44:33 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:34 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:34 executing program 5 (fault-call:5 fault-nth:2): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:34 executing program 4 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 296.456529] XFS (loop2): Invalid superblock magic number [ 296.487489] FAULT_INJECTION: forcing a failure. [ 296.487489] name failslab, interval 1, probability 0, space 0, times 0 [ 296.513594] CPU: 1 PID: 9994 Comm: syz-executor5 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 296.522031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.531388] Call Trace: [ 296.533990] dump_stack+0x244/0x39d [ 296.537614] ? dump_stack_print_info.cold.1+0x20/0x20 [ 296.542801] should_fail.cold.4+0xa/0x17 [ 296.546852] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 296.551955] ? __kernel_text_address+0xd/0x40 [ 296.556485] ? unwind_get_return_address+0x61/0xa0 08:44:34 executing program 1 (fault-call:2 fault-nth:0): setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 296.561451] ? find_held_lock+0x36/0x1c0 [ 296.565540] ? zlib_deflate+0x8d8/0x11e0 [ 296.569638] ? perf_trace_sched_process_exec+0x860/0x860 [ 296.575115] __should_failslab+0x124/0x180 [ 296.579355] should_failslab+0x9/0x14 [ 296.583160] kmem_cache_alloc+0x2be/0x730 [ 296.587303] ? mpol_shared_policy_init+0x235/0x650 [ 296.592221] ? current_time+0x72/0x1b0 [ 296.596100] __d_alloc+0xc8/0xb90 [ 296.599543] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 296.604557] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 296.609576] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 296.614758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.620278] ? timespec64_trunc+0xea/0x180 [ 296.624511] ? inode_init_owner+0x340/0x340 [ 296.628818] ? _raw_spin_unlock+0x2c/0x50 [ 296.632956] ? current_time+0x10b/0x1b0 [ 296.636949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.642476] ? __lockdep_init_map+0x105/0x590 [ 296.646963] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 296.652489] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 296.658049] d_alloc_pseudo+0x1d/0x30 [ 296.661841] alloc_file_pseudo+0x158/0x3f0 [ 296.666066] ? alloc_file+0x4d0/0x4d0 [ 296.669853] ? usercopy_warn+0x110/0x110 [ 296.673911] __shmem_file_setup.part.50+0x110/0x2a0 [ 296.678933] shmem_file_setup+0x65/0x90 [ 296.682894] __x64_sys_memfd_create+0x2af/0x4f0 [ 296.687551] ? memfd_fcntl+0x1910/0x1910 [ 296.691623] do_syscall_64+0x1b9/0x820 [ 296.695522] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 296.700885] ? syscall_return_slowpath+0x5e0/0x5e0 [ 296.705801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.710631] ? trace_hardirqs_on_caller+0x310/0x310 [ 296.715642] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 296.720659] ? prepare_exit_to_usermode+0x291/0x3b0 [ 296.725675] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.730514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.735727] RIP: 0033:0x457569 [ 296.738913] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:44:34 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 296.757814] RSP: 002b:00007f41c59d9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 296.765512] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 296.772765] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 296.780026] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 296.787281] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f41c59da6d4 [ 296.794537] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 08:44:34 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 296.887490] FAULT_INJECTION: forcing a failure. [ 296.887490] name failslab, interval 1, probability 0, space 0, times 0 [ 296.899573] FAULT_INJECTION: forcing a failure. [ 296.899573] name failslab, interval 1, probability 0, space 0, times 0 [ 296.922930] CPU: 1 PID: 10009 Comm: syz-executor4 Not tainted 4.19.0-rc8-next-20181019+ #98 08:44:34 executing program 5 (fault-call:5 fault-nth:3): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 296.931441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.940804] Call Trace: [ 296.943413] dump_stack+0x244/0x39d [ 296.947061] ? dump_stack_print_info.cold.1+0x20/0x20 [ 296.952274] ? lock_downgrade+0x900/0x900 [ 296.956457] should_fail.cold.4+0xa/0x17 [ 296.960539] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 296.965670] ? lock_downgrade+0x900/0x900 [ 296.969840] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 296.975395] ? proc_fail_nth_write+0x9e/0x210 [ 296.979906] ? proc_cwd_link+0x1d0/0x1d0 [ 296.983990] ? find_held_lock+0x36/0x1c0 [ 296.988090] ? perf_trace_sched_process_exec+0x860/0x860 [ 296.993554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.999118] __should_failslab+0x124/0x180 [ 297.003378] should_failslab+0x9/0x14 [ 297.007198] __kmalloc+0x2e0/0x760 [ 297.010751] ? strncpy_from_user+0x5a0/0x5a0 [ 297.015205] ? fput+0x130/0x1a0 [ 297.018502] ? do_syscall_64+0x9a/0x820 [ 297.022489] ? __x64_sys_memfd_create+0x142/0x4f0 [ 297.027347] ? do_syscall_64+0x9a/0x820 [ 297.031338] __x64_sys_memfd_create+0x142/0x4f0 [ 297.036020] ? memfd_fcntl+0x1910/0x1910 [ 297.040102] do_syscall_64+0x1b9/0x820 [ 297.043994] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 297.049368] ? syscall_return_slowpath+0x5e0/0x5e0 [ 297.054302] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.059151] ? trace_hardirqs_on_caller+0x310/0x310 [ 297.064182] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 297.069204] ? prepare_exit_to_usermode+0x291/0x3b0 [ 297.074250] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.079105] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.084300] RIP: 0033:0x457569 [ 297.087502] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.106403] RSP: 002b:00007fd8a7436a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 297.114113] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 297.121382] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 297.128688] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 297.135956] R10: 0000000020000100 R11: 0000000000000246 R12: 00007fd8a74376d4 [ 297.143228] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 297.150743] CPU: 0 PID: 10011 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 297.159253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.168602] Call Trace: [ 297.171200] dump_stack+0x244/0x39d [ 297.174840] ? dump_stack_print_info.cold.1+0x20/0x20 [ 297.180043] ? lock_downgrade+0x900/0x900 [ 297.184249] should_fail.cold.4+0xa/0x17 [ 297.188326] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 297.193470] ? lock_downgrade+0x900/0x900 [ 297.197629] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 297.203203] ? proc_fail_nth_write+0x9e/0x210 [ 297.207709] ? proc_cwd_link+0x1d0/0x1d0 [ 297.211795] ? find_held_lock+0x36/0x1c0 [ 297.215900] ? perf_trace_sched_process_exec+0x860/0x860 [ 297.221376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.226923] __should_failslab+0x124/0x180 [ 297.231171] should_failslab+0x9/0x14 [ 297.234988] __kmalloc+0x2e0/0x760 [ 297.238528] ? strncpy_from_user+0x5a0/0x5a0 [ 297.242965] ? fput+0x130/0x1a0 [ 297.246262] ? do_syscall_64+0x9a/0x820 [ 297.250245] ? __x64_sys_memfd_create+0x142/0x4f0 [ 297.255093] ? do_syscall_64+0x9a/0x820 [ 297.259074] __x64_sys_memfd_create+0x142/0x4f0 [ 297.263748] ? memfd_fcntl+0x1910/0x1910 [ 297.267828] do_syscall_64+0x1b9/0x820 [ 297.271732] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 297.277100] ? syscall_return_slowpath+0x5e0/0x5e0 [ 297.282032] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.286882] ? trace_hardirqs_on_caller+0x310/0x310 [ 297.291909] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 297.296930] ? prepare_exit_to_usermode+0x291/0x3b0 [ 297.301964] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.306819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.312018] RIP: 0033:0x457569 [ 297.315216] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:44:35 executing program 4 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 297.334115] RSP: 002b:00007f7898b84a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 297.341827] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 297.349103] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 297.356389] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 297.363682] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f7898b856d4 [ 297.370955] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 08:44:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfsh', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:35 executing program 1 (fault-call:2 fault-nth:1): setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 297.458796] FAULT_INJECTION: forcing a failure. [ 297.458796] name failslab, interval 1, probability 0, space 0, times 0 [ 297.470855] CPU: 1 PID: 10025 Comm: syz-executor5 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 297.479361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.488718] Call Trace: [ 297.491323] dump_stack+0x244/0x39d [ 297.494977] ? dump_stack_print_info.cold.1+0x20/0x20 [ 297.500210] ? __save_stack_trace+0x8d/0xf0 [ 297.504583] should_fail.cold.4+0xa/0x17 [ 297.508694] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 297.510796] FAULT_INJECTION: forcing a failure. [ 297.510796] name failslab, interval 1, probability 0, space 0, times 0 [ 297.513828] ? save_stack+0x43/0xd0 [ 297.513842] ? kasan_kmalloc+0xc7/0xe0 [ 297.513872] ? percpu_ref_put_many+0x11c/0x260 [ 297.513892] ? zap_class+0x640/0x640 [ 297.513913] ? find_held_lock+0x36/0x1c0 [ 297.513949] ? ubi_io_write.cold.14+0x9/0x208 [ 297.538288] FAULT_INJECTION: forcing a failure. [ 297.538288] name failslab, interval 1, probability 0, space 0, times 0 [ 297.541009] ? perf_trace_sched_process_exec+0x860/0x860 [ 297.541040] ? lock_downgrade+0x900/0x900 [ 297.541078] __should_failslab+0x124/0x180 [ 297.541124] should_failslab+0x9/0x14 [ 297.541140] kmem_cache_alloc+0x2be/0x730 [ 297.541157] ? d_set_d_op+0x31d/0x410 [ 297.541197] __alloc_file+0xa8/0x470 [ 297.590182] ? file_free_rcu+0xd0/0xd0 [ 297.594090] ? d_instantiate+0x79/0xa0 [ 297.597996] ? lock_downgrade+0x900/0x900 [ 297.602194] ? kasan_check_read+0x11/0x20 [ 297.606349] ? do_raw_spin_unlock+0xa7/0x330 [ 297.610771] ? do_raw_spin_trylock+0x270/0x270 [ 297.615387] alloc_empty_file+0x72/0x170 [ 297.619480] alloc_file+0x5e/0x4d0 [ 297.623032] ? _raw_spin_unlock+0x2c/0x50 [ 297.627207] alloc_file_pseudo+0x261/0x3f0 [ 297.631457] ? alloc_file+0x4d0/0x4d0 [ 297.635272] ? usercopy_warn+0x110/0x110 [ 297.639366] __shmem_file_setup.part.50+0x110/0x2a0 [ 297.644398] shmem_file_setup+0x65/0x90 [ 297.648390] __x64_sys_memfd_create+0x2af/0x4f0 [ 297.653069] ? memfd_fcntl+0x1910/0x1910 [ 297.657162] do_syscall_64+0x1b9/0x820 [ 297.661069] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 297.666449] ? syscall_return_slowpath+0x5e0/0x5e0 [ 297.671393] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.676250] ? trace_hardirqs_on_caller+0x310/0x310 [ 297.681320] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 297.686356] ? prepare_exit_to_usermode+0x291/0x3b0 [ 297.691421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.696334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.701538] RIP: 0033:0x457569 [ 297.704765] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.723682] RSP: 002b:00007f41c59d9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 297.731401] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 297.738707] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 297.745983] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 297.753267] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f41c59da6d4 [ 297.760550] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 297.767857] CPU: 0 PID: 10031 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 297.776372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.785735] Call Trace: [ 297.788351] dump_stack+0x244/0x39d [ 297.792009] ? dump_stack_print_info.cold.1+0x20/0x20 [ 297.797280] should_fail.cold.4+0xa/0x17 [ 297.801353] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 297.806469] ? zap_class+0x640/0x640 [ 297.810166] ? __lock_acquire+0x62f/0x4c20 [ 297.814403] ? lock_downgrade+0x900/0x900 [ 297.818537] ? check_preemption_disabled+0x48/0x280 [ 297.823544] ? find_held_lock+0x36/0x1c0 [ 297.827604] ? expand_files.part.8+0x571/0x9a0 [ 297.832176] ? perf_trace_sched_process_exec+0x860/0x860 [ 297.837613] ? find_held_lock+0x36/0x1c0 [ 297.841713] __should_failslab+0x124/0x180 [ 297.845944] should_failslab+0x9/0x14 [ 297.849746] kmem_cache_alloc+0x2be/0x730 [ 297.853890] ? shmem_destroy_callback+0xc0/0xc0 [ 297.858550] shmem_alloc_inode+0x1b/0x40 [ 297.862601] alloc_inode+0x63/0x190 [ 297.866215] new_inode_pseudo+0x71/0x1a0 [ 297.870274] ? prune_icache_sb+0x1c0/0x1c0 [ 297.874497] ? _raw_spin_unlock+0x2c/0x50 [ 297.878633] new_inode+0x1c/0x40 [ 297.881995] shmem_get_inode+0xf1/0x920 [ 297.885959] ? shmem_encode_fh+0x340/0x340 [ 297.890182] ? lock_downgrade+0x900/0x900 [ 297.894321] ? lock_release+0xa10/0xa10 [ 297.898287] ? perf_trace_sched_process_exec+0x860/0x860 [ 297.903727] ? usercopy_warn+0x110/0x110 [ 297.907785] __shmem_file_setup.part.50+0x83/0x2a0 [ 297.912745] shmem_file_setup+0x65/0x90 [ 297.916712] __x64_sys_memfd_create+0x2af/0x4f0 [ 297.921366] ? memfd_fcntl+0x1910/0x1910 [ 297.925434] do_syscall_64+0x1b9/0x820 [ 297.929309] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 297.934665] ? syscall_return_slowpath+0x5e0/0x5e0 [ 297.939598] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.944439] ? trace_hardirqs_on_caller+0x310/0x310 [ 297.949440] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 297.954441] ? prepare_exit_to_usermode+0x291/0x3b0 [ 297.959447] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.964285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.969468] RIP: 0033:0x457569 [ 297.972650] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.991550] RSP: 002b:00007f7898b84a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 297.999245] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 08:44:35 executing program 5 (fault-call:5 fault-nth:4): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 298.006501] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 298.013754] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 298.021018] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f7898b856d4 [ 298.028287] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 298.045844] CPU: 1 PID: 10028 Comm: syz-executor4 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 298.054361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.063720] Call Trace: [ 298.066332] dump_stack+0x244/0x39d [ 298.069983] ? dump_stack_print_info.cold.1+0x20/0x20 [ 298.075207] should_fail.cold.4+0xa/0x17 [ 298.079290] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.084427] ? zap_class+0x640/0x640 [ 298.088158] ? __lock_acquire+0x62f/0x4c20 [ 298.088184] ? lock_downgrade+0x900/0x900 [ 298.088201] ? check_preemption_disabled+0x48/0x280 [ 298.088227] ? find_held_lock+0x36/0x1c0 [ 298.101635] ? trusted_read+0x3d8/0x580 [ 298.101678] ? expand_files.part.8+0x571/0x9a0 [ 298.101697] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.101717] ? find_held_lock+0x36/0x1c0 [ 298.124319] __should_failslab+0x124/0x180 [ 298.128574] should_failslab+0x9/0x14 [ 298.132391] kmem_cache_alloc+0x2be/0x730 [ 298.136575] ? shmem_destroy_callback+0xc0/0xc0 [ 298.141268] shmem_alloc_inode+0x1b/0x40 [ 298.145328] alloc_inode+0x63/0x190 [ 298.148957] new_inode_pseudo+0x71/0x1a0 [ 298.153023] ? prune_icache_sb+0x1c0/0x1c0 [ 298.157264] ? _raw_spin_unlock+0x2c/0x50 [ 298.161420] new_inode+0x1c/0x40 [ 298.164791] shmem_get_inode+0xf1/0x920 [ 298.168776] ? shmem_encode_fh+0x340/0x340 [ 298.173020] ? lock_downgrade+0x900/0x900 [ 298.177180] ? lock_release+0xa10/0xa10 [ 298.181160] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.186626] ? usercopy_warn+0x110/0x110 [ 298.190731] __shmem_file_setup.part.50+0x83/0x2a0 [ 298.195682] shmem_file_setup+0x65/0x90 [ 298.199677] __x64_sys_memfd_create+0x2af/0x4f0 [ 298.204352] ? memfd_fcntl+0x1910/0x1910 [ 298.208428] do_syscall_64+0x1b9/0x820 [ 298.212322] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 298.217731] ? syscall_return_slowpath+0x5e0/0x5e0 [ 298.222684] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.227535] ? trace_hardirqs_on_caller+0x310/0x310 [ 298.232561] ? prepare_exit_to_usermode+0x291/0x3b0 [ 298.237588] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.242443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.247632] RIP: 0033:0x457569 [ 298.250841] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.269742] RSP: 002b:00007fd8a7436a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 298.277450] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 298.284720] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 298.291992] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 298.299259] R10: 0000000020000100 R11: 0000000000000246 R12: 00007fd8a74376d4 08:44:35 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 298.306529] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 08:44:36 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 298.438983] FAULT_INJECTION: forcing a failure. [ 298.438983] name failslab, interval 1, probability 0, space 0, times 0 [ 298.453502] CPU: 0 PID: 10059 Comm: syz-executor5 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 298.462012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.462020] Call Trace: [ 298.462049] dump_stack+0x244/0x39d [ 298.462077] ? dump_stack_print_info.cold.1+0x20/0x20 [ 298.482831] ? lock_downgrade+0x900/0x900 [ 298.486992] ? check_preemption_disabled+0x48/0x280 [ 298.492033] should_fail.cold.4+0xa/0x17 [ 298.496113] ? rcu_softirq_qs+0x20/0x20 [ 298.500103] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.505229] ? is_bpf_text_address+0xd3/0x170 [ 298.509744] ? kernel_text_address+0x79/0xf0 [ 298.514158] ? __kernel_text_address+0xd/0x40 [ 298.518681] ? unwind_get_return_address+0x61/0xa0 [ 298.523641] ? __save_stack_trace+0x8d/0xf0 [ 298.528009] ? find_held_lock+0x36/0x1c0 [ 298.532114] ? nfsd_inject_forget_client+0x398/0x4c0 08:44:36 executing program 1 (fault-call:2 fault-nth:2): setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:36 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 298.537248] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 298.542109] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.547593] __should_failslab+0x124/0x180 [ 298.551850] should_failslab+0x9/0x14 [ 298.555686] kmem_cache_alloc_trace+0x2d7/0x750 [ 298.560380] ? __might_sleep+0x95/0x190 [ 298.564377] apparmor_file_alloc_security+0x17b/0xac0 [ 298.569567] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 298.575141] ? apparmor_path_rename+0xcd0/0xcd0 [ 298.579837] ? rcu_read_lock_sched_held+0x14f/0x180 [ 298.584861] ? kmem_cache_alloc+0x33a/0x730 [ 298.589172] ? d_set_d_op+0x31d/0x410 [ 298.593096] security_file_alloc+0x4c/0xa0 [ 298.597324] __alloc_file+0x12a/0x470 [ 298.601121] ? file_free_rcu+0xd0/0xd0 [ 298.605000] ? d_instantiate+0x79/0xa0 [ 298.608879] ? lock_downgrade+0x900/0x900 [ 298.613022] ? kasan_check_read+0x11/0x20 [ 298.617180] ? do_raw_spin_unlock+0xa7/0x330 [ 298.621591] ? do_raw_spin_trylock+0x270/0x270 [ 298.626184] alloc_empty_file+0x72/0x170 [ 298.630238] alloc_file+0x5e/0x4d0 [ 298.633788] ? _raw_spin_unlock+0x2c/0x50 [ 298.637928] alloc_file_pseudo+0x261/0x3f0 [ 298.642152] ? alloc_file+0x4d0/0x4d0 [ 298.645943] ? usercopy_warn+0x110/0x110 [ 298.650007] __shmem_file_setup.part.50+0x110/0x2a0 [ 298.655026] shmem_file_setup+0x65/0x90 [ 298.658996] __x64_sys_memfd_create+0x2af/0x4f0 [ 298.663678] ? memfd_fcntl+0x1910/0x1910 [ 298.667761] do_syscall_64+0x1b9/0x820 [ 298.671664] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 298.677044] ? syscall_return_slowpath+0x5e0/0x5e0 [ 298.681970] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.686808] ? trace_hardirqs_on_caller+0x310/0x310 [ 298.691815] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 298.696844] ? prepare_exit_to_usermode+0x291/0x3b0 [ 298.701882] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.706734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.711910] RIP: 0033:0x457569 [ 298.715091] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:44:36 executing program 5 (fault-call:5 fault-nth:5): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 298.733985] RSP: 002b:00007f41c59d9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 298.741695] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 298.748949] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 298.756204] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 298.763477] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f41c59da6d4 [ 298.770733] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 08:44:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 298.861810] FAULT_INJECTION: forcing a failure. [ 298.861810] name failslab, interval 1, probability 0, space 0, times 0 [ 298.894785] CPU: 0 PID: 10067 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 298.903324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.912714] Call Trace: [ 298.915326] dump_stack+0x244/0x39d [ 298.918982] ? dump_stack_print_info.cold.1+0x20/0x20 [ 298.924197] should_fail.cold.4+0xa/0x17 [ 298.928281] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.933391] ? __kernel_text_address+0xd/0x40 [ 298.937896] ? unwind_get_return_address+0x61/0xa0 [ 298.942857] ? find_held_lock+0x36/0x1c0 [ 298.946970] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.952440] __should_failslab+0x124/0x180 [ 298.956703] should_failslab+0x9/0x14 [ 298.960546] kmem_cache_alloc+0x2be/0x730 [ 298.964706] ? mpol_shared_policy_init+0x235/0x650 [ 298.969650] ? current_time+0x72/0x1b0 [ 298.973573] __d_alloc+0xc8/0xb90 [ 298.977048] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 298.982094] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 298.987118] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 298.992317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.997861] ? timespec64_trunc+0xea/0x180 [ 299.002100] ? inode_init_owner+0x340/0x340 [ 299.006429] ? _raw_spin_unlock+0x2c/0x50 [ 299.010611] ? current_time+0x10b/0x1b0 [ 299.014592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.020144] ? __lockdep_init_map+0x105/0x590 [ 299.024677] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 299.030243] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 299.035792] d_alloc_pseudo+0x1d/0x30 [ 299.039604] alloc_file_pseudo+0x158/0x3f0 [ 299.043853] ? alloc_file+0x4d0/0x4d0 [ 299.047677] ? usercopy_warn+0x110/0x110 [ 299.051761] __shmem_file_setup.part.50+0x110/0x2a0 [ 299.056789] shmem_file_setup+0x65/0x90 [ 299.060768] __x64_sys_memfd_create+0x2af/0x4f0 [ 299.065441] ? memfd_fcntl+0x1910/0x1910 [ 299.069520] do_syscall_64+0x1b9/0x820 [ 299.073426] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.078813] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.083752] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.088607] ? trace_hardirqs_on_caller+0x310/0x310 [ 299.093628] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 299.098693] ? prepare_exit_to_usermode+0x291/0x3b0 [ 299.103727] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.108583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.113777] RIP: 0033:0x457569 [ 299.116976] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.135876] RSP: 002b:00007f7898b84a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 299.143585] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 299.150859] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 299.158130] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 299.165401] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f7898b856d4 [ 299.172682] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 299.191042] EXT4-fs: 3 callbacks suppressed [ 299.191066] EXT4-fs (sda1): re-mounted. Opts: [ 299.218919] FAULT_INJECTION: forcing a failure. [ 299.218919] name failslab, interval 1, probability 0, space 0, times 0 [ 299.255358] CPU: 1 PID: 10076 Comm: syz-executor5 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 299.263903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.273263] Call Trace: [ 299.275848] dump_stack+0x244/0x39d [ 299.279477] ? dump_stack_print_info.cold.1+0x20/0x20 [ 299.284701] ? find_held_lock+0x36/0x1c0 [ 299.288774] should_fail.cold.4+0xa/0x17 [ 299.292843] ? find_held_lock+0x36/0x1c0 [ 299.296922] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.302048] ? lock_downgrade+0x900/0x900 [ 299.306204] ? current_time+0x72/0x1b0 [ 299.310088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.315627] ? timespec64_trunc+0xea/0x180 [ 299.319876] ? inode_init_owner+0x340/0x340 [ 299.324215] ? find_held_lock+0x36/0x1c0 [ 299.328272] ? ZSTD_adjustCParams+0xc8/0x330 [ 299.332705] ? perf_trace_sched_process_exec+0x860/0x860 [ 299.338183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.343753] __should_failslab+0x124/0x180 [ 299.347994] should_failslab+0x9/0x14 [ 299.351789] kmem_cache_alloc+0x2be/0x730 [ 299.355931] ? do_sys_ftruncate+0x428/0x550 [ 299.360255] ? lock_downgrade+0x900/0x900 [ 299.364395] getname_flags+0xd0/0x590 [ 299.368212] ? __lock_is_held+0xb5/0x140 [ 299.372277] getname+0x19/0x20 [ 299.375472] do_sys_open+0x383/0x700 [ 299.379197] ? filp_open+0x80/0x80 [ 299.382734] ? trace_hardirqs_off_caller+0x300/0x300 [ 299.387827] ? do_sys_ftruncate+0x449/0x550 [ 299.392145] __x64_sys_open+0x7e/0xc0 [ 299.395956] do_syscall_64+0x1b9/0x820 [ 299.399843] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.405211] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.410133] ? trace_hardirqs_on_caller+0x310/0x310 [ 299.415148] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 299.420164] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 299.426853] ? __switch_to_asm+0x40/0x70 [ 299.430930] ? __switch_to_asm+0x34/0x70 [ 299.435009] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.439872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.445074] RIP: 0033:0x4111a1 [ 299.448280] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 299.467177] RSP: 002b:00007f41c59b8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 299.474883] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 299.482154] RDX: 00007f41c59b8afa RSI: 0000000000000002 RDI: 00007f41c59b8af0 [ 299.489433] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 299.496695] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 299.503960] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:44:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="8cffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:37 executing program 5 (fault-call:5 fault-nth:6): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:37 executing program 1 (fault-call:2 fault-nth:3): setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 299.676279] FAULT_INJECTION: forcing a failure. [ 299.676279] name failslab, interval 1, probability 0, space 0, times 0 [ 299.694087] FAULT_INJECTION: forcing a failure. [ 299.694087] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 299.705918] CPU: 1 PID: 10104 Comm: syz-executor5 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 299.714416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.723781] Call Trace: [ 299.726399] dump_stack+0x244/0x39d [ 299.730061] ? dump_stack_print_info.cold.1+0x20/0x20 [ 299.735285] should_fail.cold.4+0xa/0x17 [ 299.739387] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.744505] ? print_usage_bug+0xc0/0xc0 [ 299.748601] ? mark_held_locks+0x130/0x130 [ 299.752851] ? zap_class+0x640/0x640 [ 299.756586] ? print_usage_bug+0xc0/0xc0 [ 299.760701] ? zap_class+0x640/0x640 [ 299.764435] ? lock_downgrade+0x900/0x900 [ 299.768599] ? check_preemption_disabled+0x48/0x280 [ 299.773652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.779226] ? should_fail+0x22d/0xd01 [ 299.783188] ? find_held_lock+0x36/0x1c0 [ 299.783209] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.783236] __alloc_pages_nodemask+0x34b/0xdd0 [ 299.783250] ? current_time+0x72/0x1b0 [ 299.783273] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 299.783289] ? inode_init_owner+0x340/0x340 [ 299.783316] ? find_held_lock+0x36/0x1c0 [ 299.792492] ? ext4_mark_iloc_dirty+0x14e8/0x2ee0 [ 299.792528] ? trace_hardirqs_off+0xb8/0x310 [ 299.792550] cache_grow_begin+0xa5/0x8c0 [ 299.792569] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.792588] ? check_preemption_disabled+0x48/0x280 [ 299.838361] kmem_cache_alloc+0x66b/0x730 [ 299.842531] ? do_sys_ftruncate+0x428/0x550 [ 299.846881] getname_flags+0xd0/0x590 [ 299.850710] ? __lock_is_held+0xb5/0x140 [ 299.854797] getname+0x19/0x20 [ 299.858005] do_sys_open+0x383/0x700 [ 299.861747] ? filp_open+0x80/0x80 [ 299.865314] ? trace_hardirqs_off_caller+0x300/0x300 [ 299.870433] ? do_sys_ftruncate+0x449/0x550 [ 299.874775] __x64_sys_open+0x7e/0xc0 [ 299.878603] do_syscall_64+0x1b9/0x820 [ 299.882509] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.887896] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.891403] XFS (loop2): Invalid superblock magic number [ 299.892837] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.892859] ? trace_hardirqs_on_caller+0x310/0x310 [ 299.892877] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 299.892898] ? prepare_exit_to_usermode+0x291/0x3b0 [ 299.918238] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.923104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.928322] RIP: 0033:0x4111a1 [ 299.931531] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 299.950443] RSP: 002b:00007f41c59d9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 299.958163] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 299.965461] RDX: 00007f41c59d9afa RSI: 0000000000000002 RDI: 00007f41c59d9af0 [ 299.972754] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 299.980030] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 299.987307] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 299.994615] CPU: 0 PID: 10103 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 300.003593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.003604] Call Trace: [ 300.015558] dump_stack+0x244/0x39d [ 300.019207] ? dump_stack_print_info.cold.1+0x20/0x20 [ 300.019227] ? __save_stack_trace+0x8d/0xf0 [ 300.019252] should_fail.cold.4+0xa/0x17 [ 300.032808] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 300.037919] ? save_stack+0x43/0xd0 [ 300.041545] ? kasan_kmalloc+0xc7/0xe0 [ 300.045451] ? percpu_ref_put_many+0x11c/0x260 [ 300.050063] ? zap_class+0x640/0x640 [ 300.053786] ? find_held_lock+0x36/0x1c0 [ 300.057881] ? perf_trace_sched_process_exec+0x860/0x860 [ 300.063338] ? lock_downgrade+0x900/0x900 [ 300.067496] __should_failslab+0x124/0x180 [ 300.071744] should_failslab+0x9/0x14 [ 300.075557] kmem_cache_alloc+0x2be/0x730 [ 300.079709] ? d_set_d_op+0x31d/0x410 [ 300.083526] __alloc_file+0xa8/0x470 [ 300.087258] ? file_free_rcu+0xd0/0xd0 [ 300.091147] ? d_instantiate+0x79/0xa0 [ 300.095040] ? lock_downgrade+0x900/0x900 [ 300.099200] ? kasan_check_read+0x11/0x20 [ 300.103356] ? do_raw_spin_unlock+0xa7/0x330 [ 300.108734] ? do_raw_spin_trylock+0x270/0x270 [ 300.113327] alloc_empty_file+0x72/0x170 [ 300.117395] alloc_file+0x5e/0x4d0 [ 300.120937] ? _raw_spin_unlock+0x2c/0x50 [ 300.125095] alloc_file_pseudo+0x261/0x3f0 [ 300.129342] ? alloc_file+0x4d0/0x4d0 [ 300.133154] ? usercopy_warn+0x110/0x110 [ 300.137249] __shmem_file_setup.part.50+0x110/0x2a0 [ 300.142276] shmem_file_setup+0x65/0x90 [ 300.146282] __x64_sys_memfd_create+0x2af/0x4f0 [ 300.150955] ? memfd_fcntl+0x1910/0x1910 [ 300.155036] do_syscall_64+0x1b9/0x820 [ 300.158925] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 300.164307] ? syscall_return_slowpath+0x5e0/0x5e0 [ 300.169253] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.174101] ? trace_hardirqs_on_caller+0x310/0x310 [ 300.179123] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 300.184146] ? prepare_exit_to_usermode+0x291/0x3b0 [ 300.189193] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.194047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.199239] RIP: 0033:0x457569 [ 300.202447] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:44:37 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:37 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 300.221367] RSP: 002b:00007f7898b84a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 300.229087] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 300.236364] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 300.243642] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 300.250934] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f7898b856d4 [ 300.258218] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 300.269038] EXT4-fs (sda1): re-mounted. Opts: 08:44:38 executing program 1 (fault-call:2 fault-nth:4): setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 300.319417] EXT4-fs (sda1): re-mounted. Opts: [ 300.335570] EXT4-fs (sda1): re-mounted. Opts: 08:44:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0300000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:38 executing program 5 (fault-call:5 fault-nth:7): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 300.489971] FAULT_INJECTION: forcing a failure. [ 300.489971] name failslab, interval 1, probability 0, space 0, times 0 08:44:38 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 300.576066] CPU: 0 PID: 10145 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 300.584622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.594025] Call Trace: [ 300.596665] dump_stack+0x244/0x39d [ 300.600353] ? dump_stack_print_info.cold.1+0x20/0x20 [ 300.605566] ? lock_downgrade+0x900/0x900 [ 300.609734] ? check_preemption_disabled+0x48/0x280 [ 300.614779] should_fail.cold.4+0xa/0x17 [ 300.618861] ? rcu_softirq_qs+0x20/0x20 [ 300.622850] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 300.627989] ? is_bpf_text_address+0xd3/0x170 [ 300.632510] ? kernel_text_address+0x79/0xf0 [ 300.636943] ? __kernel_text_address+0xd/0x40 [ 300.641462] ? unwind_get_return_address+0x61/0xa0 [ 300.646403] ? __save_stack_trace+0x8d/0xf0 [ 300.650736] ? find_held_lock+0x36/0x1c0 [ 300.654814] ? perf_event_free_task+0xd8/0x650 [ 300.659412] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 300.664258] ? perf_trace_sched_process_exec+0x860/0x860 [ 300.669725] __should_failslab+0x124/0x180 [ 300.673991] should_failslab+0x9/0x14 [ 300.677802] kmem_cache_alloc_trace+0x2d7/0x750 [ 300.682478] ? __might_sleep+0x95/0x190 [ 300.686464] apparmor_file_alloc_security+0x17b/0xac0 [ 300.691676] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 300.697226] ? apparmor_path_rename+0xcd0/0xcd0 [ 300.701906] ? rcu_read_lock_sched_held+0x14f/0x180 [ 300.706931] ? kmem_cache_alloc+0x33a/0x730 [ 300.711260] ? d_set_d_op+0x31d/0x410 [ 300.715077] security_file_alloc+0x4c/0xa0 [ 300.719325] __alloc_file+0x12a/0x470 [ 300.723132] ? file_free_rcu+0xd0/0xd0 [ 300.727022] ? d_instantiate+0x79/0xa0 [ 300.730914] ? lock_downgrade+0x900/0x900 [ 300.735078] ? kasan_check_read+0x11/0x20 [ 300.739231] ? do_raw_spin_unlock+0xa7/0x330 [ 300.743643] ? do_raw_spin_trylock+0x270/0x270 [ 300.748256] alloc_empty_file+0x72/0x170 [ 300.752327] alloc_file+0x5e/0x4d0 [ 300.755868] ? _raw_spin_unlock+0x2c/0x50 [ 300.760024] alloc_file_pseudo+0x261/0x3f0 [ 300.764268] ? alloc_file+0x4d0/0x4d0 [ 300.768081] ? usercopy_warn+0x110/0x110 [ 300.772159] __shmem_file_setup.part.50+0x110/0x2a0 [ 300.777190] shmem_file_setup+0x65/0x90 [ 300.781175] __x64_sys_memfd_create+0x2af/0x4f0 [ 300.785854] ? memfd_fcntl+0x1910/0x1910 [ 300.789935] do_syscall_64+0x1b9/0x820 [ 300.793826] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 300.799210] ? syscall_return_slowpath+0x5e0/0x5e0 [ 300.804143] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.809006] ? trace_hardirqs_on_caller+0x310/0x310 [ 300.814050] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 300.819087] ? prepare_exit_to_usermode+0x291/0x3b0 [ 300.824131] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.828995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.834211] RIP: 0033:0x457569 [ 300.837425] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.856325] RSP: 002b:00007f7898b84a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 300.864035] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 08:44:38 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 300.871302] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 300.878574] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 300.885844] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f7898b856d4 [ 300.893127] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 300.913111] FAULT_INJECTION: forcing a failure. [ 300.913111] name failslab, interval 1, probability 0, space 0, times 0 [ 300.924741] CPU: 0 PID: 10154 Comm: syz-executor5 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 300.933245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.933253] Call Trace: [ 300.933281] dump_stack+0x244/0x39d [ 300.933309] ? dump_stack_print_info.cold.1+0x20/0x20 [ 300.933329] ? print_usage_bug+0xc0/0xc0 [ 300.933356] should_fail.cold.4+0xa/0x17 [ 300.933373] ? find_held_lock+0x36/0x1c0 [ 300.933402] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 300.933428] ? lock_downgrade+0x900/0x900 [ 300.933443] ? check_preemption_disabled+0x48/0x280 [ 300.933470] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 300.971558] ? kasan_check_read+0x11/0x20 [ 300.971587] ? find_held_lock+0x36/0x1c0 [ 300.971627] ? perf_trace_sched_process_exec+0x860/0x860 [ 300.971676] __should_failslab+0x124/0x180 [ 300.980835] should_failslab+0x9/0x14 [ 300.980853] kmem_cache_alloc+0x2be/0x730 [ 300.980867] ? zap_class+0x640/0x640 [ 300.980887] ? print_usage_bug+0xc0/0xc0 [ 300.994010] ? mark_held_locks+0x130/0x130 [ 301.008014] __alloc_file+0xa8/0x470 [ 301.008034] ? file_free_rcu+0xd0/0xd0 [ 301.008052] ? find_held_lock+0x36/0x1c0 [ 301.008081] ? is_bpf_text_address+0xac/0x170 [ 301.040369] ? lock_downgrade+0x900/0x900 [ 301.044532] ? check_preemption_disabled+0x48/0x280 [ 301.049574] alloc_empty_file+0x72/0x170 [ 301.053667] path_openat+0x170/0x5150 [ 301.057499] ? rcu_softirq_qs+0x20/0x20 [ 301.057686] EXT4-fs (sda1): re-mounted. Opts: [ 301.061487] ? unwind_dump+0x190/0x190 [ 301.061516] ? zap_class+0x640/0x640 [ 301.061537] ? path_lookupat.isra.43+0xc00/0xc00 [ 301.061551] ? unwind_get_return_address+0x61/0xa0 [ 301.061569] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 301.061591] ? expand_files.part.8+0x571/0x9a0 [ 301.088448] ? find_held_lock+0x36/0x1c0 [ 301.088476] ? __alloc_fd+0x347/0x6e0 [ 301.088495] ? lock_downgrade+0x900/0x900 [ 301.088515] ? getname+0x19/0x20 [ 301.097189] ? kasan_check_read+0x11/0x20 [ 301.097206] ? do_raw_spin_unlock+0xa7/0x330 [ 301.097223] ? do_raw_spin_trylock+0x270/0x270 [ 301.097239] ? __lock_is_held+0xb5/0x140 [ 301.097260] ? __check_object_size+0xb1/0x782 [ 301.130224] ? _raw_spin_unlock+0x2c/0x50 [ 301.134369] ? __alloc_fd+0x347/0x6e0 [ 301.138199] do_filp_open+0x255/0x380 [ 301.141992] ? may_open_dev+0x100/0x100 [ 301.145965] ? get_unused_fd_flags+0x122/0x1a0 [ 301.150534] ? __alloc_fd+0x6e0/0x6e0 [ 301.154327] ? __lock_is_held+0xb5/0x140 [ 301.158386] do_sys_open+0x568/0x700 [ 301.162108] ? filp_open+0x80/0x80 [ 301.165642] ? trace_hardirqs_off_caller+0x300/0x300 [ 301.170785] ? do_sys_ftruncate+0x449/0x550 [ 301.175128] __x64_sys_open+0x7e/0xc0 [ 301.178938] do_syscall_64+0x1b9/0x820 [ 301.182816] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 301.188169] ? syscall_return_slowpath+0x5e0/0x5e0 [ 301.193094] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.197942] ? trace_hardirqs_on_caller+0x310/0x310 [ 301.202964] ? prepare_exit_to_usermode+0x291/0x3b0 [ 301.207971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.212808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.217985] RIP: 0033:0x4111a1 [ 301.221167] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 301.240069] RSP: 002b:00007f41c59d9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 301.247785] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 301.255054] RDX: 00007f41c59d9afa RSI: 0000000000000002 RDI: 00007f41c59d9af0 [ 301.262317] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 301.269617] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 301.276880] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:44:38 executing program 5 (fault-call:5 fault-nth:8): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:39 executing program 1 (fault-call:2 fault-nth:5): setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 301.319376] XFS (loop2): Invalid superblock magic number [ 301.357942] EXT4-fs (sda1): re-mounted. Opts: 08:44:39 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:39 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0003000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:39 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 301.481128] FAULT_INJECTION: forcing a failure. [ 301.481128] name failslab, interval 1, probability 0, space 0, times 0 [ 301.500810] FAULT_INJECTION: forcing a failure. [ 301.500810] name failslab, interval 1, probability 0, space 0, times 0 [ 301.558301] CPU: 0 PID: 10192 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 301.566844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.576202] Call Trace: [ 301.578809] dump_stack+0x244/0x39d [ 301.582455] ? dump_stack_print_info.cold.1+0x20/0x20 [ 301.587666] ? find_held_lock+0x36/0x1c0 [ 301.591768] should_fail.cold.4+0xa/0x17 [ 301.595836] ? find_held_lock+0x36/0x1c0 [ 301.599909] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 301.605027] ? lock_downgrade+0x900/0x900 [ 301.609181] ? current_time+0x72/0x1b0 [ 301.613079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.618637] ? timespec64_trunc+0xea/0x180 [ 301.622888] ? inode_init_owner+0x340/0x340 [ 301.627223] ? find_held_lock+0x36/0x1c0 [ 301.631308] ? btrfs_defrag_leaves+0x158/0x11d0 [ 301.635991] ? perf_trace_sched_process_exec+0x860/0x860 [ 301.641450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.647011] __should_failslab+0x124/0x180 [ 301.651256] should_failslab+0x9/0x14 [ 301.655060] kmem_cache_alloc+0x2be/0x730 [ 301.659211] ? do_sys_ftruncate+0x428/0x550 [ 301.663550] ? lock_downgrade+0x900/0x900 [ 301.667714] getname_flags+0xd0/0x590 [ 301.671538] ? __lock_is_held+0xb5/0x140 [ 301.675605] getname+0x19/0x20 [ 301.678805] do_sys_open+0x383/0x700 [ 301.682526] ? filp_open+0x80/0x80 [ 301.686073] ? trace_hardirqs_off_caller+0x300/0x300 [ 301.691179] ? do_sys_ftruncate+0x449/0x550 [ 301.695513] __x64_sys_open+0x7e/0xc0 [ 301.699326] do_syscall_64+0x1b9/0x820 [ 301.703219] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 301.708612] ? syscall_return_slowpath+0x5e0/0x5e0 [ 301.713545] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.718394] ? trace_hardirqs_on_caller+0x310/0x310 [ 301.723415] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 301.728440] ? prepare_exit_to_usermode+0x291/0x3b0 [ 301.733468] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.738333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.743521] RIP: 0033:0x4111a1 [ 301.746731] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 301.765631] RSP: 002b:00007f7898b84a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 301.773359] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 301.780634] RDX: 00007f7898b84afa RSI: 0000000000000002 RDI: 00007f7898b84af0 [ 301.787916] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 301.795185] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 301.802455] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 301.836067] CPU: 1 PID: 10194 Comm: syz-executor5 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 301.844603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.853965] Call Trace: [ 301.856581] dump_stack+0x244/0x39d [ 301.860237] ? dump_stack_print_info.cold.1+0x20/0x20 [ 301.865465] ? lock_downgrade+0x900/0x900 [ 301.869622] ? check_preemption_disabled+0x48/0x280 [ 301.874649] should_fail.cold.4+0xa/0x17 [ 301.878729] ? rcu_softirq_qs+0x20/0x20 [ 301.882712] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 301.887828] ? is_bpf_text_address+0xd3/0x170 [ 301.892332] ? kernel_text_address+0x79/0xf0 [ 301.896765] ? __kernel_text_address+0xd/0x40 [ 301.901269] ? unwind_get_return_address+0x61/0xa0 [ 301.906216] ? __save_stack_trace+0x8d/0xf0 [ 301.910547] ? find_held_lock+0x36/0x1c0 [ 301.914643] ? do_syscall_64+0x1b9/0x820 [ 301.918727] ? perf_trace_sched_process_exec+0x860/0x860 [ 301.924203] __should_failslab+0x124/0x180 [ 301.928467] should_failslab+0x9/0x14 [ 301.932278] kmem_cache_alloc_trace+0x2d7/0x750 [ 301.936953] ? __might_sleep+0x95/0x190 [ 301.940941] apparmor_file_alloc_security+0x17b/0xac0 [ 301.946139] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 301.951698] ? apparmor_path_rename+0xcd0/0xcd0 [ 301.956382] ? rcu_read_lock_sched_held+0x14f/0x180 [ 301.961410] ? kmem_cache_alloc+0x33a/0x730 [ 301.965733] ? zap_class+0x640/0x640 [ 301.969471] security_file_alloc+0x4c/0xa0 [ 301.973719] __alloc_file+0x12a/0x470 [ 301.977528] ? file_free_rcu+0xd0/0xd0 [ 301.981425] ? find_held_lock+0x36/0x1c0 [ 301.985516] ? is_bpf_text_address+0xac/0x170 [ 301.990016] ? lock_downgrade+0x900/0x900 [ 301.994167] ? check_preemption_disabled+0x48/0x280 [ 301.999205] alloc_empty_file+0x72/0x170 [ 302.003428] path_openat+0x170/0x5150 [ 302.007239] ? rcu_softirq_qs+0x20/0x20 [ 302.011218] ? unwind_dump+0x190/0x190 [ 302.015122] ? zap_class+0x640/0x640 [ 302.018842] ? path_lookupat.isra.43+0xc00/0xc00 [ 302.023604] ? unwind_get_return_address+0x61/0xa0 [ 302.028543] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 302.033567] ? expand_files.part.8+0x571/0x9a0 [ 302.038159] ? find_held_lock+0x36/0x1c0 [ 302.042237] ? __alloc_fd+0x347/0x6e0 [ 302.046064] ? lock_downgrade+0x900/0x900 [ 302.050214] ? getname+0x19/0x20 [ 302.053609] ? kasan_check_read+0x11/0x20 [ 302.057765] ? do_raw_spin_unlock+0xa7/0x330 [ 302.062186] ? do_raw_spin_trylock+0x270/0x270 [ 302.066778] ? __lock_is_held+0xb5/0x140 [ 302.070842] ? __check_object_size+0xb1/0x782 [ 302.075369] ? _raw_spin_unlock+0x2c/0x50 [ 302.079522] ? __alloc_fd+0x347/0x6e0 [ 302.083339] do_filp_open+0x255/0x380 [ 302.087148] ? may_open_dev+0x100/0x100 [ 302.091143] ? get_unused_fd_flags+0x122/0x1a0 [ 302.095738] ? __alloc_fd+0x6e0/0x6e0 [ 302.099554] ? __lock_is_held+0xb5/0x140 [ 302.103630] do_sys_open+0x568/0x700 [ 302.107365] ? filp_open+0x80/0x80 [ 302.111388] ? trace_hardirqs_off_caller+0x300/0x300 [ 302.116502] ? do_sys_ftruncate+0x449/0x550 [ 302.120830] __x64_sys_open+0x7e/0xc0 [ 302.124645] do_syscall_64+0x1b9/0x820 [ 302.128549] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 302.133921] ? syscall_return_slowpath+0x5e0/0x5e0 [ 302.138853] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.143706] ? trace_hardirqs_on_caller+0x310/0x310 [ 302.148728] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 302.153750] ? prepare_exit_to_usermode+0x291/0x3b0 [ 302.158777] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.163632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.168835] RIP: 0033:0x4111a1 [ 302.172038] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 302.190938] RSP: 002b:00007f41c59d9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 302.198647] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 302.205928] RDX: 00007f41c59d9afa RSI: 0000000000000002 RDI: 00007f41c59d9af0 [ 302.213201] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 302.220473] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 302.227744] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 302.343060] EXT4-fs (sda1): re-mounted. Opts: 08:44:40 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:40 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:40 executing program 5 (fault-call:5 fault-nth:9): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:40 executing program 1 (fault-call:2 fault-nth:6): setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 302.382360] XFS (loop2): Invalid superblock magic number [ 302.407835] EXT4-fs (sda1): re-mounted. Opts: 08:44:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="007a000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 302.536253] FAULT_INJECTION: forcing a failure. [ 302.536253] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 302.548094] CPU: 1 PID: 10257 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 302.556592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.565954] Call Trace: [ 302.568571] dump_stack+0x244/0x39d [ 302.572225] ? dump_stack_print_info.cold.1+0x20/0x20 [ 302.577433] should_fail.cold.4+0xa/0x17 [ 302.581502] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.586610] ? print_usage_bug+0xc0/0xc0 [ 302.590697] ? mark_held_locks+0x130/0x130 [ 302.594939] ? zap_class+0x640/0x640 [ 302.598670] ? print_usage_bug+0xc0/0xc0 [ 302.602743] ? zap_class+0x640/0x640 [ 302.606461] ? lock_downgrade+0x900/0x900 [ 302.610609] ? check_preemption_disabled+0x48/0x280 [ 302.615649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.621206] ? should_fail+0x22d/0xd01 [ 302.625094] ? find_held_lock+0x36/0x1c0 [ 302.629160] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.634284] __alloc_pages_nodemask+0x34b/0xdd0 [ 302.638954] ? current_time+0x72/0x1b0 [ 302.642855] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 302.647874] ? inode_init_owner+0x340/0x340 [ 302.652216] ? find_held_lock+0x36/0x1c0 [ 302.656303] ? trace_hardirqs_off+0xb8/0x310 [ 302.660743] cache_grow_begin+0xa5/0x8c0 [ 302.664818] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.670363] ? check_preemption_disabled+0x48/0x280 [ 302.675394] kmem_cache_alloc+0x66b/0x730 [ 302.679546] ? do_sys_ftruncate+0x428/0x550 [ 302.683883] getname_flags+0xd0/0x590 [ 302.687694] ? __lock_is_held+0xb5/0x140 [ 302.691765] getname+0x19/0x20 [ 302.694970] do_sys_open+0x383/0x700 [ 302.698698] ? filp_open+0x80/0x80 [ 302.702249] ? trace_hardirqs_off_caller+0x300/0x300 [ 302.707355] ? do_sys_ftruncate+0x449/0x550 [ 302.711690] __x64_sys_open+0x7e/0xc0 [ 302.715506] do_syscall_64+0x1b9/0x820 [ 302.719400] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 302.724771] ? syscall_return_slowpath+0x5e0/0x5e0 [ 302.729702] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.734555] ? trace_hardirqs_on_caller+0x310/0x310 [ 302.739580] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 302.744618] ? prepare_exit_to_usermode+0x291/0x3b0 [ 302.749647] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.754512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.759704] RIP: 0033:0x4111a1 [ 302.762904] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 08:44:40 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 302.781807] RSP: 002b:00007f7898b84a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 302.789514] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 302.796782] RDX: 00007f7898b84afa RSI: 0000000000000002 RDI: 00007f7898b84af0 [ 302.804050] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 302.811322] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 302.818591] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 302.891592] FAULT_INJECTION: forcing a failure. [ 302.891592] name failslab, interval 1, probability 0, space 0, times 0 [ 302.927873] CPU: 0 PID: 10252 Comm: syz-executor5 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 302.936387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.936395] Call Trace: [ 302.936425] dump_stack+0x244/0x39d [ 302.936453] ? dump_stack_print_info.cold.1+0x20/0x20 [ 302.957890] should_fail.cold.4+0xa/0x17 [ 302.961970] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.967086] ? __lock_is_held+0xb5/0x140 [ 302.967101] ? zap_class+0x640/0x640 [ 302.967123] ? enqueue_entity+0x34b/0x20d0 [ 302.979123] ? zap_class+0x640/0x640 [ 302.982852] ? print_usage_bug+0xc0/0xc0 [ 302.982870] ? __account_cfs_rq_runtime+0x790/0x790 [ 302.982892] ? find_held_lock+0x36/0x1c0 [ 302.982914] ? __lock_is_held+0xb5/0x140 [ 302.982946] ? perf_trace_sched_process_exec+0x860/0x860 [ 303.005583] __should_failslab+0x124/0x180 [ 303.009841] should_failslab+0x9/0x14 [ 303.010546] EXT4-fs (sda1): re-mounted. Opts: [ 303.013670] kmem_cache_alloc+0x2be/0x730 [ 303.013702] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 303.013724] __kernfs_new_node+0x127/0x8d0 [ 303.013745] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 303.013777] ? zap_class+0x640/0x640 [ 303.040192] ? print_usage_bug+0xc0/0xc0 [ 303.044270] ? zap_class+0x640/0x640 [ 303.048003] ? trace_hardirqs_on+0xbd/0x310 [ 303.052365] ? kasan_check_read+0x11/0x20 [ 303.056539] ? find_held_lock+0x36/0x1c0 [ 303.060633] kernfs_new_node+0x95/0x120 [ 303.064645] kernfs_create_dir_ns+0x4d/0x160 [ 303.069098] internal_create_group+0x5fc/0xd80 [ 303.073727] ? remove_files.isra.1+0x190/0x190 [ 303.078323] ? up_write+0x7b/0x220 [ 303.081880] ? down_write_nested+0x130/0x130 [ 303.086303] ? down_read+0x120/0x120 [ 303.090043] sysfs_create_group+0x1f/0x30 [ 303.094212] lo_ioctl+0x1307/0x1d60 [ 303.097860] ? lo_rw_aio+0x1ef0/0x1ef0 [ 303.101767] blkdev_ioctl+0x9ac/0x2010 [ 303.105686] ? blkpg_ioctl+0xc10/0xc10 [ 303.109613] ? lock_downgrade+0x900/0x900 [ 303.113792] ? check_preemption_disabled+0x48/0x280 [ 303.118831] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 303.123798] ? kasan_check_read+0x11/0x20 [ 303.127967] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 303.133263] ? rcu_softirq_qs+0x20/0x20 [ 303.137264] ? __fget+0x4d1/0x740 [ 303.140743] ? ksys_dup3+0x680/0x680 [ 303.144486] block_ioctl+0xee/0x130 [ 303.148133] ? blkdev_fallocate+0x400/0x400 [ 303.152472] do_vfs_ioctl+0x1de/0x1720 [ 303.156380] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 303.161937] ? ioctl_preallocate+0x300/0x300 [ 303.166383] ? __fget_light+0x2e9/0x430 [ 303.170403] ? fget_raw+0x20/0x20 [ 303.173895] ? rcu_read_lock_sched_held+0x14f/0x180 [ 303.178932] ? kmem_cache_free+0x24f/0x290 [ 303.183185] ? putname+0xf7/0x130 [ 303.186656] ? do_syscall_64+0x9a/0x820 [ 303.190686] ? do_syscall_64+0x9a/0x820 [ 303.194700] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 303.199307] ? security_file_ioctl+0x94/0xc0 [ 303.203736] ksys_ioctl+0xa9/0xd0 [ 303.207209] __x64_sys_ioctl+0x73/0xb0 [ 303.211116] do_syscall_64+0x1b9/0x820 [ 303.215022] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 303.220400] ? syscall_return_slowpath+0x5e0/0x5e0 [ 303.225346] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.230209] ? trace_hardirqs_on_caller+0x310/0x310 [ 303.235242] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 303.240278] ? prepare_exit_to_usermode+0x291/0x3b0 [ 303.245317] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.250188] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.255392] RIP: 0033:0x4573d7 [ 303.258603] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.277527] RSP: 002b:00007f41c59d9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 303.285248] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 08:44:40 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 303.292531] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 303.299811] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 303.307094] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 303.314372] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:44:41 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 303.378322] EXT4-fs (sda1): re-mounted. Opts: 08:44:41 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0800000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 303.498040] XFS (loop2): Invalid superblock magic number 08:44:41 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:41 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:41 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:41 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000004080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:41 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0700000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:41 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="f8f73f0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:41 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000008000000095000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:41 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="ffffff9780", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:41 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 304.048692] XFS (loop2): Invalid superblock magic number 08:44:41 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="786673f6", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 304.230997] EXT4-fs: 4 callbacks suppressed [ 304.231008] EXT4-fs (sda1): re-mounted. Opts: [ 304.255727] EXT4-fs (sda1): re-mounted. Opts: 08:44:41 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000008000000095000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:42 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000008000000095000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 304.364076] EXT4-fs (sda1): re-mounted. Opts: 08:44:42 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="c000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:42 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000004c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:42 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="786673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 304.635777] EXT4-fs (sda1): re-mounted. Opts: 08:44:42 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000008000000095000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 304.696552] EXT4-fs (sda1): re-mounted. Opts: 08:44:42 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 304.772956] EXT4-fs (sda1): re-mounted. Opts: 08:44:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="7400000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:42 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000480", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:42 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="510d000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:42 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:42 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 305.028899] EXT4-fs (sda1): re-mounted. Opts: [ 305.081824] EXT4-fs (sda1): re-mounted. Opts: 08:44:42 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000780", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:42 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffdfc80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 305.182098] EXT4-fs (sda1): re-mounted. Opts: 08:44:42 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 305.223189] XFS (loop2): Invalid superblock magic number 08:44:42 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0068000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:43 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="786673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 305.484291] EXT4-fs (sda1): re-mounted. Opts: 08:44:43 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:43 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:43 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000007480", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:43 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffff580", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0048000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:43 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:43 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 08:44:43 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/169, 0xa9}], 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:43 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="001f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:43 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="fffffdfc80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000580", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 306.079958] XFS (loop2): Invalid superblock magic number 08:44:43 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fcfdffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:43 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:43 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 08:44:43 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="78667305", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:44 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0048000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000007a80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:44 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:44 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffff680", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:44 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 08:44:44 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0500000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:44 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="78667304", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:44 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffff8c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:44 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0005000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:44 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="ffffff8c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:44 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 08:44:44 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="786673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:44 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:44 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="003ff7f880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0040000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:45 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 08:44:45 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0007000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:45 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:45 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:45 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 08:44:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="4c00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:45 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000380", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:45 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0700000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:45 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000b40)=""/240, 0xf0}], 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 307.798507] XFS (loop2): Invalid superblock magic number 08:44:45 executing program 3 (fault-call:1 fault-nth:0): mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:45 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 308.044817] FAULT_INJECTION: forcing a failure. [ 308.044817] name failslab, interval 1, probability 0, space 0, times 0 08:44:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="f8f73f0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 308.135422] CPU: 0 PID: 10938 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 308.143962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.153317] Call Trace: [ 308.153350] dump_stack+0x244/0x39d [ 308.153392] ? dump_stack_print_info.cold.1+0x20/0x20 [ 308.153419] ? lock_downgrade+0x900/0x900 [ 308.159651] should_fail.cold.4+0xa/0x17 [ 308.159691] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 308.178212] ? lock_downgrade+0x900/0x900 [ 308.182394] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 308.187949] ? proc_fail_nth_write+0x9e/0x210 [ 308.192459] ? proc_cwd_link+0x1d0/0x1d0 [ 308.196554] ? find_held_lock+0x36/0x1c0 [ 308.200638] ? __kprobes_text_end+0x7c50/0x92d8 [ 308.205344] ? perf_trace_sched_process_exec+0x860/0x860 [ 308.210802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.216352] __should_failslab+0x124/0x180 [ 308.220593] should_failslab+0x9/0x14 [ 308.224396] __kmalloc+0x2e0/0x760 [ 308.227938] ? strncpy_from_user+0x5a0/0x5a0 [ 308.232357] ? fput+0x130/0x1a0 [ 308.235642] ? do_syscall_64+0x9a/0x820 [ 308.239625] ? __x64_sys_memfd_create+0x142/0x4f0 [ 308.244475] ? do_syscall_64+0x9a/0x820 [ 308.248455] __x64_sys_memfd_create+0x142/0x4f0 [ 308.253141] ? memfd_fcntl+0x1910/0x1910 [ 308.257226] do_syscall_64+0x1b9/0x820 [ 308.261128] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 308.266534] ? syscall_return_slowpath+0x5e0/0x5e0 [ 308.271478] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.276325] ? trace_hardirqs_on_caller+0x310/0x310 [ 308.281343] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 308.286364] ? prepare_exit_to_usermode+0x291/0x3b0 [ 308.291390] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.296244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.301446] RIP: 0033:0x457569 [ 308.304694] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.323606] RSP: 002b:00007f7df0943a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 08:44:45 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="fffffff680", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:46 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6c00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 308.331329] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 308.338598] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 308.345868] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 308.353139] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f7df09446d4 [ 308.360418] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 308.486940] XFS (loop2): Invalid superblock magic number 08:44:46 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="8cffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:46 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 08:44:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0a00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:46 executing program 3 (fault-call:1 fault-nth:1): mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:46 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="007a000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 308.806406] FAULT_INJECTION: forcing a failure. [ 308.806406] name failslab, interval 1, probability 0, space 0, times 0 [ 308.862275] CPU: 0 PID: 11014 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 308.870798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.870805] Call Trace: [ 308.870835] dump_stack+0x244/0x39d [ 308.870873] ? dump_stack_print_info.cold.1+0x20/0x20 [ 308.891622] should_fail.cold.4+0xa/0x17 [ 308.895721] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 308.900860] ? zap_class+0x640/0x640 [ 308.904606] ? __lock_acquire+0x62f/0x4c20 [ 308.908856] ? lock_downgrade+0x900/0x900 [ 308.913021] ? check_preemption_disabled+0x48/0x280 [ 308.918062] ? find_held_lock+0x36/0x1c0 [ 308.922163] ? expand_files.part.8+0x571/0x9a0 [ 308.926780] ? perf_trace_sched_process_exec+0x860/0x860 [ 308.932263] ? find_held_lock+0x36/0x1c0 [ 308.936362] __should_failslab+0x124/0x180 [ 308.940631] should_failslab+0x9/0x14 [ 308.944471] kmem_cache_alloc+0x2be/0x730 [ 308.948634] ? shmem_destroy_callback+0xc0/0xc0 [ 308.953321] shmem_alloc_inode+0x1b/0x40 [ 308.957387] alloc_inode+0x63/0x190 [ 308.961018] new_inode_pseudo+0x71/0x1a0 [ 308.965083] ? prune_icache_sb+0x1c0/0x1c0 [ 308.969327] ? _raw_spin_unlock+0x2c/0x50 [ 308.973482] new_inode+0x1c/0x40 [ 308.976855] shmem_get_inode+0xf1/0x920 [ 308.980845] ? shmem_encode_fh+0x340/0x340 [ 308.985084] ? lock_downgrade+0x900/0x900 [ 308.989240] ? lock_release+0xa10/0xa10 [ 308.993234] ? perf_trace_sched_process_exec+0x860/0x860 [ 308.998713] ? usercopy_warn+0x110/0x110 [ 309.002792] __shmem_file_setup.part.50+0x83/0x2a0 [ 309.007748] shmem_file_setup+0x65/0x90 [ 309.011742] __x64_sys_memfd_create+0x2af/0x4f0 [ 309.016417] ? memfd_fcntl+0x1910/0x1910 [ 309.020502] do_syscall_64+0x1b9/0x820 [ 309.024398] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 309.029782] ? syscall_return_slowpath+0x5e0/0x5e0 [ 309.034716] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.039568] ? trace_hardirqs_on_caller+0x310/0x310 [ 309.044589] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 309.049622] ? prepare_exit_to_usermode+0x291/0x3b0 [ 309.054679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.059535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.064725] RIP: 0033:0x457569 [ 309.067926] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.086850] RSP: 002b:00007f7df0943a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 309.094559] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 309.101831] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a 08:44:46 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000280", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 309.109100] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 309.116371] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f7df09446d4 [ 309.123645] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 08:44:46 executing program 3 (fault-call:1 fault-nth:2): mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="003ff80080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 309.232876] XFS (loop2): Invalid superblock magic number 08:44:47 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 08:44:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 309.320315] EXT4-fs: 27 callbacks suppressed [ 309.320326] EXT4-fs (sda1): re-mounted. Opts: [ 309.354573] FAULT_INJECTION: forcing a failure. [ 309.354573] name failslab, interval 1, probability 0, space 0, times 0 08:44:47 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0005000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 309.405730] CPU: 1 PID: 11067 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 309.414259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.423645] Call Trace: [ 309.426271] dump_stack+0x244/0x39d [ 309.429929] ? dump_stack_print_info.cold.1+0x20/0x20 [ 309.435142] should_fail.cold.4+0xa/0x17 [ 309.439218] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 309.444324] ? __kernel_text_address+0xd/0x40 [ 309.448822] ? unwind_get_return_address+0x61/0xa0 [ 309.453752] ? find_held_lock+0x36/0x1c0 [ 309.457814] ? perf_trace_sched_process_exec+0x860/0x860 [ 309.463279] __should_failslab+0x124/0x180 [ 309.467515] should_failslab+0x9/0x14 [ 309.471329] kmem_cache_alloc+0x2be/0x730 [ 309.475470] ? mpol_shared_policy_init+0x235/0x650 [ 309.480399] ? current_time+0x72/0x1b0 [ 309.484306] __d_alloc+0xc8/0xb90 [ 309.487752] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 309.492758] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 309.497775] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 309.502976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.508509] ? timespec64_trunc+0xea/0x180 [ 309.512734] ? inode_init_owner+0x340/0x340 [ 309.517057] ? _raw_spin_unlock+0x2c/0x50 [ 309.521220] ? current_time+0x10b/0x1b0 [ 309.525236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.530793] ? __lockdep_init_map+0x105/0x590 [ 309.535290] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 309.540814] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 309.546363] d_alloc_pseudo+0x1d/0x30 [ 309.550165] alloc_file_pseudo+0x158/0x3f0 [ 309.554401] ? alloc_file+0x4d0/0x4d0 [ 309.558197] ? usercopy_warn+0x110/0x110 [ 309.562307] __shmem_file_setup.part.50+0x110/0x2a0 [ 309.567345] shmem_file_setup+0x65/0x90 [ 309.571317] __x64_sys_memfd_create+0x2af/0x4f0 [ 309.575977] ? memfd_fcntl+0x1910/0x1910 [ 309.580067] do_syscall_64+0x1b9/0x820 [ 309.583956] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 309.589317] ? syscall_return_slowpath+0x5e0/0x5e0 [ 309.594236] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.599068] ? trace_hardirqs_on_caller+0x310/0x310 [ 309.604088] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 309.609111] ? prepare_exit_to_usermode+0x291/0x3b0 [ 309.614116] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.618964] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.624159] RIP: 0033:0x457569 [ 309.627344] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.646230] RSP: 002b:00007f7df0943a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 309.653926] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 309.661188] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 309.668449] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 309.675705] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f7df09446d4 [ 309.682973] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 309.711854] EXT4-fs (sda1): re-mounted. Opts: [ 309.738149] EXT4-fs (sda1): re-mounted. Opts: [ 309.795921] EXT4-fs (sda1): re-mounted. Opts: 08:44:47 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000003f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:47 executing program 3 (fault-call:1 fault-nth:3): mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000040080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 309.880163] XFS (loop2): Invalid superblock magic number 08:44:47 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) [ 310.003456] FAULT_INJECTION: forcing a failure. [ 310.003456] name failslab, interval 1, probability 0, space 0, times 0 [ 310.023192] EXT4-fs (sda1): re-mounted. Opts: 08:44:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:47 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="f6ffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 310.059767] EXT4-fs (sda1): re-mounted. Opts: [ 310.079705] CPU: 1 PID: 11122 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 310.088255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.097604] Call Trace: [ 310.100215] dump_stack+0x244/0x39d [ 310.103860] ? dump_stack_print_info.cold.1+0x20/0x20 [ 310.109532] ? __save_stack_trace+0x8d/0xf0 [ 310.113869] should_fail.cold.4+0xa/0x17 [ 310.117941] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 310.123052] ? save_stack+0x43/0xd0 [ 310.126688] ? kasan_kmalloc+0xc7/0xe0 [ 310.130594] ? percpu_ref_put_many+0x11c/0x260 [ 310.135198] ? zap_class+0x640/0x640 [ 310.138921] ? find_held_lock+0x36/0x1c0 [ 310.143009] ? perf_trace_sched_process_exec+0x860/0x860 [ 310.148461] ? lock_downgrade+0x900/0x900 [ 310.152621] __should_failslab+0x124/0x180 [ 310.156866] should_failslab+0x9/0x14 [ 310.160683] kmem_cache_alloc+0x2be/0x730 [ 310.164837] ? d_set_d_op+0x31d/0x410 [ 310.168654] __alloc_file+0xa8/0x470 [ 310.172385] ? file_free_rcu+0xd0/0xd0 [ 310.176275] ? d_instantiate+0x79/0xa0 [ 310.180164] ? lock_downgrade+0x900/0x900 [ 310.184340] ? kasan_check_read+0x11/0x20 [ 310.188489] ? do_raw_spin_unlock+0xa7/0x330 [ 310.192900] ? do_raw_spin_trylock+0x270/0x270 [ 310.197489] alloc_empty_file+0x72/0x170 [ 310.201561] alloc_file+0x5e/0x4d0 [ 310.205104] ? _raw_spin_unlock+0x2c/0x50 [ 310.209258] alloc_file_pseudo+0x261/0x3f0 [ 310.213528] ? alloc_file+0x4d0/0x4d0 [ 310.217336] ? usercopy_warn+0x110/0x110 [ 310.221413] __shmem_file_setup.part.50+0x110/0x2a0 [ 310.226461] shmem_file_setup+0x65/0x90 [ 310.230442] __x64_sys_memfd_create+0x2af/0x4f0 [ 310.235123] ? memfd_fcntl+0x1910/0x1910 [ 310.239214] do_syscall_64+0x1b9/0x820 [ 310.243115] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 310.248500] ? syscall_return_slowpath+0x5e0/0x5e0 [ 310.253446] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.258299] ? trace_hardirqs_on_caller+0x310/0x310 [ 310.263320] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 310.268362] ? prepare_exit_to_usermode+0x291/0x3b0 [ 310.273386] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.278239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.283442] RIP: 0033:0x457569 [ 310.286646] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.305740] RSP: 002b:00007f7df0943a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 310.313451] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 310.320722] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 310.328008] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 310.335281] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f7df09446d4 [ 310.342566] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 08:44:48 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000080080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:48 executing program 3 (fault-call:1 fault-nth:4): mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 310.441917] EXT4-fs (sda1): re-mounted. Opts: 08:44:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 310.483206] XFS (loop2): Invalid superblock magic number 08:44:48 executing program 0: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) [ 310.574839] FAULT_INJECTION: forcing a failure. [ 310.574839] name failslab, interval 1, probability 0, space 0, times 0 [ 310.609019] CPU: 1 PID: 11165 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 310.617567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.626932] Call Trace: [ 310.629545] dump_stack+0x244/0x39d [ 310.633213] ? dump_stack_print_info.cold.1+0x20/0x20 [ 310.638430] ? lock_downgrade+0x900/0x900 [ 310.642593] ? check_preemption_disabled+0x48/0x280 [ 310.647640] should_fail.cold.4+0xa/0x17 [ 310.651724] ? rcu_softirq_qs+0x20/0x20 [ 310.655719] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 310.660860] ? is_bpf_text_address+0xd3/0x170 [ 310.665421] ? kernel_text_address+0x79/0xf0 [ 310.669860] ? __kernel_text_address+0xd/0x40 [ 310.674397] ? unwind_get_return_address+0x61/0xa0 [ 310.679361] ? __save_stack_trace+0x8d/0xf0 [ 310.683731] ? find_held_lock+0x36/0x1c0 [ 310.687848] ? iwpm_get_nlmsg_request+0x368/0x640 [ 310.692740] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 310.697614] ? perf_trace_sched_process_exec+0x860/0x860 [ 310.703110] __should_failslab+0x124/0x180 [ 310.707408] should_failslab+0x9/0x14 [ 310.711260] kmem_cache_alloc_trace+0x2d7/0x750 [ 310.715962] ? __might_sleep+0x95/0x190 [ 310.719970] apparmor_file_alloc_security+0x17b/0xac0 [ 310.725197] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 310.730774] ? apparmor_path_rename+0xcd0/0xcd0 [ 310.735481] ? rcu_read_lock_sched_held+0x14f/0x180 [ 310.740525] ? kmem_cache_alloc+0x33a/0x730 [ 310.744869] ? d_set_d_op+0x31d/0x410 [ 310.748715] security_file_alloc+0x4c/0xa0 [ 310.752981] __alloc_file+0x12a/0x470 [ 310.756812] ? file_free_rcu+0xd0/0xd0 [ 310.760727] ? d_instantiate+0x79/0xa0 [ 310.764641] ? lock_downgrade+0x900/0x900 [ 310.768842] ? kasan_check_read+0x11/0x20 [ 310.773008] ? do_raw_spin_unlock+0xa7/0x330 [ 310.777441] ? do_raw_spin_trylock+0x270/0x270 [ 310.782052] alloc_empty_file+0x72/0x170 [ 310.786142] alloc_file+0x5e/0x4d0 [ 310.789714] ? _raw_spin_unlock+0x2c/0x50 [ 310.793893] alloc_file_pseudo+0x261/0x3f0 [ 310.798160] ? alloc_file+0x4d0/0x4d0 [ 310.802000] ? usercopy_warn+0x110/0x110 [ 310.806099] __shmem_file_setup.part.50+0x110/0x2a0 [ 310.811148] shmem_file_setup+0x65/0x90 [ 310.815160] __x64_sys_memfd_create+0x2af/0x4f0 [ 310.819896] ? memfd_fcntl+0x1910/0x1910 [ 310.823993] do_syscall_64+0x1b9/0x820 [ 310.827905] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 310.833314] ? syscall_return_slowpath+0x5e0/0x5e0 [ 310.838276] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.843172] ? trace_hardirqs_on_caller+0x310/0x310 [ 310.848222] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 310.853267] ? prepare_exit_to_usermode+0x291/0x3b0 [ 310.858309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.863188] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.868424] RIP: 0033:0x457569 [ 310.871636] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.890563] RSP: 002b:00007f7df0943a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 310.898296] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 310.905585] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 310.912869] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 08:44:48 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="00000d5180", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 310.920150] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f7df09446d4 [ 310.927431] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 310.942758] EXT4-fs (sda1): re-mounted. Opts: 08:44:48 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000002080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 311.133279] EXT4-fs (sda1): re-mounted. Opts: 08:44:48 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="7866730e", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:48 executing program 3 (fault-call:1 fault-nth:5): mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:48 executing program 0 (fault-call:3 fault-nth:0): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 311.258403] EXT4-fs (sda1): re-mounted. Opts: 08:44:48 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000006c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 311.303765] FAULT_INJECTION: forcing a failure. [ 311.303765] name failslab, interval 1, probability 0, space 0, times 0 [ 311.323381] FAULT_INJECTION: forcing a failure. [ 311.323381] name failslab, interval 1, probability 0, space 0, times 0 [ 311.326158] CPU: 1 PID: 11211 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 311.343271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.352628] Call Trace: [ 311.355237] dump_stack+0x244/0x39d [ 311.358884] ? dump_stack_print_info.cold.1+0x20/0x20 [ 311.364116] ? lock_downgrade+0x900/0x900 [ 311.368285] should_fail.cold.4+0xa/0x17 [ 311.372367] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 311.377490] ? lock_downgrade+0x900/0x900 [ 311.381673] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 311.387223] ? proc_fail_nth_write+0x9e/0x210 [ 311.391730] ? proc_cwd_link+0x1d0/0x1d0 [ 311.395809] ? find_held_lock+0x36/0x1c0 [ 311.399890] ? ceph_monmap_decode+0x118/0x520 [ 311.404408] ? perf_trace_sched_process_exec+0x860/0x860 [ 311.409874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.415427] __should_failslab+0x124/0x180 [ 311.419690] should_failslab+0x9/0x14 [ 311.423530] __kmalloc+0x2e0/0x760 [ 311.427078] ? strncpy_from_user+0x5a0/0x5a0 [ 311.431508] ? fput+0x130/0x1a0 [ 311.434805] ? do_syscall_64+0x9a/0x820 [ 311.438789] ? __x64_sys_memfd_create+0x142/0x4f0 [ 311.443638] ? do_syscall_64+0x9a/0x820 [ 311.447640] __x64_sys_memfd_create+0x142/0x4f0 [ 311.452323] ? memfd_fcntl+0x1910/0x1910 [ 311.456402] do_syscall_64+0x1b9/0x820 [ 311.460291] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 311.465696] ? syscall_return_slowpath+0x5e0/0x5e0 [ 311.470635] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.475503] ? trace_hardirqs_on_caller+0x310/0x310 [ 311.480530] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 311.485553] ? prepare_exit_to_usermode+0x291/0x3b0 [ 311.490579] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.495438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.500625] RIP: 0033:0x457569 [ 311.503870] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.522774] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 311.530488] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 311.537756] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 311.545024] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 311.552307] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f944a7f86d4 [ 311.559612] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 311.567428] CPU: 1 PID: 11218 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 311.575933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.585300] Call Trace: [ 311.587913] dump_stack+0x244/0x39d [ 311.591565] ? dump_stack_print_info.cold.1+0x20/0x20 [ 311.596763] ? find_held_lock+0x36/0x1c0 [ 311.600838] should_fail.cold.4+0xa/0x17 [ 311.604902] ? find_held_lock+0x36/0x1c0 [ 311.608969] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 311.614085] ? lock_downgrade+0x900/0x900 [ 311.618238] ? current_time+0x72/0x1b0 [ 311.622138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.627685] ? timespec64_trunc+0xea/0x180 [ 311.631929] ? inode_init_owner+0x340/0x340 [ 311.636271] ? find_held_lock+0x36/0x1c0 [ 311.640369] ? property_entries_dup+0x818/0xcd0 [ 311.645065] ? perf_trace_sched_process_exec+0x860/0x860 [ 311.650534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.656096] __should_failslab+0x124/0x180 [ 311.660355] should_failslab+0x9/0x14 [ 311.664183] kmem_cache_alloc+0x2be/0x730 [ 311.668337] ? do_sys_ftruncate+0x428/0x550 [ 311.672700] ? lock_downgrade+0x900/0x900 [ 311.676858] getname_flags+0xd0/0x590 [ 311.680660] ? __lock_is_held+0xb5/0x140 [ 311.684739] getname+0x19/0x20 [ 311.687942] do_sys_open+0x383/0x700 [ 311.691716] ? filp_open+0x80/0x80 [ 311.695270] ? trace_hardirqs_off_caller+0x300/0x300 [ 311.700373] ? do_sys_ftruncate+0x449/0x550 [ 311.704706] __x64_sys_open+0x7e/0xc0 [ 311.708519] do_syscall_64+0x1b9/0x820 [ 311.712415] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 311.717787] ? syscall_return_slowpath+0x5e0/0x5e0 [ 311.722757] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.727604] ? trace_hardirqs_on_caller+0x310/0x310 [ 311.732624] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 311.737692] ? prepare_exit_to_usermode+0x291/0x3b0 [ 311.742744] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.747599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.752794] RIP: 0033:0x4111a1 [ 311.755998] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 311.774901] RSP: 002b:00007f7df0943a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 311.782611] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 311.789896] RDX: 00007f7df0943afa RSI: 0000000000000002 RDI: 00007f7df0943af0 [ 311.797170] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 08:44:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="1000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:49 executing program 3 (fault-call:1 fault-nth:6): mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 311.804459] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 311.811726] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:44:49 executing program 0 (fault-call:3 fault-nth:1): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 311.979870] FAULT_INJECTION: forcing a failure. [ 311.979870] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 311.991724] CPU: 1 PID: 11242 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 312.000392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.009768] Call Trace: [ 312.012406] dump_stack+0x244/0x39d [ 312.016068] ? dump_stack_print_info.cold.1+0x20/0x20 [ 312.021296] should_fail.cold.4+0xa/0x17 [ 312.025407] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.030531] ? print_usage_bug+0xc0/0xc0 [ 312.034626] ? mark_held_locks+0x130/0x130 [ 312.038890] ? zap_class+0x640/0x640 [ 312.042611] ? print_usage_bug+0xc0/0xc0 [ 312.046674] ? zap_class+0x640/0x640 [ 312.050390] ? lock_downgrade+0x900/0x900 [ 312.054562] ? check_preemption_disabled+0x48/0x280 [ 312.059609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.065174] ? should_fail+0x22d/0xd01 [ 312.069083] ? find_held_lock+0x36/0x1c0 [ 312.073163] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.078307] __alloc_pages_nodemask+0x34b/0xdd0 [ 312.082982] ? current_time+0x72/0x1b0 [ 312.086896] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 312.091934] ? inode_init_owner+0x340/0x340 [ 312.096250] ? find_held_lock+0x36/0x1c0 [ 312.100325] ? trace_hardirqs_off+0xb8/0x310 [ 312.104743] cache_grow_begin+0xa5/0x8c0 [ 312.109053] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 312.114604] ? check_preemption_disabled+0x48/0x280 [ 312.119657] kmem_cache_alloc+0x66b/0x730 [ 312.123828] ? do_sys_ftruncate+0x428/0x550 08:44:49 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 312.128162] getname_flags+0xd0/0x590 [ 312.131981] ? __lock_is_held+0xb5/0x140 [ 312.136046] getname+0x19/0x20 [ 312.139245] do_sys_open+0x383/0x700 [ 312.142996] ? filp_open+0x80/0x80 [ 312.146541] ? trace_hardirqs_off_caller+0x300/0x300 [ 312.151649] ? do_sys_ftruncate+0x449/0x550 [ 312.155990] __x64_sys_open+0x7e/0xc0 [ 312.159814] do_syscall_64+0x1b9/0x820 [ 312.163708] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 312.169064] ? syscall_return_slowpath+0x5e0/0x5e0 [ 312.173986] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.178847] ? trace_hardirqs_on_caller+0x310/0x310 [ 312.183856] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 312.188888] ? prepare_exit_to_usermode+0x291/0x3b0 [ 312.193913] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.198749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.203935] RIP: 0033:0x4111a1 [ 312.207147] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 312.226317] RSP: 002b:00007f7df0943a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 312.234016] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 312.241276] RDX: 00007f7df0943afa RSI: 0000000000000002 RDI: 00007f7df0943af0 [ 312.248542] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 312.255824] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 312.263095] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:44:49 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 312.376214] FAULT_INJECTION: forcing a failure. [ 312.376214] name failslab, interval 1, probability 0, space 0, times 0 08:44:50 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0068000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 312.474129] CPU: 1 PID: 11261 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 312.482695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.492063] Call Trace: [ 312.494700] dump_stack+0x244/0x39d [ 312.498359] ? dump_stack_print_info.cold.1+0x20/0x20 [ 312.503584] should_fail.cold.4+0xa/0x17 [ 312.507684] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.512844] ? zap_class+0x640/0x640 [ 312.516578] ? __lock_acquire+0x62f/0x4c20 [ 312.520840] ? lock_downgrade+0x900/0x900 [ 312.525016] ? check_preemption_disabled+0x48/0x280 [ 312.530077] ? find_held_lock+0x36/0x1c0 [ 312.534195] ? expand_files.part.8+0x571/0x9a0 [ 312.538834] ? perf_trace_sched_process_exec+0x860/0x860 [ 312.544305] ? find_held_lock+0x36/0x1c0 [ 312.548394] __should_failslab+0x124/0x180 [ 312.552649] should_failslab+0x9/0x14 [ 312.556478] kmem_cache_alloc+0x2be/0x730 [ 312.560649] ? shmem_destroy_callback+0xc0/0xc0 [ 312.565344] shmem_alloc_inode+0x1b/0x40 [ 312.569419] alloc_inode+0x63/0x190 08:44:50 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00000d5180", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 312.573066] new_inode_pseudo+0x71/0x1a0 [ 312.577155] ? prune_icache_sb+0x1c0/0x1c0 [ 312.581416] ? _raw_spin_unlock+0x2c/0x50 [ 312.585617] new_inode+0x1c/0x40 [ 312.589000] shmem_get_inode+0xf1/0x920 [ 312.592999] ? shmem_encode_fh+0x340/0x340 [ 312.597252] ? lock_downgrade+0x900/0x900 [ 312.601415] ? lock_release+0xa10/0xa10 [ 312.605404] ? perf_trace_sched_process_exec+0x860/0x860 [ 312.610872] ? usercopy_warn+0x110/0x110 [ 312.614969] __shmem_file_setup.part.50+0x83/0x2a0 [ 312.619924] shmem_file_setup+0x65/0x90 08:44:50 executing program 3 (fault-call:1 fault-nth:7): mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 312.623918] __x64_sys_memfd_create+0x2af/0x4f0 [ 312.628600] ? memfd_fcntl+0x1910/0x1910 [ 312.632699] do_syscall_64+0x1b9/0x820 [ 312.636622] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 312.642014] ? syscall_return_slowpath+0x5e0/0x5e0 [ 312.646960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.651910] ? trace_hardirqs_on_caller+0x310/0x310 [ 312.656941] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 312.661974] ? prepare_exit_to_usermode+0x291/0x3b0 [ 312.667015] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.671893] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.677137] RIP: 0033:0x457569 [ 312.680362] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.699284] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 312.707001] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 312.714291] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a 08:44:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0600000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 312.721578] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 312.726760] FAULT_INJECTION: forcing a failure. [ 312.726760] name failslab, interval 1, probability 0, space 0, times 0 [ 312.728859] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f944a7f86d4 [ 312.728869] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 312.762314] CPU: 0 PID: 11287 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 312.770871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.780231] Call Trace: [ 312.782835] dump_stack+0x244/0x39d [ 312.786482] ? dump_stack_print_info.cold.1+0x20/0x20 [ 312.791693] ? print_usage_bug+0xc0/0xc0 [ 312.795785] should_fail.cold.4+0xa/0x17 [ 312.799851] ? find_held_lock+0x36/0x1c0 [ 312.803915] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.809038] ? lock_downgrade+0x900/0x900 [ 312.813189] ? check_preemption_disabled+0x48/0x280 [ 312.818221] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 312.823155] ? kasan_check_read+0x11/0x20 [ 312.827316] ? find_held_lock+0x36/0x1c0 [ 312.831390] ? dsa_legacy_fdb_add+0x18/0x60 [ 312.835733] ? perf_trace_sched_process_exec+0x860/0x860 [ 312.841218] __should_failslab+0x124/0x180 [ 312.845467] should_failslab+0x9/0x14 [ 312.849276] kmem_cache_alloc+0x2be/0x730 [ 312.853429] ? zap_class+0x640/0x640 [ 312.857144] ? print_usage_bug+0xc0/0xc0 [ 312.861210] ? mark_held_locks+0x130/0x130 [ 312.865459] __alloc_file+0xa8/0x470 [ 312.869182] ? file_free_rcu+0xd0/0xd0 [ 312.873097] ? find_held_lock+0x36/0x1c0 [ 312.877176] ? is_bpf_text_address+0xac/0x170 [ 312.881705] ? lock_downgrade+0x900/0x900 [ 312.885862] ? check_preemption_disabled+0x48/0x280 [ 312.890886] alloc_empty_file+0x72/0x170 [ 312.894957] path_openat+0x170/0x5150 [ 312.898775] ? rcu_softirq_qs+0x20/0x20 [ 312.902752] ? unwind_dump+0x190/0x190 [ 312.906651] ? zap_class+0x640/0x640 [ 312.910384] ? path_lookupat.isra.43+0xc00/0xc00 [ 312.915142] ? unwind_get_return_address+0x61/0xa0 [ 312.920079] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 312.925098] ? expand_files.part.8+0x571/0x9a0 [ 312.929720] ? find_held_lock+0x36/0x1c0 [ 312.933821] ? __alloc_fd+0x347/0x6e0 [ 312.937626] ? lock_downgrade+0x900/0x900 [ 312.941773] ? getname+0x19/0x20 [ 312.945152] ? kasan_check_read+0x11/0x20 [ 312.949302] ? do_raw_spin_unlock+0xa7/0x330 [ 312.953754] ? do_raw_spin_trylock+0x270/0x270 [ 312.958343] ? __lock_is_held+0xb5/0x140 [ 312.962439] ? __check_object_size+0xb1/0x782 [ 312.966959] ? _raw_spin_unlock+0x2c/0x50 [ 312.971114] ? __alloc_fd+0x347/0x6e0 [ 312.974933] do_filp_open+0x255/0x380 [ 312.978738] ? may_open_dev+0x100/0x100 [ 312.982753] ? get_unused_fd_flags+0x122/0x1a0 [ 312.987336] ? __alloc_fd+0x6e0/0x6e0 [ 312.991143] ? __lock_is_held+0xb5/0x140 [ 312.995236] do_sys_open+0x568/0x700 [ 312.998957] ? filp_open+0x80/0x80 [ 313.002508] ? trace_hardirqs_off_caller+0x300/0x300 [ 313.007623] ? do_sys_ftruncate+0x449/0x550 [ 313.011952] __x64_sys_open+0x7e/0xc0 [ 313.015768] do_syscall_64+0x1b9/0x820 [ 313.019675] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 313.025055] ? syscall_return_slowpath+0x5e0/0x5e0 [ 313.029989] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.034839] ? trace_hardirqs_on_caller+0x310/0x310 [ 313.039858] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 313.044879] ? prepare_exit_to_usermode+0x291/0x3b0 [ 313.049901] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.054756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.059972] RIP: 0033:0x4111a1 [ 313.063171] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 313.082073] RSP: 002b:00007f7df0943a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 313.089780] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 313.097048] RDX: 00007f7df0943afa RSI: 0000000000000002 RDI: 00007f7df0943af0 [ 313.104315] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 313.111588] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 313.118858] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:44:50 executing program 0 (fault-call:3 fault-nth:2): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 313.200970] XFS (loop2): Invalid superblock magic number 08:44:50 executing program 3 (fault-call:1 fault-nth:8): mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:51 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="004c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 313.343660] FAULT_INJECTION: forcing a failure. [ 313.343660] name failslab, interval 1, probability 0, space 0, times 0 08:44:51 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="97ffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 313.401212] CPU: 1 PID: 11326 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 313.409768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.419135] Call Trace: [ 313.421752] dump_stack+0x244/0x39d [ 313.425416] ? dump_stack_print_info.cold.1+0x20/0x20 [ 313.430640] should_fail.cold.4+0xa/0x17 [ 313.434752] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 313.439876] ? __kernel_text_address+0xd/0x40 [ 313.444400] ? unwind_get_return_address+0x61/0xa0 [ 313.449357] ? find_held_lock+0x36/0x1c0 [ 313.453467] ? drm_mode_create_lease_ioctl+0xc88/0x1e40 [ 313.458861] ? perf_trace_sched_process_exec+0x860/0x860 [ 313.464332] __should_failslab+0x124/0x180 [ 313.468577] should_failslab+0x9/0x14 [ 313.472385] kmem_cache_alloc+0x2be/0x730 [ 313.476536] ? mpol_shared_policy_init+0x235/0x650 [ 313.481469] ? current_time+0x72/0x1b0 [ 313.485373] __d_alloc+0xc8/0xb90 [ 313.488874] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 313.493895] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 313.498918] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 313.504115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.509654] ? timespec64_trunc+0xea/0x180 [ 313.513911] ? inode_init_owner+0x340/0x340 [ 313.518240] ? _raw_spin_unlock+0x2c/0x50 [ 313.522399] ? current_time+0x10b/0x1b0 [ 313.526380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.531924] ? __lockdep_init_map+0x105/0x590 [ 313.536433] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 313.541978] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 313.547536] d_alloc_pseudo+0x1d/0x30 [ 313.551345] alloc_file_pseudo+0x158/0x3f0 [ 313.555587] ? alloc_file+0x4d0/0x4d0 [ 313.559405] ? usercopy_warn+0x110/0x110 [ 313.563501] __shmem_file_setup.part.50+0x110/0x2a0 [ 313.568531] shmem_file_setup+0x65/0x90 [ 313.572514] __x64_sys_memfd_create+0x2af/0x4f0 [ 313.577207] ? memfd_fcntl+0x1910/0x1910 [ 313.581284] do_syscall_64+0x1b9/0x820 [ 313.585173] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 313.590565] ? syscall_return_slowpath+0x5e0/0x5e0 [ 313.595498] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.600359] ? trace_hardirqs_on_caller+0x310/0x310 [ 313.605405] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 313.610441] ? prepare_exit_to_usermode+0x291/0x3b0 [ 313.615477] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.620328] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.625529] RIP: 0033:0x457569 [ 313.628724] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.647627] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 313.655346] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 313.662619] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 313.669885] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 313.677155] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f944a7f86d4 [ 313.684428] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 313.694072] FAULT_INJECTION: forcing a failure. 08:44:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 313.694072] name failslab, interval 1, probability 0, space 0, times 0 08:44:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 313.757494] CPU: 1 PID: 11336 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 313.766022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.775378] Call Trace: [ 313.775408] dump_stack+0x244/0x39d [ 313.775436] ? dump_stack_print_info.cold.1+0x20/0x20 [ 313.781641] ? lock_downgrade+0x900/0x900 [ 313.781658] ? check_preemption_disabled+0x48/0x280 [ 313.781694] should_fail.cold.4+0xa/0x17 [ 313.781713] ? rcu_softirq_qs+0x20/0x20 [ 313.781737] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 313.809177] ? is_bpf_text_address+0xd3/0x170 [ 313.813697] ? kernel_text_address+0x79/0xf0 [ 313.818116] ? __kernel_text_address+0xd/0x40 [ 313.822617] ? unwind_get_return_address+0x61/0xa0 [ 313.827560] ? __save_stack_trace+0x8d/0xf0 [ 313.831907] ? find_held_lock+0x36/0x1c0 [ 313.835984] ? store_fc_private_host_tgtid_bind_type+0x348/0x8f0 [ 313.842149] ? do_syscall_64+0x1b9/0x820 [ 313.846222] ? perf_trace_sched_process_exec+0x860/0x860 [ 313.851720] __should_failslab+0x124/0x180 [ 313.855970] should_failslab+0x9/0x14 [ 313.859780] kmem_cache_alloc_trace+0x2d7/0x750 [ 313.864459] ? __might_sleep+0x95/0x190 [ 313.868445] apparmor_file_alloc_security+0x17b/0xac0 [ 313.873643] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 313.879224] ? apparmor_path_rename+0xcd0/0xcd0 [ 313.883912] ? rcu_read_lock_sched_held+0x14f/0x180 [ 313.888933] ? kmem_cache_alloc+0x33a/0x730 [ 313.893256] ? zap_class+0x640/0x640 [ 313.896987] security_file_alloc+0x4c/0xa0 [ 313.901240] __alloc_file+0x12a/0x470 [ 313.905058] ? file_free_rcu+0xd0/0xd0 [ 313.908953] ? find_held_lock+0x36/0x1c0 [ 313.913028] ? is_bpf_text_address+0xac/0x170 [ 313.917555] ? lock_downgrade+0x900/0x900 [ 313.921722] ? check_preemption_disabled+0x48/0x280 [ 313.926776] alloc_empty_file+0x72/0x170 [ 313.930846] path_openat+0x170/0x5150 [ 313.934653] ? rcu_softirq_qs+0x20/0x20 [ 313.938679] ? unwind_dump+0x190/0x190 [ 313.942592] ? zap_class+0x640/0x640 [ 313.946310] ? path_lookupat.isra.43+0xc00/0xc00 [ 313.951071] ? unwind_get_return_address+0x61/0xa0 [ 313.956012] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 313.961039] ? expand_files.part.8+0x571/0x9a0 [ 313.965652] ? find_held_lock+0x36/0x1c0 [ 313.969737] ? __alloc_fd+0x347/0x6e0 [ 313.973545] ? lock_downgrade+0x900/0x900 [ 313.977698] ? getname+0x19/0x20 [ 313.981082] ? kasan_check_read+0x11/0x20 [ 313.985252] ? do_raw_spin_unlock+0xa7/0x330 [ 313.989685] ? do_raw_spin_trylock+0x270/0x270 [ 313.994296] ? __lock_is_held+0xb5/0x140 [ 313.998371] ? __check_object_size+0xb1/0x782 [ 314.003000] ? _raw_spin_unlock+0x2c/0x50 [ 314.007172] ? __alloc_fd+0x347/0x6e0 [ 314.010996] do_filp_open+0x255/0x380 [ 314.014817] ? may_open_dev+0x100/0x100 [ 314.018829] ? get_unused_fd_flags+0x122/0x1a0 [ 314.023415] ? __alloc_fd+0x6e0/0x6e0 [ 314.027220] ? __lock_is_held+0xb5/0x140 [ 314.031291] do_sys_open+0x568/0x700 [ 314.035018] ? filp_open+0x80/0x80 [ 314.038609] ? trace_hardirqs_off_caller+0x300/0x300 [ 314.043721] ? do_sys_ftruncate+0x449/0x550 [ 314.048061] __x64_sys_open+0x7e/0xc0 [ 314.051873] do_syscall_64+0x1b9/0x820 [ 314.055765] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 314.061146] ? syscall_return_slowpath+0x5e0/0x5e0 [ 314.066087] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.070943] ? trace_hardirqs_on_caller+0x310/0x310 [ 314.075968] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 314.080994] ? prepare_exit_to_usermode+0x291/0x3b0 [ 314.086023] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.090892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.096084] RIP: 0033:0x4111a1 [ 314.099281] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 314.118678] RSP: 002b:00007f7df0922a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 314.126428] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 314.133714] RDX: 00007f7df0922afa RSI: 0000000000000002 RDI: 00007f7df0922af0 [ 314.140982] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 314.148251] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 314.155523] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:44:51 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0074000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:51 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:51 executing program 0 (fault-call:3 fault-nth:3): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 314.298816] XFS (loop2): Invalid superblock magic number [ 314.375988] EXT4-fs: 9 callbacks suppressed [ 314.376001] EXT4-fs (sda1): re-mounted. Opts: [ 314.429701] EXT4-fs (sda1): re-mounted. Opts: 08:44:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="786673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 314.463362] FAULT_INJECTION: forcing a failure. [ 314.463362] name failslab, interval 1, probability 0, space 0, times 0 [ 314.483564] CPU: 1 PID: 11389 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 314.492095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.492103] Call Trace: [ 314.492134] dump_stack+0x244/0x39d [ 314.492165] ? dump_stack_print_info.cold.1+0x20/0x20 08:44:52 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0600000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 314.492212] ? __save_stack_trace+0x8d/0xf0 [ 314.492243] should_fail.cold.4+0xa/0x17 [ 314.512987] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 314.513008] ? save_stack+0x43/0xd0 [ 314.513020] ? kasan_kmalloc+0xc7/0xe0 [ 314.513053] ? percpu_ref_put_many+0x11c/0x260 [ 314.521438] ? zap_class+0x640/0x640 [ 314.521460] ? find_held_lock+0x36/0x1c0 [ 314.521499] ? perf_trace_sched_process_exec+0x860/0x860 [ 314.521517] ? lock_downgrade+0x900/0x900 [ 314.521542] __should_failslab+0x124/0x180 08:44:52 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6c00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 314.521581] should_failslab+0x9/0x14 [ 314.556220] kmem_cache_alloc+0x2be/0x730 [ 314.556250] ? d_set_d_op+0x31d/0x410 [ 314.556278] __alloc_file+0xa8/0x470 [ 314.556297] ? file_free_rcu+0xd0/0xd0 [ 314.579930] ? d_instantiate+0x79/0xa0 [ 314.583829] ? lock_downgrade+0x900/0x900 [ 314.588011] ? kasan_check_read+0x11/0x20 [ 314.592176] ? do_raw_spin_unlock+0xa7/0x330 [ 314.596610] ? do_raw_spin_trylock+0x270/0x270 [ 314.601218] alloc_empty_file+0x72/0x170 [ 314.605287] alloc_file+0x5e/0x4d0 [ 314.608831] ? _raw_spin_unlock+0x2c/0x50 [ 314.613014] alloc_file_pseudo+0x261/0x3f0 [ 314.617267] ? alloc_file+0x4d0/0x4d0 [ 314.621122] ? usercopy_warn+0x110/0x110 [ 314.625240] __shmem_file_setup.part.50+0x110/0x2a0 [ 314.630280] shmem_file_setup+0x65/0x90 [ 314.634265] __x64_sys_memfd_create+0x2af/0x4f0 [ 314.638940] ? memfd_fcntl+0x1910/0x1910 [ 314.643025] do_syscall_64+0x1b9/0x820 [ 314.646928] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 314.652319] ? syscall_return_slowpath+0x5e0/0x5e0 [ 314.657251] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.662114] ? trace_hardirqs_on_caller+0x310/0x310 [ 314.667134] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 314.672156] ? prepare_exit_to_usermode+0x291/0x3b0 [ 314.677193] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.682048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.687235] RIP: 0033:0x457569 [ 314.690432] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.709479] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 314.717231] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 314.724562] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 314.731836] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 314.739113] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f944a7f86d4 [ 314.746384] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 08:44:52 executing program 0 (fault-call:3 fault-nth:4): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000006c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:52 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0200000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 314.970637] FAULT_INJECTION: forcing a failure. [ 314.970637] name failslab, interval 1, probability 0, space 0, times 0 [ 314.982974] CPU: 0 PID: 11427 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 314.991477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.000841] Call Trace: [ 315.003449] dump_stack+0x244/0x39d [ 315.007095] ? dump_stack_print_info.cold.1+0x20/0x20 [ 315.012306] ? lock_downgrade+0x900/0x900 [ 315.016486] ? check_preemption_disabled+0x48/0x280 [ 315.021523] should_fail.cold.4+0xa/0x17 [ 315.025616] ? rcu_softirq_qs+0x20/0x20 [ 315.029607] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 315.034728] ? is_bpf_text_address+0xd3/0x170 [ 315.039240] ? kernel_text_address+0x79/0xf0 [ 315.043654] ? __kernel_text_address+0xd/0x40 [ 315.048166] ? unwind_get_return_address+0x61/0xa0 [ 315.053106] ? __save_stack_trace+0x8d/0xf0 [ 315.057435] ? find_held_lock+0x36/0x1c0 [ 315.061521] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 315.066369] ? perf_trace_sched_process_exec+0x860/0x860 [ 315.071865] __should_failslab+0x124/0x180 [ 315.076109] should_failslab+0x9/0x14 [ 315.079924] kmem_cache_alloc_trace+0x2d7/0x750 [ 315.084600] ? __might_sleep+0x95/0x190 [ 315.088614] apparmor_file_alloc_security+0x17b/0xac0 [ 315.093815] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 315.099362] ? apparmor_path_rename+0xcd0/0xcd0 [ 315.104046] ? rcu_read_lock_sched_held+0x14f/0x180 [ 315.109066] ? kmem_cache_alloc+0x33a/0x730 [ 315.113389] ? d_set_d_op+0x31d/0x410 [ 315.117212] security_file_alloc+0x4c/0xa0 [ 315.121458] __alloc_file+0x12a/0x470 [ 315.125275] ? file_free_rcu+0xd0/0xd0 [ 315.129168] ? d_instantiate+0x79/0xa0 [ 315.133062] ? lock_downgrade+0x900/0x900 [ 315.137226] ? kasan_check_read+0x11/0x20 [ 315.141381] ? do_raw_spin_unlock+0xa7/0x330 [ 315.145791] ? do_raw_spin_trylock+0x270/0x270 [ 315.150380] alloc_empty_file+0x72/0x170 [ 315.154465] alloc_file+0x5e/0x4d0 [ 315.158026] ? _raw_spin_unlock+0x2c/0x50 [ 315.162215] alloc_file_pseudo+0x261/0x3f0 [ 315.166474] ? alloc_file+0x4d0/0x4d0 [ 315.170316] ? usercopy_warn+0x110/0x110 [ 315.174395] __shmem_file_setup.part.50+0x110/0x2a0 [ 315.179443] shmem_file_setup+0x65/0x90 [ 315.183428] __x64_sys_memfd_create+0x2af/0x4f0 [ 315.188115] ? memfd_fcntl+0x1910/0x1910 [ 315.192194] do_syscall_64+0x1b9/0x820 [ 315.196083] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 315.201463] ? syscall_return_slowpath+0x5e0/0x5e0 [ 315.206392] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 315.211256] ? trace_hardirqs_on_caller+0x310/0x310 [ 315.216302] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 315.221327] ? prepare_exit_to_usermode+0x291/0x3b0 [ 315.226365] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 315.231221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.236413] RIP: 0033:0x457569 [ 315.239621] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.258545] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 08:44:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 315.266253] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 315.273521] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 315.280827] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 315.288097] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f944a7f86d4 [ 315.295364] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 315.359688] EXT4-fs (sda1): re-mounted. Opts: 08:44:53 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="fffffdfd80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 315.386944] EXT4-fs (sda1): re-mounted. Opts: 08:44:53 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6800000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 315.426303] EXT4-fs (sda1): re-mounted. Opts: 08:44:53 executing program 0 (fault-call:3 fault-nth:5): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0200000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:53 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 315.602882] XFS (loop2): Invalid superblock magic number [ 315.638950] FAULT_INJECTION: forcing a failure. [ 315.638950] name failslab, interval 1, probability 0, space 0, times 0 08:44:53 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000007a80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 315.735935] CPU: 1 PID: 11469 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 315.744476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.744484] Call Trace: [ 315.744514] dump_stack+0x244/0x39d [ 315.744546] ? dump_stack_print_info.cold.1+0x20/0x20 [ 315.744583] ? find_held_lock+0x36/0x1c0 [ 315.760178] should_fail.cold.4+0xa/0x17 [ 315.760203] ? find_held_lock+0x36/0x1c0 [ 315.760223] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 315.760250] ? lock_downgrade+0x900/0x900 [ 315.786868] ? current_time+0x72/0x1b0 [ 315.790756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.796290] ? timespec64_trunc+0xea/0x180 [ 315.800528] ? inode_init_owner+0x340/0x340 [ 315.804842] ? find_held_lock+0x36/0x1c0 [ 315.808920] ? workingset_eviction+0x488/0xfc0 [ 315.813527] ? perf_trace_sched_process_exec+0x860/0x860 [ 315.818983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.824544] __should_failslab+0x124/0x180 [ 315.828791] should_failslab+0x9/0x14 [ 315.832588] kmem_cache_alloc+0x2be/0x730 [ 315.836742] ? do_sys_ftruncate+0x428/0x550 [ 315.841067] ? lock_downgrade+0x900/0x900 [ 315.845242] getname_flags+0xd0/0x590 [ 315.849040] ? __lock_is_held+0xb5/0x140 [ 315.853122] getname+0x19/0x20 [ 315.856332] do_sys_open+0x383/0x700 [ 315.860052] ? filp_open+0x80/0x80 [ 315.863615] ? trace_hardirqs_off_caller+0x300/0x300 [ 315.868725] ? do_sys_ftruncate+0x449/0x550 [ 315.873040] __x64_sys_open+0x7e/0xc0 [ 315.876845] do_syscall_64+0x1b9/0x820 [ 315.880749] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 315.886132] ? syscall_return_slowpath+0x5e0/0x5e0 [ 315.891107] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 315.895980] ? trace_hardirqs_on_caller+0x310/0x310 [ 315.900992] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 315.905998] ? prepare_exit_to_usermode+0x291/0x3b0 [ 315.911010] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 315.915875] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.921075] RIP: 0033:0x4111a1 [ 315.924290] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 315.943199] RSP: 002b:00007f944a7f7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 315.950895] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 315.958160] RDX: 00007f944a7f7afa RSI: 0000000000000002 RDI: 00007f944a7f7af0 [ 315.965423] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 315.972700] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 315.979970] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:44:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 316.046844] EXT4-fs (sda1): re-mounted. Opts: [ 316.074703] EXT4-fs (sda1): re-mounted. Opts: 08:44:53 executing program 0 (fault-call:3 fault-nth:6): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:53 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0040000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 316.110212] EXT4-fs (sda1): re-mounted. Opts: 08:44:53 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000006880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 316.255585] FAULT_INJECTION: forcing a failure. [ 316.255585] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 316.267475] CPU: 1 PID: 11532 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 316.275978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.285345] Call Trace: [ 316.287957] dump_stack+0x244/0x39d [ 316.291637] ? dump_stack_print_info.cold.1+0x20/0x20 [ 316.296876] should_fail.cold.4+0xa/0x17 [ 316.300971] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.306086] ? print_usage_bug+0xc0/0xc0 [ 316.310167] ? mark_held_locks+0x130/0x130 [ 316.314413] ? zap_class+0x640/0x640 [ 316.318137] ? print_usage_bug+0xc0/0xc0 [ 316.322229] ? zap_class+0x640/0x640 [ 316.325955] ? lock_downgrade+0x900/0x900 [ 316.330105] ? check_preemption_disabled+0x48/0x280 [ 316.335142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.340713] ? should_fail+0x22d/0xd01 [ 316.344607] ? find_held_lock+0x36/0x1c0 [ 316.348683] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.353802] __alloc_pages_nodemask+0x34b/0xdd0 [ 316.358477] ? current_time+0x72/0x1b0 [ 316.362378] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 316.367402] ? inode_init_owner+0x340/0x340 [ 316.371737] ? find_held_lock+0x36/0x1c0 [ 316.375826] ? trace_hardirqs_off+0xb8/0x310 [ 316.380246] cache_grow_begin+0xa5/0x8c0 [ 316.384313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 316.389866] ? check_preemption_disabled+0x48/0x280 [ 316.394895] kmem_cache_alloc+0x66b/0x730 [ 316.399048] ? do_sys_ftruncate+0x428/0x550 [ 316.403383] getname_flags+0xd0/0x590 [ 316.407196] ? __lock_is_held+0xb5/0x140 [ 316.411288] getname+0x19/0x20 [ 316.414488] do_sys_open+0x383/0x700 [ 316.418230] ? filp_open+0x80/0x80 [ 316.421792] ? trace_hardirqs_off_caller+0x300/0x300 [ 316.426899] ? do_sys_ftruncate+0x449/0x550 [ 316.431228] __x64_sys_open+0x7e/0xc0 [ 316.435036] do_syscall_64+0x1b9/0x820 [ 316.438929] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 316.444307] ? syscall_return_slowpath+0x5e0/0x5e0 [ 316.449242] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.454095] ? trace_hardirqs_on_caller+0x310/0x310 [ 316.459129] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 316.464206] ? prepare_exit_to_usermode+0x291/0x3b0 [ 316.469236] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.474091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.479281] RIP: 0033:0x4111a1 [ 316.482526] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 316.501439] RSP: 002b:00007f944a7f7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 316.509323] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 316.516593] RDX: 00007f944a7f7afa RSI: 0000000000000002 RDI: 00007f944a7f7af0 [ 316.523874] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 316.531145] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 316.538413] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:44:54 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0006000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 316.565948] XFS (loop2): Invalid superblock magic number 08:44:54 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="007a000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 316.682726] EXT4-fs (sda1): re-mounted. Opts: 08:44:54 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000006c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 316.806719] EXT4-fs (sda1): re-mounted. Opts: 08:44:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="78667310", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:54 executing program 0 (fault-call:3 fault-nth:7): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:54 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="001f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:54 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="003f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0400000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 317.063390] FAULT_INJECTION: forcing a failure. [ 317.063390] name failslab, interval 1, probability 0, space 0, times 0 08:44:54 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000007480", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 317.135304] CPU: 0 PID: 11604 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 317.143857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.153223] Call Trace: [ 317.155841] dump_stack+0x244/0x39d [ 317.159498] ? dump_stack_print_info.cold.1+0x20/0x20 [ 317.164733] ? print_usage_bug+0xc0/0xc0 [ 317.168824] should_fail.cold.4+0xa/0x17 [ 317.172901] ? find_held_lock+0x36/0x1c0 [ 317.176981] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 317.182107] ? lock_downgrade+0x900/0x900 [ 317.186276] ? check_preemption_disabled+0x48/0x280 [ 317.191302] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 317.196257] ? kasan_check_read+0x11/0x20 [ 317.196286] ? find_held_lock+0x36/0x1c0 [ 317.196309] ? ip4ip6_err+0x1198/0x2549 [ 317.204542] ? perf_trace_sched_process_exec+0x860/0x860 [ 317.204572] __should_failslab+0x124/0x180 [ 317.204594] should_failslab+0x9/0x14 [ 317.204610] kmem_cache_alloc+0x2be/0x730 [ 317.204629] ? zap_class+0x640/0x640 [ 317.229914] ? print_usage_bug+0xc0/0xc0 [ 317.233992] ? mark_held_locks+0x130/0x130 [ 317.238246] __alloc_file+0xa8/0x470 [ 317.241977] ? file_free_rcu+0xd0/0xd0 [ 317.245871] ? find_held_lock+0x36/0x1c0 [ 317.249946] ? is_bpf_text_address+0xac/0x170 [ 317.254447] ? lock_downgrade+0x900/0x900 [ 317.258597] ? check_preemption_disabled+0x48/0x280 [ 317.263622] alloc_empty_file+0x72/0x170 [ 317.267701] path_openat+0x170/0x5150 [ 317.271514] ? rcu_softirq_qs+0x20/0x20 [ 317.275504] ? unwind_dump+0x190/0x190 [ 317.279418] ? zap_class+0x640/0x640 [ 317.283142] ? path_lookupat.isra.43+0xc00/0xc00 [ 317.287900] ? unwind_get_return_address+0x61/0xa0 [ 317.292836] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 317.297860] ? expand_files.part.8+0x571/0x9a0 [ 317.302452] ? find_held_lock+0x36/0x1c0 [ 317.306526] ? __alloc_fd+0x347/0x6e0 [ 317.310333] ? lock_downgrade+0x900/0x900 [ 317.314504] ? getname+0x19/0x20 [ 317.317887] ? kasan_check_read+0x11/0x20 [ 317.322038] ? do_raw_spin_unlock+0xa7/0x330 [ 317.326449] ? do_raw_spin_trylock+0x270/0x270 [ 317.331038] ? __lock_is_held+0xb5/0x140 [ 317.335103] ? __check_object_size+0xb1/0x782 [ 317.339610] ? _raw_spin_unlock+0x2c/0x50 [ 317.343763] ? __alloc_fd+0x347/0x6e0 [ 317.347578] do_filp_open+0x255/0x380 [ 317.351400] ? may_open_dev+0x100/0x100 [ 317.355393] ? get_unused_fd_flags+0x122/0x1a0 [ 317.359980] ? __alloc_fd+0x6e0/0x6e0 [ 317.363788] ? __lock_is_held+0xb5/0x140 [ 317.367863] do_sys_open+0x568/0x700 [ 317.371584] ? filp_open+0x80/0x80 [ 317.375131] ? trace_hardirqs_off_caller+0x300/0x300 [ 317.380254] ? do_sys_ftruncate+0x449/0x550 [ 317.384584] __x64_sys_open+0x7e/0xc0 [ 317.388395] do_syscall_64+0x1b9/0x820 [ 317.392289] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 317.397657] ? syscall_return_slowpath+0x5e0/0x5e0 [ 317.402609] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.407457] ? trace_hardirqs_on_caller+0x310/0x310 [ 317.412479] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 317.417515] ? prepare_exit_to_usermode+0x291/0x3b0 [ 317.422543] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.427398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.432604] RIP: 0033:0x4111a1 [ 317.435853] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 317.454773] RSP: 002b:00007f944a7f7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 317.462486] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 317.469768] RDX: 00007f944a7f7afa RSI: 0000000000000002 RDI: 00007f944a7f7af0 [ 317.477051] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 08:44:55 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="786673fd", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:55 executing program 0 (fault-call:3 fault-nth:8): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 317.484320] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 317.491587] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:44:55 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0600000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:55 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="fcfdffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 317.737481] FAULT_INJECTION: forcing a failure. [ 317.737481] name failslab, interval 1, probability 0, space 0, times 0 08:44:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffff580", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:55 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="003f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 317.819166] CPU: 1 PID: 11650 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 317.827729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.837090] Call Trace: [ 317.839701] dump_stack+0x244/0x39d [ 317.843356] ? dump_stack_print_info.cold.1+0x20/0x20 [ 317.848571] ? lock_downgrade+0x900/0x900 [ 317.852743] ? check_preemption_disabled+0x48/0x280 [ 317.857774] should_fail.cold.4+0xa/0x17 [ 317.861842] ? rcu_softirq_qs+0x20/0x20 [ 317.865828] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 317.870947] ? is_bpf_text_address+0xd3/0x170 [ 317.875453] ? kernel_text_address+0x79/0xf0 [ 317.879876] ? __kernel_text_address+0xd/0x40 [ 317.884410] ? unwind_get_return_address+0x61/0xa0 [ 317.889382] ? __save_stack_trace+0x8d/0xf0 [ 317.893751] ? find_held_lock+0x36/0x1c0 [ 317.897826] ? usb_gadget_disconnect+0x58/0x640 [ 317.902517] ? do_syscall_64+0x1b9/0x820 [ 317.906598] ? perf_trace_sched_process_exec+0x860/0x860 [ 317.912068] __should_failslab+0x124/0x180 [ 317.916314] should_failslab+0x9/0x14 [ 317.920118] kmem_cache_alloc_trace+0x2d7/0x750 [ 317.924798] ? __might_sleep+0x95/0x190 [ 317.928786] apparmor_file_alloc_security+0x17b/0xac0 [ 317.933983] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 317.939532] ? apparmor_path_rename+0xcd0/0xcd0 [ 317.944225] ? rcu_read_lock_sched_held+0x14f/0x180 [ 317.949245] ? kmem_cache_alloc+0x33a/0x730 [ 317.953566] ? zap_class+0x640/0x640 [ 317.957303] security_file_alloc+0x4c/0xa0 [ 317.961548] __alloc_file+0x12a/0x470 [ 317.965355] ? file_free_rcu+0xd0/0xd0 [ 317.969261] ? find_held_lock+0x36/0x1c0 [ 317.973345] ? is_bpf_text_address+0xac/0x170 [ 317.977850] ? lock_downgrade+0x900/0x900 [ 317.982007] ? check_preemption_disabled+0x48/0x280 [ 317.987032] alloc_empty_file+0x72/0x170 [ 317.991099] path_openat+0x170/0x5150 [ 317.994915] ? rcu_softirq_qs+0x20/0x20 [ 317.998894] ? unwind_dump+0x190/0x190 [ 318.002979] ? zap_class+0x640/0x640 [ 318.006723] ? path_lookupat.isra.43+0xc00/0xc00 [ 318.011478] ? unwind_get_return_address+0x61/0xa0 [ 318.016419] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 318.021458] ? expand_files.part.8+0x571/0x9a0 [ 318.026049] ? find_held_lock+0x36/0x1c0 [ 318.030119] ? __alloc_fd+0x347/0x6e0 [ 318.033924] ? lock_downgrade+0x900/0x900 [ 318.038076] ? getname+0x19/0x20 [ 318.041454] ? kasan_check_read+0x11/0x20 [ 318.045605] ? do_raw_spin_unlock+0xa7/0x330 [ 318.050020] ? do_raw_spin_trylock+0x270/0x270 [ 318.054604] ? __lock_is_held+0xb5/0x140 [ 318.058665] ? __check_object_size+0xb1/0x782 [ 318.063199] ? _raw_spin_unlock+0x2c/0x50 [ 318.067350] ? __alloc_fd+0x347/0x6e0 [ 318.071167] do_filp_open+0x255/0x380 [ 318.074975] ? may_open_dev+0x100/0x100 [ 318.078968] ? get_unused_fd_flags+0x122/0x1a0 [ 318.083556] ? __alloc_fd+0x6e0/0x6e0 [ 318.087368] ? __lock_is_held+0xb5/0x140 [ 318.091448] do_sys_open+0x568/0x700 [ 318.095173] ? filp_open+0x80/0x80 [ 318.098727] ? trace_hardirqs_off_caller+0x300/0x300 [ 318.103832] ? do_sys_ftruncate+0x449/0x550 [ 318.108704] __x64_sys_open+0x7e/0xc0 [ 318.112521] do_syscall_64+0x1b9/0x820 [ 318.116414] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 318.121787] ? syscall_return_slowpath+0x5e0/0x5e0 [ 318.126733] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 318.131582] ? trace_hardirqs_on_caller+0x310/0x310 [ 318.136601] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 318.141716] ? prepare_exit_to_usermode+0x291/0x3b0 [ 318.146745] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 318.151611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.156802] RIP: 0033:0x4111a1 [ 318.159998] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 318.178897] RSP: 002b:00007f944a7f7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 318.186607] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 318.193874] RDX: 00007f944a7f7afa RSI: 0000000000000002 RDI: 00007f944a7f7af0 [ 318.201145] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 318.208415] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 08:44:55 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\r', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 318.215691] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:44:56 executing program 0 (fault-call:3 fault-nth:9): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:56 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000006c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:56 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0200000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 318.600659] FAULT_INJECTION: forcing a failure. [ 318.600659] name failslab, interval 1, probability 0, space 0, times 0 [ 318.621975] CPU: 1 PID: 11709 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 318.630485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.639853] Call Trace: [ 318.642461] dump_stack+0x244/0x39d 08:44:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="004c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 318.646109] ? dump_stack_print_info.cold.1+0x20/0x20 [ 318.651322] should_fail.cold.4+0xa/0x17 [ 318.655399] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 318.660512] ? down_write_nested+0x130/0x130 [ 318.664940] ? down_read+0x120/0x120 [ 318.668689] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 318.674250] ? zap_class+0x640/0x640 [ 318.677977] ? lock_acquire+0x1ed/0x520 [ 318.677994] ? lo_ioctl+0x8e/0x1d60 [ 318.678019] ? find_held_lock+0x36/0x1c0 [ 318.678042] ? __lock_is_held+0xb5/0x140 [ 318.685691] ? perf_trace_sched_process_exec+0x860/0x860 [ 318.685722] __should_failslab+0x124/0x180 [ 318.685744] should_failslab+0x9/0x14 [ 318.699315] kmem_cache_alloc_trace+0x2d7/0x750 [ 318.699334] ? check_preemption_disabled+0x48/0x280 [ 318.699361] __kthread_create_on_node+0x137/0x540 [ 318.707408] ? loop_get_status64+0x140/0x140 [ 318.707426] ? kthread_parkme+0xb0/0xb0 [ 318.707459] ? __lockdep_init_map+0x105/0x590 [ 318.734847] ? __lockdep_init_map+0x105/0x590 [ 318.739383] ? loop_get_status64+0x140/0x140 [ 318.743816] kthread_create_on_node+0xb1/0xe0 [ 318.748329] ? __kthread_create_on_node+0x540/0x540 [ 318.753366] ? kasan_check_read+0x11/0x20 [ 318.757537] lo_ioctl+0x7f6/0x1d60 [ 318.761113] ? lo_rw_aio+0x1ef0/0x1ef0 [ 318.765029] blkdev_ioctl+0x9ac/0x2010 [ 318.768962] ? blkpg_ioctl+0xc10/0xc10 [ 318.772888] ? lock_downgrade+0x900/0x900 [ 318.777045] ? check_preemption_disabled+0x48/0x280 [ 318.782074] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 318.787019] ? kasan_check_read+0x11/0x20 [ 318.791175] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 318.796465] ? rcu_softirq_qs+0x20/0x20 [ 318.800467] ? __fget+0x4d1/0x740 [ 318.803936] ? ksys_dup3+0x680/0x680 [ 318.807681] block_ioctl+0xee/0x130 [ 318.811328] ? blkdev_fallocate+0x400/0x400 [ 318.815659] do_vfs_ioctl+0x1de/0x1720 [ 318.819580] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 318.825142] ? ioctl_preallocate+0x300/0x300 [ 318.829558] ? __fget_light+0x2e9/0x430 [ 318.833538] ? fget_raw+0x20/0x20 [ 318.836998] ? rcu_read_lock_sched_held+0x14f/0x180 [ 318.842021] ? kmem_cache_free+0x24f/0x290 [ 318.846271] ? putname+0xf7/0x130 [ 318.849736] ? do_syscall_64+0x9a/0x820 [ 318.853737] ? do_syscall_64+0x9a/0x820 [ 318.857744] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 318.862357] ? security_file_ioctl+0x94/0xc0 [ 318.866779] ksys_ioctl+0xa9/0xd0 [ 318.870239] __x64_sys_ioctl+0x73/0xb0 [ 318.874137] do_syscall_64+0x1b9/0x820 [ 318.878046] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 318.883416] ? syscall_return_slowpath+0x5e0/0x5e0 [ 318.888350] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 318.893209] ? trace_hardirqs_on_caller+0x310/0x310 [ 318.898230] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 318.903249] ? prepare_exit_to_usermode+0x291/0x3b0 [ 318.908272] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 318.913141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.918333] RIP: 0033:0x4573d7 [ 318.921535] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.940453] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 08:44:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:56 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="7400000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 318.948178] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 318.955471] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 318.962741] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 318.970017] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 318.977294] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:44:56 executing program 0 (fault-call:3 fault-nth:10): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:56 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="4800000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:56 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000580", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:56 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 319.237646] XFS (loop2): Invalid superblock magic number [ 319.313969] FAULT_INJECTION: forcing a failure. [ 319.313969] name failslab, interval 1, probability 0, space 0, times 0 [ 319.345955] CPU: 0 PID: 11759 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 319.354492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.363857] Call Trace: [ 319.366471] dump_stack+0x244/0x39d [ 319.370128] ? dump_stack_print_info.cold.1+0x20/0x20 [ 319.375360] should_fail.cold.4+0xa/0x17 [ 319.379439] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 319.384549] ? pick_next_task_fair+0xa35/0x1c90 [ 319.389244] ? rcu_read_lock_sched_held+0x14f/0x180 [ 319.394281] ? enqueue_entity+0x34b/0x20d0 [ 319.398534] ? zap_class+0x640/0x640 [ 319.402266] ? print_usage_bug+0xc0/0xc0 [ 319.406347] ? __account_cfs_rq_runtime+0x790/0x790 [ 319.411386] ? find_held_lock+0x36/0x1c0 [ 319.415471] ? __lock_is_held+0xb5/0x140 [ 319.419576] ? perf_trace_sched_process_exec+0x860/0x860 [ 319.425063] __should_failslab+0x124/0x180 [ 319.429318] should_failslab+0x9/0x14 [ 319.433144] kmem_cache_alloc+0x2be/0x730 [ 319.437327] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 319.442374] __kernfs_new_node+0x127/0x8d0 [ 319.446645] ? trace_hardirqs_off_caller+0x300/0x300 [ 319.451791] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 319.456572] ? _raw_spin_unlock_irq+0x60/0x80 [ 319.461087] ? __schedule+0x168b/0x21d0 [ 319.465082] ? zap_class+0x640/0x640 [ 319.468844] ? zap_class+0x640/0x640 [ 319.472583] ? trace_hardirqs_on+0xbd/0x310 [ 319.476936] ? kasan_check_read+0x11/0x20 [ 319.481119] ? find_held_lock+0x36/0x1c0 [ 319.485212] kernfs_new_node+0x95/0x120 [ 319.489223] kernfs_create_dir_ns+0x4d/0x160 [ 319.493656] internal_create_group+0x5fc/0xd80 [ 319.498293] ? remove_files.isra.1+0x190/0x190 [ 319.502893] ? up_write+0x7b/0x220 [ 319.506448] ? down_write_nested+0x130/0x130 [ 319.510884] ? down_read+0x120/0x120 [ 319.514629] sysfs_create_group+0x1f/0x30 [ 319.518806] lo_ioctl+0x1307/0x1d60 [ 319.522462] ? lo_rw_aio+0x1ef0/0x1ef0 [ 319.526386] blkdev_ioctl+0x9ac/0x2010 [ 319.530353] ? blkpg_ioctl+0xc10/0xc10 [ 319.534271] ? lock_downgrade+0x900/0x900 [ 319.538440] ? check_preemption_disabled+0x48/0x280 [ 319.543485] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 319.548451] ? kasan_check_read+0x11/0x20 [ 319.552627] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 319.557961] ? rcu_softirq_qs+0x20/0x20 [ 319.561974] ? __fget+0x4d1/0x740 [ 319.565502] ? ksys_dup3+0x680/0x680 [ 319.569249] block_ioctl+0xee/0x130 [ 319.572894] ? blkdev_fallocate+0x400/0x400 [ 319.577238] do_vfs_ioctl+0x1de/0x1720 [ 319.581147] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 319.586722] ? ioctl_preallocate+0x300/0x300 [ 319.586740] ? __fget_light+0x2e9/0x430 [ 319.586762] ? fget_raw+0x20/0x20 [ 319.595145] ? rcu_read_lock_sched_held+0x14f/0x180 [ 319.595165] ? kmem_cache_free+0x24f/0x290 [ 319.595186] ? putname+0xf7/0x130 [ 319.611384] ? do_syscall_64+0x9a/0x820 [ 319.615375] ? do_syscall_64+0x9a/0x820 [ 319.619382] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 319.623984] ? security_file_ioctl+0x94/0xc0 [ 319.628416] ksys_ioctl+0xa9/0xd0 [ 319.631893] __x64_sys_ioctl+0x73/0xb0 [ 319.635804] do_syscall_64+0x1b9/0x820 [ 319.639722] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 319.645107] ? syscall_return_slowpath+0x5e0/0x5e0 [ 319.650061] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 319.654928] ? trace_hardirqs_on_caller+0x310/0x310 [ 319.659965] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 319.665003] ? prepare_exit_to_usermode+0x291/0x3b0 [ 319.670042] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 319.674896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.680076] RIP: 0033:0x4573d7 [ 319.683266] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.702165] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 08:44:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffff8c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 319.709878] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 319.717159] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 319.724419] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 319.731703] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 319.738974] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:44:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs5', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:57 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="7400000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:57 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="a000800080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:57 executing program 0 (fault-call:3 fault-nth:11): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 319.954859] EXT4-fs: 10 callbacks suppressed [ 319.954869] EXT4-fs (sda1): re-mounted. Opts: [ 320.034133] EXT4-fs (sda1): re-mounted. Opts: [ 320.097207] EXT4-fs (sda1): re-mounted. Opts: [ 320.152784] FAULT_INJECTION: forcing a failure. [ 320.152784] name failslab, interval 1, probability 0, space 0, times 0 [ 320.211699] CPU: 0 PID: 11839 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 320.220242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.220250] Call Trace: [ 320.220280] dump_stack+0x244/0x39d [ 320.220325] ? dump_stack_print_info.cold.1+0x20/0x20 [ 320.241142] ? radix_tree_tag_set+0x3d0/0x3d0 [ 320.245654] should_fail.cold.4+0xa/0x17 [ 320.249749] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 320.254907] ? kernfs_activate+0x8e/0x2c0 [ 320.259085] ? zap_class+0x640/0x640 [ 320.262808] ? lock_release+0xa10/0xa10 [ 320.266789] ? perf_trace_sched_process_exec+0x860/0x860 [ 320.272252] ? find_held_lock+0x36/0x1c0 [ 320.276326] ? __lock_is_held+0xb5/0x140 [ 320.280411] ? perf_trace_sched_process_exec+0x860/0x860 [ 320.285868] ? find_held_lock+0x36/0x1c0 [ 320.289949] __should_failslab+0x124/0x180 [ 320.294199] should_failslab+0x9/0x14 [ 320.298008] kmem_cache_alloc+0x2be/0x730 [ 320.302169] ? find_held_lock+0x36/0x1c0 [ 320.306258] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 320.311548] __kernfs_new_node+0x127/0x8d0 [ 320.315808] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 320.320572] ? kasan_check_write+0x14/0x20 [ 320.324820] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 320.329779] ? __kernfs_new_node+0x697/0x8d0 [ 320.334200] ? wait_for_completion+0x8a0/0x8a0 [ 320.338793] ? zap_class+0x640/0x640 [ 320.342518] ? kasan_check_write+0x14/0x20 [ 320.346761] ? __lock_is_held+0xb5/0x140 [ 320.350829] ? wait_for_completion+0x8a0/0x8a0 [ 320.355433] ? mutex_unlock+0xd/0x10 [ 320.359152] ? kernfs_activate+0x21a/0x2c0 [ 320.363423] kernfs_new_node+0x95/0x120 [ 320.367414] __kernfs_create_file+0x5a/0x340 [ 320.371838] sysfs_add_file_mode_ns+0x222/0x530 [ 320.376522] internal_create_group+0x3df/0xd80 [ 320.381143] ? remove_files.isra.1+0x190/0x190 [ 320.385754] ? up_write+0x7b/0x220 [ 320.389300] ? down_write_nested+0x130/0x130 [ 320.393720] ? down_read+0x120/0x120 [ 320.397458] sysfs_create_group+0x1f/0x30 [ 320.401610] lo_ioctl+0x1307/0x1d60 [ 320.405252] ? lo_rw_aio+0x1ef0/0x1ef0 [ 320.409145] blkdev_ioctl+0x9ac/0x2010 [ 320.413052] ? blkpg_ioctl+0xc10/0xc10 [ 320.416953] ? lock_downgrade+0x900/0x900 [ 320.421130] ? check_preemption_disabled+0x48/0x280 [ 320.426181] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 320.431117] ? kasan_check_read+0x11/0x20 [ 320.435271] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 320.440571] ? rcu_softirq_qs+0x20/0x20 [ 320.444562] ? __fget+0x4d1/0x740 [ 320.448041] ? ksys_dup3+0x680/0x680 [ 320.451788] block_ioctl+0xee/0x130 [ 320.455421] ? blkdev_fallocate+0x400/0x400 [ 320.459748] do_vfs_ioctl+0x1de/0x1720 [ 320.463649] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 320.469204] ? ioctl_preallocate+0x300/0x300 [ 320.473619] ? __fget_light+0x2e9/0x430 [ 320.477597] ? fget_raw+0x20/0x20 [ 320.481058] ? rcu_read_lock_sched_held+0x14f/0x180 [ 320.486084] ? kmem_cache_free+0x24f/0x290 [ 320.490324] ? putname+0xf7/0x130 [ 320.493785] ? do_syscall_64+0x9a/0x820 [ 320.497762] ? do_syscall_64+0x9a/0x820 [ 320.501747] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 320.506350] ? security_file_ioctl+0x94/0xc0 [ 320.510770] ksys_ioctl+0xa9/0xd0 [ 320.514232] __x64_sys_ioctl+0x73/0xb0 [ 320.518128] do_syscall_64+0x1b9/0x820 [ 320.522020] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 320.527395] ? syscall_return_slowpath+0x5e0/0x5e0 [ 320.532332] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 320.537199] ? trace_hardirqs_on_caller+0x310/0x310 [ 320.542227] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 320.547252] ? prepare_exit_to_usermode+0x291/0x3b0 [ 320.552285] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 320.557157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.562351] RIP: 0033:0x4573d7 [ 320.565553] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.584471] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 320.592199] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 320.599492] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:44:58 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0400000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:44:58 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0300000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:58 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="78667303", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="003f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 320.606775] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 320.614054] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 320.621330] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:44:58 executing program 0 (fault-call:3 fault-nth:12): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:58 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffff680", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 320.818365] EXT4-fs (sda1): re-mounted. Opts: [ 320.879820] EXT4-fs (sda1): re-mounted. Opts: 08:44:58 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000003f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:58 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\t', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 320.956712] EXT4-fs (sda1): re-mounted. Opts: 08:44:58 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0048000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 321.049747] FAULT_INJECTION: forcing a failure. [ 321.049747] name failslab, interval 1, probability 0, space 0, times 0 [ 321.062035] EXT4-fs (sda1): re-mounted. Opts: [ 321.081734] CPU: 1 PID: 11893 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 321.090284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.099664] Call Trace: [ 321.102293] dump_stack+0x244/0x39d [ 321.105948] ? dump_stack_print_info.cold.1+0x20/0x20 [ 321.111157] should_fail.cold.4+0xa/0x17 [ 321.115230] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 321.120361] ? lock_release+0xa10/0xa10 [ 321.124356] ? perf_trace_sched_process_exec+0x860/0x860 [ 321.129851] ? zap_class+0x640/0x640 [ 321.133581] ? find_held_lock+0x36/0x1c0 [ 321.137647] ? __lock_is_held+0xb5/0x140 [ 321.141715] ? perf_trace_sched_process_exec+0x860/0x860 [ 321.147158] ? kernfs_activate+0x21a/0x2c0 [ 321.151423] __should_failslab+0x124/0x180 [ 321.155721] should_failslab+0x9/0x14 [ 321.159541] kmem_cache_alloc+0x2be/0x730 [ 321.163704] ? lock_downgrade+0x900/0x900 [ 321.167877] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 321.172907] __kernfs_new_node+0x127/0x8d0 [ 321.177162] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 321.181937] ? zap_class+0x640/0x640 [ 321.185648] ? __lock_is_held+0xb5/0x140 [ 321.189710] ? wait_for_completion+0x8a0/0x8a0 [ 321.194323] ? mutex_unlock+0xd/0x10 [ 321.198046] ? kernfs_activate+0x21a/0x2c0 [ 321.202273] ? kernfs_walk_and_get_ns+0x340/0x340 [ 321.207123] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 321.212683] ? kernfs_link_sibling+0x1d2/0x3b0 [ 321.217303] kernfs_new_node+0x95/0x120 [ 321.221313] __kernfs_create_file+0x5a/0x340 [ 321.225735] sysfs_add_file_mode_ns+0x222/0x530 [ 321.230417] internal_create_group+0x3df/0xd80 [ 321.235040] ? remove_files.isra.1+0x190/0x190 [ 321.239615] ? up_write+0x7b/0x220 [ 321.243144] ? down_write_nested+0x130/0x130 [ 321.247544] ? down_read+0x120/0x120 [ 321.251285] sysfs_create_group+0x1f/0x30 [ 321.255439] lo_ioctl+0x1307/0x1d60 [ 321.259069] ? lo_rw_aio+0x1ef0/0x1ef0 [ 321.262959] blkdev_ioctl+0x9ac/0x2010 [ 321.266857] ? blkpg_ioctl+0xc10/0xc10 [ 321.270736] ? lock_downgrade+0x900/0x900 [ 321.274872] ? check_preemption_disabled+0x48/0x280 [ 321.279902] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 321.284846] ? kasan_check_read+0x11/0x20 [ 321.288995] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 321.294268] ? rcu_softirq_qs+0x20/0x20 [ 321.298239] ? __fget+0x4d1/0x740 [ 321.301708] ? ksys_dup3+0x680/0x680 [ 321.305438] block_ioctl+0xee/0x130 [ 321.309056] ? blkdev_fallocate+0x400/0x400 [ 321.313371] do_vfs_ioctl+0x1de/0x1720 [ 321.317261] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 321.322807] ? ioctl_preallocate+0x300/0x300 [ 321.327230] ? __fget_light+0x2e9/0x430 [ 321.331229] ? fget_raw+0x20/0x20 [ 321.334716] ? rcu_read_lock_sched_held+0x14f/0x180 [ 321.339756] ? kmem_cache_free+0x24f/0x290 [ 321.343986] ? putname+0xf7/0x130 [ 321.347449] ? do_syscall_64+0x9a/0x820 [ 321.351423] ? do_syscall_64+0x9a/0x820 [ 321.355443] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 321.360046] ? security_file_ioctl+0x94/0xc0 [ 321.364460] ksys_ioctl+0xa9/0xd0 [ 321.367932] __x64_sys_ioctl+0x73/0xb0 [ 321.371837] do_syscall_64+0x1b9/0x820 [ 321.375737] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 321.381120] ? syscall_return_slowpath+0x5e0/0x5e0 [ 321.386075] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 321.390938] ? trace_hardirqs_on_caller+0x310/0x310 [ 321.395961] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 321.400982] ? prepare_exit_to_usermode+0x291/0x3b0 [ 321.406007] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 321.410860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.416047] RIP: 0033:0x4573d7 [ 321.419257] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 321.438163] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 321.445877] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 321.453140] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 321.460413] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 321.467668] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 321.474966] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:44:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0006000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:59 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0020000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:44:59 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="004c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:44:59 executing program 0 (fault-call:3 fault-nth:13): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 321.676101] EXT4-fs (sda1): re-mounted. Opts: 08:44:59 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:44:59 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="f5ffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 321.909331] EXT4-fs (sda1): re-mounted. Opts: [ 321.919382] FAULT_INJECTION: forcing a failure. [ 321.919382] name failslab, interval 1, probability 0, space 0, times 0 [ 321.931855] CPU: 0 PID: 11953 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 321.940357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.949717] Call Trace: [ 321.952321] dump_stack+0x244/0x39d [ 321.955969] ? dump_stack_print_info.cold.1+0x20/0x20 [ 321.961171] ? __kernel_text_address+0xd/0x40 [ 321.965682] ? unwind_get_return_address+0x61/0xa0 [ 321.970629] should_fail.cold.4+0xa/0x17 [ 321.974727] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 321.979848] ? save_stack+0xa9/0xd0 [ 321.983498] ? kasan_kmalloc+0xc7/0xe0 [ 321.987388] ? kasan_slab_alloc+0x12/0x20 [ 321.991540] ? kmem_cache_alloc+0x12e/0x730 [ 321.996393] ? radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 322.002742] ? idr_get_free+0x7a4/0xf70 [ 322.006722] ? idr_alloc_u32+0x1d4/0x3a0 [ 322.010795] ? idr_alloc_cyclic+0x166/0x350 [ 322.015124] ? kernfs_new_node+0x95/0x120 [ 322.019277] ? __kernfs_create_file+0x5a/0x340 [ 322.023863] ? sysfs_add_file_mode_ns+0x222/0x530 [ 322.028713] ? internal_create_group+0x3df/0xd80 [ 322.033472] ? sysfs_create_group+0x1f/0x30 [ 322.037810] ? lo_ioctl+0x1307/0x1d60 [ 322.041618] ? blkdev_ioctl+0x9ac/0x2010 [ 322.045697] ? block_ioctl+0xee/0x130 [ 322.049507] ? do_vfs_ioctl+0x1de/0x1720 [ 322.053570] ? ksys_ioctl+0xa9/0xd0 [ 322.057201] ? __x64_sys_ioctl+0x73/0xb0 [ 322.061273] ? do_syscall_64+0x1b9/0x820 [ 322.065356] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.070734] ? print_usage_bug+0xc0/0xc0 [ 322.074887] ? rcu_read_lock_sched_held+0x14f/0x180 [ 322.079912] ? zap_class+0x640/0x640 [ 322.083640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.089192] ? check_preemption_disabled+0x48/0x280 [ 322.094225] ? __lock_is_held+0xb5/0x140 [ 322.098301] __should_failslab+0x124/0x180 [ 322.102560] should_failslab+0x9/0x14 [ 322.106370] kmem_cache_alloc+0x47/0x730 [ 322.110612] ? radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 322.116505] radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 322.122228] idr_get_free+0x7a4/0xf70 [ 322.126053] ? radix_tree_iter_tag_clear+0x90/0x90 [ 322.130989] ? __save_stack_trace+0x8d/0xf0 [ 322.135333] ? save_stack+0xa9/0xd0 [ 322.138967] ? save_stack+0x43/0xd0 [ 322.142607] ? kasan_slab_alloc+0x12/0x20 [ 322.146776] ? kmem_cache_alloc+0x12e/0x730 [ 322.151104] ? __kernfs_new_node+0x127/0x8d0 [ 322.155522] ? __kernfs_create_file+0x5a/0x340 [ 322.160139] ? sysfs_add_file_mode_ns+0x222/0x530 [ 322.164984] ? internal_create_group+0x3df/0xd80 [ 322.169746] ? sysfs_create_group+0x1f/0x30 [ 322.174069] ? lo_ioctl+0x1307/0x1d60 [ 322.177884] ? blkdev_ioctl+0x9ac/0x2010 [ 322.181949] ? block_ioctl+0xee/0x130 [ 322.185755] ? do_vfs_ioctl+0x1de/0x1720 [ 322.189822] ? ksys_ioctl+0xa9/0xd0 [ 322.193548] ? __x64_sys_ioctl+0x73/0xb0 [ 322.197624] ? do_syscall_64+0x1b9/0x820 [ 322.201715] ? find_held_lock+0x36/0x1c0 [ 322.205801] idr_alloc_u32+0x1d4/0x3a0 [ 322.209717] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 322.214575] ? lock_acquire+0x1ed/0x520 [ 322.218555] ? __kernfs_new_node+0x14e/0x8d0 [ 322.222969] ? __lock_is_held+0xb5/0x140 [ 322.227044] idr_alloc_cyclic+0x166/0x350 [ 322.231230] ? idr_alloc+0x1b0/0x1b0 [ 322.234967] ? __radix_tree_preload+0x1f7/0x280 [ 322.239649] __kernfs_new_node+0x1ee/0x8d0 [ 322.243907] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 322.248691] ? kasan_check_write+0x14/0x20 [ 322.252938] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 322.257875] ? __kernfs_new_node+0x697/0x8d0 [ 322.262294] ? wait_for_completion+0x8a0/0x8a0 [ 322.266884] ? zap_class+0x640/0x640 [ 322.270608] ? kasan_check_write+0x14/0x20 [ 322.274855] ? __lock_is_held+0xb5/0x140 [ 322.278927] ? wait_for_completion+0x8a0/0x8a0 [ 322.283528] ? mutex_unlock+0xd/0x10 [ 322.287248] ? kernfs_activate+0x21a/0x2c0 [ 322.291505] kernfs_new_node+0x95/0x120 [ 322.295494] __kernfs_create_file+0x5a/0x340 [ 322.299918] sysfs_add_file_mode_ns+0x222/0x530 [ 322.304606] internal_create_group+0x3df/0xd80 [ 322.309207] ? remove_files.isra.1+0x190/0x190 [ 322.313798] ? up_write+0x7b/0x220 [ 322.317351] ? down_write_nested+0x130/0x130 [ 322.321767] ? down_read+0x120/0x120 [ 322.325502] sysfs_create_group+0x1f/0x30 [ 322.329654] lo_ioctl+0x1307/0x1d60 [ 322.333317] ? lo_rw_aio+0x1ef0/0x1ef0 [ 322.337212] blkdev_ioctl+0x9ac/0x2010 [ 322.341105] ? blkpg_ioctl+0xc10/0xc10 [ 322.345002] ? lock_downgrade+0x900/0x900 [ 322.349151] ? check_preemption_disabled+0x48/0x280 [ 322.354195] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 322.359132] ? kasan_check_read+0x11/0x20 [ 322.363290] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 322.368574] ? rcu_softirq_qs+0x20/0x20 [ 322.372561] ? __fget+0x4d1/0x740 [ 322.376032] ? ksys_dup3+0x680/0x680 [ 322.379769] block_ioctl+0xee/0x130 [ 322.383406] ? blkdev_fallocate+0x400/0x400 [ 322.387738] do_vfs_ioctl+0x1de/0x1720 [ 322.391659] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 322.397231] ? ioctl_preallocate+0x300/0x300 [ 322.401645] ? __fget_light+0x2e9/0x430 [ 322.405638] ? fget_raw+0x20/0x20 [ 322.409106] ? rcu_read_lock_sched_held+0x14f/0x180 [ 322.414131] ? kmem_cache_free+0x24f/0x290 [ 322.418375] ? putname+0xf7/0x130 [ 322.421836] ? do_syscall_64+0x9a/0x820 [ 322.425819] ? do_syscall_64+0x9a/0x820 [ 322.429801] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 322.434395] ? security_file_ioctl+0x94/0xc0 [ 322.438813] ksys_ioctl+0xa9/0xd0 [ 322.442279] __x64_sys_ioctl+0x73/0xb0 [ 322.446171] do_syscall_64+0x1b9/0x820 [ 322.450060] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 322.455530] ? syscall_return_slowpath+0x5e0/0x5e0 [ 322.460514] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 322.465368] ? trace_hardirqs_on_caller+0x310/0x310 [ 322.470390] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 322.475415] ? prepare_exit_to_usermode+0x291/0x3b0 [ 322.480462] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 322.485323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.490532] RIP: 0033:0x4573d7 08:45:00 executing program 0 (fault-call:3 fault-nth:14): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 322.493749] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.512655] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 322.520382] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 322.527655] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 322.534947] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 322.542220] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 322.549489] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 322.632694] EXT4-fs (sda1): re-mounted. Opts: 08:45:00 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="7a00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:45:00 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fdfdffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="4800000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 322.871725] FAULT_INJECTION: forcing a failure. [ 322.871725] name failslab, interval 1, probability 0, space 0, times 0 [ 322.913106] CPU: 0 PID: 11988 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 322.921655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.931043] Call Trace: [ 322.933664] dump_stack+0x244/0x39d [ 322.937343] ? dump_stack_print_info.cold.1+0x20/0x20 [ 322.942584] should_fail.cold.4+0xa/0x17 [ 322.946702] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 322.951830] ? lock_release+0xa10/0xa10 [ 322.955823] ? perf_trace_sched_process_exec+0x860/0x860 [ 322.961300] ? zap_class+0x640/0x640 [ 322.965041] ? find_held_lock+0x36/0x1c0 [ 322.969132] ? __lock_is_held+0xb5/0x140 [ 322.973211] ? hwsim_cloned_frame_received_nl+0x148/0x19a0 [ 322.978865] ? perf_trace_sched_process_exec+0x860/0x860 [ 322.984346] ? kernfs_activate+0x21a/0x2c0 [ 322.988607] __should_failslab+0x124/0x180 [ 322.992865] should_failslab+0x9/0x14 [ 322.996699] kmem_cache_alloc+0x2be/0x730 [ 323.000876] ? lock_downgrade+0x900/0x900 [ 323.005045] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 323.005068] __kernfs_new_node+0x127/0x8d0 [ 323.005089] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 323.005122] ? zap_class+0x640/0x640 [ 323.014395] ? __lock_is_held+0xb5/0x140 [ 323.014414] ? wait_for_completion+0x8a0/0x8a0 [ 323.014446] ? mutex_unlock+0xd/0x10 [ 323.014462] ? kernfs_activate+0x21a/0x2c0 [ 323.014481] ? kernfs_walk_and_get_ns+0x340/0x340 [ 323.014513] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 323.049909] ? kernfs_link_sibling+0x1d2/0x3b0 [ 323.054519] kernfs_new_node+0x95/0x120 [ 323.058504] __kernfs_create_file+0x5a/0x340 [ 323.062933] sysfs_add_file_mode_ns+0x222/0x530 [ 323.067619] internal_create_group+0x3df/0xd80 [ 323.072229] ? remove_files.isra.1+0x190/0x190 [ 323.076815] ? up_write+0x7b/0x220 [ 323.080357] ? down_write_nested+0x130/0x130 [ 323.084794] ? down_read+0x120/0x120 [ 323.088526] sysfs_create_group+0x1f/0x30 [ 323.092695] lo_ioctl+0x1307/0x1d60 [ 323.096356] ? lo_rw_aio+0x1ef0/0x1ef0 [ 323.100249] blkdev_ioctl+0x9ac/0x2010 [ 323.104142] ? blkpg_ioctl+0xc10/0xc10 [ 323.108056] ? lock_downgrade+0x900/0x900 [ 323.112204] ? check_preemption_disabled+0x48/0x280 [ 323.117240] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 323.122178] ? kasan_check_read+0x11/0x20 [ 323.126332] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 323.131618] ? rcu_softirq_qs+0x20/0x20 [ 323.135607] ? __fget+0x4d1/0x740 [ 323.139073] ? ksys_dup3+0x680/0x680 [ 323.142804] block_ioctl+0xee/0x130 [ 323.146447] ? blkdev_fallocate+0x400/0x400 [ 323.150772] do_vfs_ioctl+0x1de/0x1720 [ 323.154703] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 323.160250] ? ioctl_preallocate+0x300/0x300 [ 323.164663] ? __fget_light+0x2e9/0x430 [ 323.168659] ? fget_raw+0x20/0x20 [ 323.172150] ? rcu_read_lock_sched_held+0x14f/0x180 [ 323.177191] ? kmem_cache_free+0x24f/0x290 [ 323.181431] ? putname+0xf7/0x130 [ 323.184890] ? do_syscall_64+0x9a/0x820 [ 323.188870] ? do_syscall_64+0x9a/0x820 [ 323.192853] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 323.197443] ? security_file_ioctl+0x94/0xc0 [ 323.201860] ksys_ioctl+0xa9/0xd0 [ 323.205322] __x64_sys_ioctl+0x73/0xb0 [ 323.209215] do_syscall_64+0x1b9/0x820 [ 323.213108] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 323.218500] ? syscall_return_slowpath+0x5e0/0x5e0 [ 323.223458] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 323.228322] ? trace_hardirqs_on_caller+0x310/0x310 [ 323.233346] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 323.238393] ? prepare_exit_to_usermode+0x291/0x3b0 [ 323.243440] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 323.248321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.253517] RIP: 0033:0x4573d7 [ 323.256743] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.275644] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 323.283370] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 323.290636] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 323.297908] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 323.305177] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 08:45:00 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fdffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 323.312475] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 323.327020] XFS (loop2): Invalid superblock magic number 08:45:01 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="6800000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:45:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:45:01 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0600000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:45:01 executing program 0 (fault-call:3 fault-nth:15): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:01 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="c0ed000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000080080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:01 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000001f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:45:01 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000100080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 323.824054] XFS (loop2): Invalid superblock magic number 08:45:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000100080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 324.009236] FAULT_INJECTION: forcing a failure. [ 324.009236] name failslab, interval 1, probability 0, space 0, times 0 [ 324.050247] CPU: 1 PID: 12106 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 324.058784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.068136] Call Trace: [ 324.070744] dump_stack+0x244/0x39d [ 324.074390] ? dump_stack_print_info.cold.1+0x20/0x20 [ 324.079598] should_fail.cold.4+0xa/0x17 [ 324.083681] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 324.088800] ? lock_release+0xa10/0xa10 [ 324.092778] ? perf_trace_sched_process_exec+0x860/0x860 [ 324.098237] ? zap_class+0x640/0x640 [ 324.101966] ? find_held_lock+0x36/0x1c0 [ 324.106039] ? __lock_is_held+0xb5/0x140 [ 324.110640] ? perf_trace_sched_process_exec+0x860/0x860 [ 324.116108] ? kernfs_activate+0x21a/0x2c0 [ 324.120357] __should_failslab+0x124/0x180 [ 324.124603] should_failslab+0x9/0x14 [ 324.128406] kmem_cache_alloc+0x2be/0x730 [ 324.132565] ? lock_downgrade+0x900/0x900 [ 324.136731] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 324.141756] __kernfs_new_node+0x127/0x8d0 [ 324.146012] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 324.150781] ? zap_class+0x640/0x640 [ 324.154512] ? __lock_is_held+0xb5/0x140 [ 324.158590] ? wait_for_completion+0x8a0/0x8a0 [ 324.163195] ? mutex_unlock+0xd/0x10 [ 324.166911] ? kernfs_activate+0x21a/0x2c0 [ 324.171166] ? kernfs_walk_and_get_ns+0x340/0x340 [ 324.176037] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 324.181574] ? kernfs_link_sibling+0x1d2/0x3b0 [ 324.186167] kernfs_new_node+0x95/0x120 [ 324.190158] __kernfs_create_file+0x5a/0x340 [ 324.194580] sysfs_add_file_mode_ns+0x222/0x530 [ 324.199268] internal_create_group+0x3df/0xd80 [ 324.203870] ? remove_files.isra.1+0x190/0x190 [ 324.208467] ? up_write+0x7b/0x220 [ 324.212021] ? down_write_nested+0x130/0x130 [ 324.216436] ? down_read+0x120/0x120 [ 324.220171] sysfs_create_group+0x1f/0x30 [ 324.224332] lo_ioctl+0x1307/0x1d60 [ 324.227970] ? lo_rw_aio+0x1ef0/0x1ef0 [ 324.231883] blkdev_ioctl+0x9ac/0x2010 [ 324.235779] ? blkpg_ioctl+0xc10/0xc10 [ 324.239683] ? lock_downgrade+0x900/0x900 [ 324.243838] ? check_preemption_disabled+0x48/0x280 [ 324.248880] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 324.253823] ? kasan_check_read+0x11/0x20 [ 324.257980] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 324.263273] ? rcu_softirq_qs+0x20/0x20 [ 324.267271] ? __fget+0x4d1/0x740 [ 324.270749] ? ksys_dup3+0x680/0x680 [ 324.274516] block_ioctl+0xee/0x130 [ 324.278148] ? blkdev_fallocate+0x400/0x400 [ 324.282504] do_vfs_ioctl+0x1de/0x1720 [ 324.286413] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 324.291963] ? ioctl_preallocate+0x300/0x300 [ 324.296385] ? __fget_light+0x2e9/0x430 [ 324.300367] ? fget_raw+0x20/0x20 [ 324.303826] ? rcu_read_lock_sched_held+0x14f/0x180 [ 324.308867] ? kmem_cache_free+0x24f/0x290 [ 324.313119] ? putname+0xf7/0x130 [ 324.316578] ? do_syscall_64+0x9a/0x820 [ 324.320552] ? do_syscall_64+0x9a/0x820 [ 324.324533] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 324.329125] ? security_file_ioctl+0x94/0xc0 [ 324.333541] ksys_ioctl+0xa9/0xd0 [ 324.337006] __x64_sys_ioctl+0x73/0xb0 [ 324.340899] do_syscall_64+0x1b9/0x820 [ 324.344796] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 324.350168] ? syscall_return_slowpath+0x5e0/0x5e0 [ 324.355132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 324.359981] ? trace_hardirqs_on_caller+0x310/0x310 [ 324.365000] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 324.370022] ? prepare_exit_to_usermode+0x291/0x3b0 [ 324.375055] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 324.379908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.385098] RIP: 0033:0x4573d7 [ 324.388300] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.407204] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 324.414923] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 324.422198] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 324.429465] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 324.436739] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 324.444006] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:45:02 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="6c00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:45:02 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="1000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:02 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000180", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:45:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000007480", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 324.618748] XFS (loop2): Invalid superblock magic number [ 324.724106] XFS (loop2): Invalid superblock magic number 08:45:02 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000006880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:45:02 executing program 0 (fault-call:3 fault-nth:16): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:02 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fdfdffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:45:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:45:02 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0074000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000003f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 325.014068] EXT4-fs: 12 callbacks suppressed [ 325.014121] EXT4-fs (sda1): re-mounted. Opts: [ 325.062346] FAULT_INJECTION: forcing a failure. [ 325.062346] name failslab, interval 1, probability 0, space 0, times 0 [ 325.126216] CPU: 1 PID: 12209 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 325.134760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.144120] Call Trace: [ 325.146755] dump_stack+0x244/0x39d [ 325.150413] ? dump_stack_print_info.cold.1+0x20/0x20 [ 325.155640] should_fail.cold.4+0xa/0x17 [ 325.159741] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 325.164879] ? lock_release+0xa10/0xa10 [ 325.168874] ? perf_trace_sched_process_exec+0x860/0x860 [ 325.174365] ? zap_class+0x640/0x640 [ 325.178107] ? find_held_lock+0x36/0x1c0 [ 325.182201] ? __lock_is_held+0xb5/0x140 [ 325.186293] ? perf_trace_sched_process_exec+0x860/0x860 [ 325.191760] ? kernfs_activate+0x21a/0x2c0 [ 325.196024] __should_failslab+0x124/0x180 [ 325.200285] should_failslab+0x9/0x14 [ 325.204096] kmem_cache_alloc+0x2be/0x730 [ 325.208251] ? lock_downgrade+0x900/0x900 [ 325.212431] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 325.217465] __kernfs_new_node+0x127/0x8d0 [ 325.221737] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 325.226499] ? zap_class+0x640/0x640 [ 325.230230] ? __lock_is_held+0xb5/0x140 [ 325.234293] ? wait_for_completion+0x8a0/0x8a0 [ 325.238916] ? mutex_unlock+0xd/0x10 [ 325.242656] ? kernfs_activate+0x21a/0x2c0 [ 325.246913] ? kernfs_walk_and_get_ns+0x340/0x340 [ 325.251764] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 325.257305] ? kernfs_link_sibling+0x1d2/0x3b0 [ 325.261901] kernfs_new_node+0x95/0x120 [ 325.265889] __kernfs_create_file+0x5a/0x340 [ 325.270305] sysfs_add_file_mode_ns+0x222/0x530 [ 325.274990] internal_create_group+0x3df/0xd80 [ 325.279589] ? remove_files.isra.1+0x190/0x190 [ 325.284173] ? up_write+0x7b/0x220 [ 325.287744] ? down_write_nested+0x130/0x130 [ 325.292169] ? down_read+0x120/0x120 [ 325.295910] sysfs_create_group+0x1f/0x30 [ 325.300062] lo_ioctl+0x1307/0x1d60 [ 325.303711] ? lo_rw_aio+0x1ef0/0x1ef0 [ 325.307608] blkdev_ioctl+0x9ac/0x2010 [ 325.311521] ? blkpg_ioctl+0xc10/0xc10 [ 325.315428] ? lock_downgrade+0x900/0x900 [ 325.319580] ? check_preemption_disabled+0x48/0x280 [ 325.324619] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 325.329555] ? kasan_check_read+0x11/0x20 [ 325.333733] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 325.339013] ? rcu_softirq_qs+0x20/0x20 [ 325.343037] ? __fget+0x4d1/0x740 [ 325.346502] ? ksys_dup3+0x680/0x680 [ 325.350237] block_ioctl+0xee/0x130 [ 325.353869] ? blkdev_fallocate+0x400/0x400 [ 325.358214] do_vfs_ioctl+0x1de/0x1720 [ 325.362104] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 325.367659] ? ioctl_preallocate+0x300/0x300 [ 325.372082] ? __fget_light+0x2e9/0x430 [ 325.376060] ? fget_raw+0x20/0x20 [ 325.379528] ? rcu_read_lock_sched_held+0x14f/0x180 [ 325.384548] ? kmem_cache_free+0x24f/0x290 [ 325.388798] ? putname+0xf7/0x130 [ 325.392262] ? do_syscall_64+0x9a/0x820 [ 325.396240] ? do_syscall_64+0x9a/0x820 [ 325.400222] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 325.404817] ? security_file_ioctl+0x94/0xc0 [ 325.409235] ksys_ioctl+0xa9/0xd0 [ 325.412718] __x64_sys_ioctl+0x73/0xb0 [ 325.416626] do_syscall_64+0x1b9/0x820 [ 325.420542] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 325.425922] ? syscall_return_slowpath+0x5e0/0x5e0 [ 325.430853] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 325.435708] ? trace_hardirqs_on_caller+0x310/0x310 [ 325.440740] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 325.445765] ? prepare_exit_to_usermode+0x291/0x3b0 [ 325.450805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 325.455666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.460869] RIP: 0033:0x4573d7 08:45:03 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000580", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 325.464068] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.482979] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 325.490694] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 325.497969] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 325.505253] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 325.512527] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 325.519797] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 325.539100] EXT4-fs (sda1): re-mounted. Opts: 08:45:03 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="1000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 325.591715] XFS (loop2): Invalid superblock magic number 08:45:03 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fcfdffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="786673ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 325.836110] EXT4-fs (sda1): re-mounted. Opts: 08:45:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000380", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:03 executing program 0 (fault-call:3 fault-nth:17): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:03 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="fffffffd80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:45:03 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0700000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 326.111389] FAULT_INJECTION: forcing a failure. [ 326.111389] name failslab, interval 1, probability 0, space 0, times 0 [ 326.144704] CPU: 1 PID: 12304 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 326.153229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.162591] Call Trace: [ 326.165216] dump_stack+0x244/0x39d [ 326.168867] ? dump_stack_print_info.cold.1+0x20/0x20 [ 326.174074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.179627] should_fail.cold.4+0xa/0x17 [ 326.179648] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 326.179665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.179704] ? wake_up_klogd+0x11a/0x180 [ 326.188879] ? console_device+0xc0/0xc0 [ 326.188903] ? __down_trylock_console_sem+0x151/0x1f0 [ 326.188924] ? zap_class+0x640/0x640 [ 326.188942] ? vprintk_emit+0x293/0x990 [ 326.215381] ? find_held_lock+0x36/0x1c0 [ 326.219454] ? __lock_is_held+0xb5/0x140 [ 326.223520] ? iw_cm_disconnect+0x118/0x350 [ 326.227876] ? perf_trace_sched_process_exec+0x860/0x860 [ 326.233352] ? vprintk_default+0x28/0x30 [ 326.237422] __should_failslab+0x124/0x180 [ 326.241683] should_failslab+0x9/0x14 [ 326.245494] kmem_cache_alloc_trace+0x2d7/0x750 [ 326.250178] kobject_uevent_env+0x2f3/0x101e [ 326.254609] kobject_uevent+0x1f/0x24 [ 326.258415] lo_ioctl+0x1385/0x1d60 [ 326.262055] ? lo_rw_aio+0x1ef0/0x1ef0 [ 326.265948] blkdev_ioctl+0x9ac/0x2010 [ 326.269842] ? blkpg_ioctl+0xc10/0xc10 [ 326.273732] ? lock_downgrade+0x900/0x900 [ 326.277893] ? check_preemption_disabled+0x48/0x280 [ 326.282938] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 326.287879] ? kasan_check_read+0x11/0x20 [ 326.292036] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 326.297331] ? rcu_softirq_qs+0x20/0x20 [ 326.301335] ? __fget+0x4d1/0x740 [ 326.304815] ? ksys_dup3+0x680/0x680 [ 326.308546] block_ioctl+0xee/0x130 [ 326.312179] ? blkdev_fallocate+0x400/0x400 [ 326.316511] do_vfs_ioctl+0x1de/0x1720 [ 326.320405] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 326.325955] ? ioctl_preallocate+0x300/0x300 [ 326.330371] ? __fget_light+0x2e9/0x430 [ 326.334350] ? fget_raw+0x20/0x20 [ 326.337811] ? rcu_read_lock_sched_held+0x14f/0x180 [ 326.342833] ? kmem_cache_free+0x24f/0x290 [ 326.347071] ? putname+0xf7/0x130 [ 326.350540] ? do_syscall_64+0x9a/0x820 [ 326.354517] ? do_syscall_64+0x9a/0x820 [ 326.358493] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 326.363086] ? security_file_ioctl+0x94/0xc0 [ 326.367501] ksys_ioctl+0xa9/0xd0 [ 326.370962] __x64_sys_ioctl+0x73/0xb0 [ 326.374861] do_syscall_64+0x1b9/0x820 [ 326.378754] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 326.384133] ? syscall_return_slowpath+0x5e0/0x5e0 [ 326.389064] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 326.393926] ? trace_hardirqs_on_caller+0x310/0x310 [ 326.398953] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 326.403986] ? prepare_exit_to_usermode+0x291/0x3b0 [ 326.409015] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 326.413872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.419060] RIP: 0033:0x4573d7 [ 326.422262] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.441163] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 326.448894] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 08:45:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:45:04 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 326.456220] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 326.463508] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 326.470792] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 326.478064] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 326.495157] EXT4-fs (sda1): re-mounted. Opts: [ 326.599277] EXT4-fs (sda1): re-mounted. Opts: 08:45:04 executing program 0 (fault-call:3 fault-nth:18): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 326.637644] EXT4-fs (sda1): re-mounted. Opts: 08:45:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000a000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 326.683243] XFS (loop2): Invalid superblock magic number 08:45:04 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0003000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:45:04 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0800000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:45:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="78667380", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 326.831509] FAULT_INJECTION: forcing a failure. [ 326.831509] name failslab, interval 1, probability 0, space 0, times 0 [ 326.907954] CPU: 0 PID: 12352 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 326.916486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.925848] Call Trace: [ 326.928458] dump_stack+0x244/0x39d [ 326.932116] ? dump_stack_print_info.cold.1+0x20/0x20 [ 326.937316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.942885] should_fail.cold.4+0xa/0x17 [ 326.946969] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 326.952096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 08:45:04 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0700000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 326.957671] ? wake_up_klogd+0x11a/0x180 [ 326.961762] ? console_device+0xc0/0xc0 [ 326.961785] ? __down_trylock_console_sem+0x151/0x1f0 [ 326.961807] ? zap_class+0x640/0x640 [ 326.961822] ? vprintk_emit+0x293/0x990 [ 326.961846] ? find_held_lock+0x36/0x1c0 [ 326.961867] ? __lock_is_held+0xb5/0x140 [ 326.985639] EXT4-fs (sda1): re-mounted. Opts: [ 326.986867] ? perf_trace_sched_process_exec+0x860/0x860 [ 326.986889] ? vprintk_default+0x28/0x30 [ 326.986917] __should_failslab+0x124/0x180 [ 327.001037] should_failslab+0x9/0x14 [ 327.001057] kmem_cache_alloc_trace+0x2d7/0x750 [ 327.001087] kobject_uevent_env+0x2f3/0x101e [ 327.001113] kobject_uevent+0x1f/0x24 [ 327.001137] lo_ioctl+0x1385/0x1d60 [ 327.009190] ? lo_rw_aio+0x1ef0/0x1ef0 [ 327.009208] blkdev_ioctl+0x9ac/0x2010 [ 327.009225] ? blkpg_ioctl+0xc10/0xc10 [ 327.009241] ? lock_downgrade+0x900/0x900 [ 327.009258] ? check_preemption_disabled+0x48/0x280 [ 327.009281] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 327.051526] ? kasan_check_read+0x11/0x20 [ 327.055728] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 327.061028] ? rcu_softirq_qs+0x20/0x20 [ 327.065070] ? __fget+0x4d1/0x740 [ 327.068560] ? ksys_dup3+0x680/0x680 [ 327.072303] block_ioctl+0xee/0x130 [ 327.075950] ? blkdev_fallocate+0x400/0x400 [ 327.080296] do_vfs_ioctl+0x1de/0x1720 [ 327.084201] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 327.089771] ? ioctl_preallocate+0x300/0x300 [ 327.089790] ? __fget_light+0x2e9/0x430 [ 327.089808] ? fget_raw+0x20/0x20 [ 327.089826] ? rcu_read_lock_sched_held+0x14f/0x180 [ 327.089848] ? kmem_cache_free+0x24f/0x290 [ 327.101717] ? putname+0xf7/0x130 [ 327.114423] ? do_syscall_64+0x9a/0x820 [ 327.118418] ? do_syscall_64+0x9a/0x820 [ 327.122417] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 327.127032] ? security_file_ioctl+0x94/0xc0 [ 327.131471] ksys_ioctl+0xa9/0xd0 [ 327.134959] __x64_sys_ioctl+0x73/0xb0 [ 327.138855] do_syscall_64+0x1b9/0x820 [ 327.142752] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 327.148123] ? syscall_return_slowpath+0x5e0/0x5e0 [ 327.153059] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.157911] ? trace_hardirqs_on_caller+0x310/0x310 [ 327.162934] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 327.167954] ? prepare_exit_to_usermode+0x291/0x3b0 [ 327.172980] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.177836] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.183031] RIP: 0033:0x4573d7 [ 327.186228] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.205148] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 327.212859] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 327.220127] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 327.227395] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 327.234663] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 327.241956] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 327.293724] EXT4-fs (sda1): re-mounted. Opts: 08:45:04 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="006c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 327.317784] EXT4-fs (sda1): re-mounted. Opts: 08:45:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="f5ffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:05 executing program 0 (fault-call:3 fault-nth:19): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\n', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:45:05 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0300000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:45:05 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0300000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 327.590695] EXT4-fs (sda1): re-mounted. Opts: [ 327.634417] FAULT_INJECTION: forcing a failure. [ 327.634417] name failslab, interval 1, probability 0, space 0, times 0 [ 327.646405] CPU: 0 PID: 12427 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 327.654913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.664270] Call Trace: [ 327.666875] dump_stack+0x244/0x39d [ 327.670521] ? dump_stack_print_info.cold.1+0x20/0x20 [ 327.675728] ? is_bpf_text_address+0xd3/0x170 [ 327.680242] should_fail.cold.4+0xa/0x17 [ 327.684326] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 327.689450] ? zap_class+0x640/0x640 [ 327.693180] ? save_stack+0x43/0xd0 [ 327.696807] ? kasan_kmalloc+0xc7/0xe0 [ 327.700712] ? kmem_cache_alloc_trace+0x152/0x750 [ 327.705563] ? kobject_uevent_env+0x2f3/0x101e [ 327.710166] ? kobject_uevent+0x1f/0x24 [ 327.714159] ? lo_ioctl+0x1385/0x1d60 [ 327.717968] ? find_held_lock+0x36/0x1c0 [ 327.722038] ? __lock_is_held+0xb5/0x140 [ 327.726128] ? perf_trace_sched_process_exec+0x860/0x860 [ 327.731591] __should_failslab+0x124/0x180 [ 327.735836] should_failslab+0x9/0x14 [ 327.739638] __kmalloc+0x2e0/0x760 [ 327.743182] ? kobject_uevent_env+0x2f3/0x101e [ 327.747776] ? rcu_read_lock_sched_held+0x14f/0x180 [ 327.752794] ? kobject_get_path+0xc2/0x1b0 [ 327.757033] ? kmem_cache_alloc_trace+0x353/0x750 [ 327.761881] kobject_get_path+0xc2/0x1b0 [ 327.765986] kobject_uevent_env+0x314/0x101e [ 327.770422] kobject_uevent+0x1f/0x24 [ 327.774239] lo_ioctl+0x1385/0x1d60 [ 327.777876] ? lo_rw_aio+0x1ef0/0x1ef0 [ 327.781782] blkdev_ioctl+0x9ac/0x2010 [ 327.785699] ? blkpg_ioctl+0xc10/0xc10 [ 327.789600] ? lock_downgrade+0x900/0x900 [ 327.793770] ? check_preemption_disabled+0x48/0x280 [ 327.798797] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 327.803733] ? kasan_check_read+0x11/0x20 [ 327.807888] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 327.813175] ? rcu_softirq_qs+0x20/0x20 [ 327.817166] ? __fget+0x4d1/0x740 [ 327.820631] ? ksys_dup3+0x680/0x680 [ 327.824382] block_ioctl+0xee/0x130 [ 327.828017] ? blkdev_fallocate+0x400/0x400 [ 327.832343] do_vfs_ioctl+0x1de/0x1720 [ 327.836238] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 327.841785] ? ioctl_preallocate+0x300/0x300 [ 327.846198] ? __fget_light+0x2e9/0x430 [ 327.850176] ? fget_raw+0x20/0x20 [ 327.853634] ? rcu_read_lock_sched_held+0x14f/0x180 [ 327.858655] ? kmem_cache_free+0x24f/0x290 [ 327.862921] ? putname+0xf7/0x130 [ 327.866383] ? do_syscall_64+0x9a/0x820 [ 327.870385] ? do_syscall_64+0x9a/0x820 [ 327.874379] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 327.878969] ? security_file_ioctl+0x94/0xc0 [ 327.883390] ksys_ioctl+0xa9/0xd0 [ 327.886860] __x64_sys_ioctl+0x73/0xb0 [ 327.890760] do_syscall_64+0x1b9/0x820 [ 327.894659] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 327.900053] ? syscall_return_slowpath+0x5e0/0x5e0 [ 327.904999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.909849] ? trace_hardirqs_on_caller+0x310/0x310 [ 327.914906] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 327.919968] ? prepare_exit_to_usermode+0x291/0x3b0 [ 327.925016] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.929868] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.935067] RIP: 0033:0x4573d7 [ 327.938264] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.957163] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 327.964871] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 327.972139] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 327.979412] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 327.986694] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 327.993967] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:45:05 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0400000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:45:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffff680", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:45:05 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000000c080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:45:05 executing program 0 (fault-call:3 fault-nth:20): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:06 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffff9780", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:06 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="510d000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 328.383192] FAULT_INJECTION: forcing a failure. [ 328.383192] name failslab, interval 1, probability 0, space 0, times 0 [ 328.423210] CPU: 0 PID: 12483 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 328.431751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.441120] Call Trace: [ 328.443741] dump_stack+0x244/0x39d [ 328.447416] ? dump_stack_print_info.cold.1+0x20/0x20 [ 328.452642] should_fail.cold.4+0xa/0x17 [ 328.456736] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 328.461868] ? lock_release+0xa10/0xa10 [ 328.465860] ? perf_trace_sched_process_exec+0x860/0x860 [ 328.471327] ? zap_class+0x640/0x640 [ 328.475146] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 328.480212] ? find_held_lock+0x36/0x1c0 [ 328.480236] ? __lock_is_held+0xb5/0x140 [ 328.480254] ? __tcp_transmit_skb+0x23b8/0x3b60 [ 328.480283] ? put_dec+0x3b/0xf0 [ 328.493051] ? perf_trace_sched_process_exec+0x860/0x860 [ 328.493070] ? zap_class+0x640/0x640 [ 328.493104] __should_failslab+0x124/0x180 [ 328.497133] XFS (loop2): Invalid superblock magic number [ 328.501942] should_failslab+0x9/0x14 [ 328.501961] kmem_cache_alloc_node+0x26e/0x730 [ 328.501978] ? find_held_lock+0x36/0x1c0 [ 328.502004] __alloc_skb+0x114/0x770 [ 328.502027] ? netdev_alloc_frag+0x1f0/0x1f0 [ 328.502051] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 328.509995] ? kasan_check_read+0x11/0x20 [ 328.510018] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 328.510037] ? rcu_softirq_qs+0x20/0x20 [ 328.510069] ? netlink_has_listeners+0x2cb/0x4a0 [ 328.559075] ? netlink_tap_init_net+0x3d0/0x3d0 [ 328.563762] alloc_uevent_skb+0x84/0x1da [ 328.567856] kobject_uevent_env+0xa52/0x101e [ 328.572285] kobject_uevent+0x1f/0x24 [ 328.576095] lo_ioctl+0x1385/0x1d60 [ 328.579733] ? lo_rw_aio+0x1ef0/0x1ef0 [ 328.583632] blkdev_ioctl+0x9ac/0x2010 [ 328.587527] ? blkpg_ioctl+0xc10/0xc10 [ 328.591420] ? lock_downgrade+0x900/0x900 [ 328.595574] ? check_preemption_disabled+0x48/0x280 [ 328.600603] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 328.605541] ? kasan_check_read+0x11/0x20 [ 328.609709] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 328.614993] ? rcu_softirq_qs+0x20/0x20 [ 328.618989] ? __fget+0x4d1/0x740 [ 328.622451] ? ksys_dup3+0x680/0x680 [ 328.626195] block_ioctl+0xee/0x130 [ 328.629830] ? blkdev_fallocate+0x400/0x400 [ 328.634160] do_vfs_ioctl+0x1de/0x1720 [ 328.638057] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 328.643636] ? ioctl_preallocate+0x300/0x300 [ 328.648045] ? __fget_light+0x2e9/0x430 [ 328.652026] ? fget_raw+0x20/0x20 [ 328.655486] ? rcu_read_lock_sched_held+0x14f/0x180 [ 328.660506] ? kmem_cache_free+0x24f/0x290 [ 328.664745] ? putname+0xf7/0x130 [ 328.668264] ? do_syscall_64+0x9a/0x820 [ 328.672240] ? do_syscall_64+0x9a/0x820 [ 328.676225] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 328.680820] ? security_file_ioctl+0x94/0xc0 [ 328.685266] ksys_ioctl+0xa9/0xd0 [ 328.688732] __x64_sys_ioctl+0x73/0xb0 [ 328.692628] do_syscall_64+0x1b9/0x820 [ 328.696519] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 328.701893] ? syscall_return_slowpath+0x5e0/0x5e0 [ 328.706827] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 328.711697] ? trace_hardirqs_on_caller+0x310/0x310 [ 328.716729] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 328.721755] ? prepare_exit_to_usermode+0x291/0x3b0 [ 328.726782] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 328.731638] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.736832] RIP: 0033:0x4573d7 [ 328.740038] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.758949] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 328.766668] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 328.774060] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:45:06 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000480", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 328.781346] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 328.788623] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 328.795893] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:45:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000480", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:06 executing program 0 (fault-call:3 fault-nth:21): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:06 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0007000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:06 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000180", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:45:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="786673a4", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 329.111828] FAULT_INJECTION: forcing a failure. [ 329.111828] name failslab, interval 1, probability 0, space 0, times 0 [ 329.144387] CPU: 0 PID: 12532 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 329.152908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.152916] Call Trace: [ 329.152947] dump_stack+0x244/0x39d [ 329.152978] ? dump_stack_print_info.cold.1+0x20/0x20 [ 329.153003] ? lock_downgrade+0x900/0x900 [ 329.153027] should_fail.cold.4+0xa/0x17 [ 329.153049] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 329.153069] ? rcu_softirq_qs+0x20/0x20 [ 329.153086] ? unwind_dump+0x190/0x190 [ 329.153129] ? is_bpf_text_address+0xd3/0x170 [ 329.153155] ? zap_class+0x640/0x640 [ 329.203176] ? __kernel_text_address+0xd/0x40 [ 329.207694] ? unwind_get_return_address+0x61/0xa0 [ 329.212638] ? find_held_lock+0x36/0x1c0 [ 329.216727] ? __lock_is_held+0xb5/0x140 [ 329.220818] ? kobject_uevent+0x1f/0x24 [ 329.224799] ? perf_trace_sched_process_exec+0x860/0x860 [ 329.230258] ? do_vfs_ioctl+0x1de/0x1720 [ 329.234320] ? ksys_ioctl+0xa9/0xd0 [ 329.237954] ? __x64_sys_ioctl+0x73/0xb0 [ 329.242018] ? do_syscall_64+0x1b9/0x820 [ 329.246091] __should_failslab+0x124/0x180 [ 329.250344] should_failslab+0x9/0x14 [ 329.254151] kmem_cache_alloc+0x2be/0x730 [ 329.258327] skb_clone+0x1bb/0x500 [ 329.261878] ? skb_split+0x11e0/0x11e0 [ 329.265771] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 329.270793] ? netlink_trim+0x1b4/0x380 [ 329.274779] ? netlink_skb_destructor+0x210/0x210 [ 329.279649] netlink_broadcast_filtered+0x110f/0x1680 [ 329.284876] ? __netlink_sendskb+0xd0/0xd0 [ 329.289131] ? kasan_check_read+0x11/0x20 [ 329.293295] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 329.298581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.304125] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 329.309611] ? refcount_add_not_zero_checked+0x330/0x330 [ 329.315067] ? netlink_has_listeners+0x2cb/0x4a0 [ 329.319827] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 329.324852] netlink_broadcast+0x3a/0x50 [ 329.328927] kobject_uevent_env+0xa83/0x101e [ 329.333350] kobject_uevent+0x1f/0x24 [ 329.337157] lo_ioctl+0x1385/0x1d60 [ 329.340793] ? lo_rw_aio+0x1ef0/0x1ef0 [ 329.344697] blkdev_ioctl+0x9ac/0x2010 [ 329.348620] ? blkpg_ioctl+0xc10/0xc10 [ 329.352506] ? lock_downgrade+0x900/0x900 [ 329.356655] ? check_preemption_disabled+0x48/0x280 [ 329.361730] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 329.366698] ? kasan_check_read+0x11/0x20 [ 329.370868] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 329.376151] ? rcu_softirq_qs+0x20/0x20 [ 329.380144] ? __fget+0x4d1/0x740 [ 329.383620] ? ksys_dup3+0x680/0x680 [ 329.387351] block_ioctl+0xee/0x130 [ 329.390985] ? blkdev_fallocate+0x400/0x400 [ 329.395312] do_vfs_ioctl+0x1de/0x1720 [ 329.399208] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 329.404754] ? ioctl_preallocate+0x300/0x300 [ 329.409170] ? __fget_light+0x2e9/0x430 [ 329.413269] ? fget_raw+0x20/0x20 [ 329.416742] ? rcu_read_lock_sched_held+0x14f/0x180 [ 329.421764] ? kmem_cache_free+0x24f/0x290 [ 329.426007] ? putname+0xf7/0x130 [ 329.429465] ? do_syscall_64+0x9a/0x820 [ 329.433465] ? do_syscall_64+0x9a/0x820 [ 329.437453] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 329.442049] ? security_file_ioctl+0x94/0xc0 [ 329.446467] ksys_ioctl+0xa9/0xd0 [ 329.449930] __x64_sys_ioctl+0x73/0xb0 [ 329.453824] do_syscall_64+0x1b9/0x820 [ 329.457725] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 329.463138] ? syscall_return_slowpath+0x5e0/0x5e0 [ 329.468098] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 329.472953] ? trace_hardirqs_on_caller+0x310/0x310 [ 329.477976] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 329.482998] ? prepare_exit_to_usermode+0x291/0x3b0 [ 329.488026] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 329.492880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.498075] RIP: 0033:0x4573d7 [ 329.501273] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.520177] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 329.527890] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 329.535189] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 329.542458] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 329.549730] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 08:45:07 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffff9780", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 329.556998] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:45:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000780", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:07 executing program 0 (fault-call:3 fault-nth:22): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:07 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0074000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:45:07 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="510d000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="786673fd", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 329.859628] FAULT_INJECTION: forcing a failure. [ 329.859628] name failslab, interval 1, probability 0, space 0, times 0 [ 329.901761] CPU: 0 PID: 12576 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 329.910313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.910321] Call Trace: [ 329.910352] dump_stack+0x244/0x39d [ 329.910394] ? dump_stack_print_info.cold.1+0x20/0x20 [ 329.922334] ? lo_ioctl+0xe6/0x1d60 [ 329.922360] should_fail.cold.4+0xa/0x17 [ 329.922381] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 329.922395] ? blkpg_ioctl+0xc10/0xc10 [ 329.922419] ? lock_downgrade+0x900/0x900 [ 329.931232] ? check_preemption_disabled+0x48/0x280 [ 329.931258] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 329.931303] ? kasan_check_read+0x11/0x20 [ 329.931320] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 329.931349] ? find_held_lock+0x36/0x1c0 [ 329.975507] ? umad_devnode+0x48/0x90 [ 329.979328] ? perf_trace_sched_process_exec+0x860/0x860 [ 329.984786] ? block_ioctl+0xee/0x130 [ 329.988598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.994173] __should_failslab+0x124/0x180 [ 329.998421] should_failslab+0x9/0x14 [ 330.002736] kmem_cache_alloc+0x2be/0x730 [ 330.006893] ? fget_raw+0x20/0x20 [ 330.010359] getname_flags+0xd0/0x590 [ 330.014169] do_mkdirat+0xc5/0x310 [ 330.017725] ? __ia32_sys_mknod+0xb0/0xb0 [ 330.021879] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.027258] ? trace_hardirqs_off_caller+0x300/0x300 [ 330.032369] ? ksys_ioctl+0x81/0xd0 [ 330.036004] __x64_sys_mkdir+0x5c/0x80 [ 330.039902] do_syscall_64+0x1b9/0x820 [ 330.043795] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 330.049164] ? syscall_return_slowpath+0x5e0/0x5e0 [ 330.054104] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 330.058982] ? trace_hardirqs_on_caller+0x310/0x310 [ 330.064004] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 330.069042] ? prepare_exit_to_usermode+0x291/0x3b0 [ 330.074072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 330.078929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.084119] RIP: 0033:0x456987 08:45:07 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000200080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 330.087316] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.106218] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 330.114062] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 0000000000456987 [ 330.121335] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 330.128603] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 330.135872] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 330.143141] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 330.201823] EXT4-fs: 10 callbacks suppressed [ 330.201836] EXT4-fs (sda1): re-mounted. Opts: 08:45:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0020000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:07 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="f6ffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 330.335410] EXT4-fs (sda1): re-mounted. Opts: 08:45:08 executing program 0 (fault-call:3 fault-nth:23): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)="7866738c", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:45:08 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="fdfdffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 330.404584] EXT4-fs (sda1): re-mounted. Opts: [ 330.465461] EXT4-fs (sda1): re-mounted. Opts: 08:45:08 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0068000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 330.513771] EXT4-fs (sda1): re-mounted. Opts: [ 330.531271] FAULT_INJECTION: forcing a failure. [ 330.531271] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 330.543105] CPU: 0 PID: 12634 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 330.551607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.560968] Call Trace: 08:45:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="006c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 330.563584] dump_stack+0x244/0x39d [ 330.567260] ? dump_stack_print_info.cold.1+0x20/0x20 [ 330.572501] should_fail.cold.4+0xa/0x17 [ 330.576584] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 330.581753] ? kobject_uevent_env+0xf76/0x101e [ 330.586392] ? wait_for_completion+0x8a0/0x8a0 [ 330.591012] ? mark_held_locks+0x130/0x130 [ 330.595263] ? kobject_uevent_env+0x100d/0x101e [ 330.599962] ? mutex_unlock+0xd/0x10 [ 330.603709] ? lo_ioctl+0xe6/0x1d60 [ 330.607367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.612915] ? should_fail+0x22d/0xd01 [ 330.616822] ? blkdev_ioctl+0x15d/0x2010 [ 330.620901] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 330.626015] ? blkpg_ioctl+0xc10/0xc10 [ 330.629923] ? lock_downgrade+0x900/0x900 [ 330.634093] __alloc_pages_nodemask+0x34b/0xdd0 [ 330.638777] ? kasan_check_read+0x11/0x20 [ 330.642946] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 330.648241] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 330.653286] ? find_held_lock+0x36/0x1c0 [ 330.657395] ? trace_hardirqs_off+0xb8/0x310 [ 330.661827] cache_grow_begin+0xa5/0x8c0 [ 330.665907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 330.671472] ? check_preemption_disabled+0x48/0x280 [ 330.676513] kmem_cache_alloc+0x66b/0x730 [ 330.680695] ? fget_raw+0x20/0x20 [ 330.684179] getname_flags+0xd0/0x590 [ 330.688007] do_mkdirat+0xc5/0x310 [ 330.691571] ? __ia32_sys_mknod+0xb0/0xb0 [ 330.695735] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.701117] ? trace_hardirqs_off_caller+0x300/0x300 [ 330.706240] ? ksys_ioctl+0x81/0xd0 [ 330.709890] __x64_sys_mkdir+0x5c/0x80 [ 330.713808] do_syscall_64+0x1b9/0x820 [ 330.717726] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 330.723115] ? syscall_return_slowpath+0x5e0/0x5e0 [ 330.728058] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 330.732919] ? trace_hardirqs_on_caller+0x310/0x310 [ 330.737963] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 330.743001] ? prepare_exit_to_usermode+0x291/0x3b0 [ 330.748049] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 330.752918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.758122] RIP: 0033:0x456987 [ 330.761329] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.780249] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 330.787972] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 0000000000456987 [ 330.795258] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 330.802536] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 330.809819] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 330.817226] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:45:08 executing program 0 (fault-call:3 fault-nth:24): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:08 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="7400000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 330.965121] EXT4-fs (sda1): re-mounted. Opts: 08:45:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:45:08 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000001080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 331.025575] EXT4-fs (sda1): re-mounted. Opts: [ 331.076493] FAULT_INJECTION: forcing a failure. [ 331.076493] name failslab, interval 1, probability 0, space 0, times 0 [ 331.106288] EXT4-fs (sda1): re-mounted. Opts: [ 331.107643] CPU: 0 PID: 12668 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 331.119417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.128774] Call Trace: [ 331.131381] dump_stack+0x244/0x39d [ 331.135030] ? dump_stack_print_info.cold.1+0x20/0x20 [ 331.140239] ? save_stack+0xa9/0xd0 [ 331.143882] ? save_stack+0x43/0xd0 [ 331.147536] should_fail.cold.4+0xa/0x17 [ 331.151616] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 331.156731] ? kasan_check_read+0x11/0x20 [ 331.160886] ? do_raw_spin_unlock+0xa7/0x330 [ 331.165342] ? trace_hardirqs_on+0x310/0x310 [ 331.169767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.175309] ? check_preemption_disabled+0x48/0x280 [ 331.180335] ? find_held_lock+0x36/0x1c0 [ 331.184410] ? semctl_main+0x568/0x1f90 [ 331.188410] ? perf_trace_sched_process_exec+0x860/0x860 [ 331.193864] ? putname+0xf7/0x130 [ 331.197322] ? filename_create+0x2b7/0x5b0 [ 331.201564] __should_failslab+0x124/0x180 [ 331.205806] should_failslab+0x9/0x14 [ 331.209612] __kmalloc_track_caller+0x2d1/0x760 [ 331.214288] ? strncpy_from_user+0x5a0/0x5a0 [ 331.218711] ? strndup_user+0x77/0xd0 [ 331.222546] memdup_user+0x2c/0xa0 [ 331.226096] strndup_user+0x77/0xd0 [ 331.229730] ksys_mount+0x3c/0x140 [ 331.233290] __x64_sys_mount+0xbe/0x150 [ 331.237272] do_syscall_64+0x1b9/0x820 [ 331.241162] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 331.246530] ? syscall_return_slowpath+0x5e0/0x5e0 [ 331.251464] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 331.256313] ? trace_hardirqs_on_caller+0x310/0x310 [ 331.261333] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 331.266352] ? prepare_exit_to_usermode+0x291/0x3b0 [ 331.271379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 331.276229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.281436] RIP: 0033:0x459fda [ 331.284631] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 331.303532] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 331.311257] RAX: ffffffffffffffda RBX: 00007f944a7f7b30 RCX: 0000000000459fda [ 331.318528] RDX: 00007f944a7f7ad0 RSI: 0000000020000080 RDI: 00007f944a7f7af0 08:45:08 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffffd80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:45:08 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0500000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 331.325804] RBP: 0000000020000080 R08: 00007f944a7f7b30 R09: 00007f944a7f7ad0 [ 331.333086] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 331.340360] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 08:45:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00f83f0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:09 executing program 0 (fault-call:3 fault-nth:25): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 331.467535] XFS (loop2): Invalid superblock magic number [ 331.483484] EXT4-fs (sda1): re-mounted. Opts: 08:45:09 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="8cffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:45:09 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="006c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 331.631623] FAULT_INJECTION: forcing a failure. [ 331.631623] name failslab, interval 1, probability 0, space 0, times 0 [ 331.651183] EXT4-fs (sda1): re-mounted. Opts: [ 331.674727] CPU: 1 PID: 12720 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 331.683242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.692594] Call Trace: [ 331.695209] dump_stack+0x244/0x39d [ 331.698863] ? dump_stack_print_info.cold.1+0x20/0x20 [ 331.704072] ? __kernel_text_address+0xd/0x40 [ 331.708572] ? unwind_get_return_address+0x61/0xa0 [ 331.713512] should_fail.cold.4+0xa/0x17 [ 331.717594] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 331.722715] ? kasan_kmalloc+0xc7/0xe0 [ 331.726606] ? __kmalloc_track_caller+0x157/0x760 [ 331.731454] ? memdup_user+0x2c/0xa0 [ 331.735172] ? zap_class+0x640/0x640 [ 331.738927] ? do_syscall_64+0x1b9/0x820 [ 331.742996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.748579] ? check_preemption_disabled+0x48/0x280 [ 331.753624] ? find_held_lock+0x36/0x1c0 [ 331.757725] ? perf_trace_sched_process_exec+0x860/0x860 [ 331.763176] ? lock_release+0xa10/0xa10 [ 331.767159] ? perf_trace_sched_process_exec+0x860/0x860 [ 331.772691] ? usercopy_warn+0x110/0x110 [ 331.776789] __should_failslab+0x124/0x180 [ 331.781036] should_failslab+0x9/0x14 [ 331.784848] kmem_cache_alloc_trace+0x2d7/0x750 [ 331.789541] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 331.795089] ? _copy_from_user+0xdf/0x150 [ 331.799248] copy_mount_options+0x5f/0x430 [ 331.803486] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 331.809028] ksys_mount+0xd0/0x140 [ 331.812577] __x64_sys_mount+0xbe/0x150 [ 331.816564] do_syscall_64+0x1b9/0x820 [ 331.820455] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 331.825825] ? syscall_return_slowpath+0x5e0/0x5e0 [ 331.830816] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 331.835689] ? trace_hardirqs_on_caller+0x310/0x310 [ 331.840745] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 331.845775] ? prepare_exit_to_usermode+0x291/0x3b0 [ 331.850801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 331.855652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.860858] RIP: 0033:0x459fda [ 331.864057] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 331.882959] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 331.890665] RAX: ffffffffffffffda RBX: 00007f944a7f7b30 RCX: 0000000000459fda [ 331.897942] RDX: 00007f944a7f7ad0 RSI: 0000000020000080 RDI: 00007f944a7f7af0 [ 331.905216] RBP: 0000000020000080 R08: 00007f944a7f7b30 R09: 00007f944a7f7ad0 [ 331.912488] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 08:45:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\r', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 331.919757] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 08:45:09 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000680", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0500000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:09 executing program 0 (fault-call:3 fault-nth:26): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:09 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="7a00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:45:09 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000002080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:45:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 332.227076] FAULT_INJECTION: forcing a failure. [ 332.227076] name failslab, interval 1, probability 0, space 0, times 0 [ 332.255712] CPU: 0 PID: 12760 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 332.264250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.273626] Call Trace: [ 332.276226] dump_stack+0x244/0x39d [ 332.279868] ? dump_stack_print_info.cold.1+0x20/0x20 [ 332.285074] ? __kernel_text_address+0xd/0x40 [ 332.289577] ? unwind_get_return_address+0x61/0xa0 [ 332.294519] should_fail.cold.4+0xa/0x17 [ 332.298598] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 332.303727] ? save_stack+0x43/0xd0 [ 332.307379] ? kasan_kmalloc+0xc7/0xe0 [ 332.311266] ? kasan_slab_alloc+0x12/0x20 [ 332.315423] ? kmem_cache_alloc+0x12e/0x730 [ 332.319759] ? __d_alloc+0xc8/0xb90 [ 332.323401] ? zap_class+0x640/0x640 [ 332.327123] ? do_mkdirat+0xda/0x310 [ 332.330851] ? __x64_sys_mkdir+0x5c/0x80 [ 332.334914] ? do_syscall_64+0x1b9/0x820 [ 332.338979] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.344353] ? find_held_lock+0x36/0x1c0 [ 332.348422] ? __lock_is_held+0xb5/0x140 [ 332.352526] ? perf_trace_sched_process_exec+0x860/0x860 [ 332.357987] ? __lock_is_held+0xb5/0x140 [ 332.362064] __should_failslab+0x124/0x180 [ 332.366331] should_failslab+0x9/0x14 [ 332.370138] __kmalloc+0x2e0/0x760 [ 332.373698] ? kmem_cache_alloc+0x33a/0x730 [ 332.378037] ? __d_alloc+0x790/0xb90 [ 332.381760] __d_alloc+0x790/0xb90 [ 332.385309] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 332.390352] ? d_alloc_parallel+0x1f40/0x1f40 [ 332.394850] ? d_lookup+0x255/0x300 [ 332.398481] ? d_lookup+0x255/0x300 [ 332.402113] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 332.406720] ? lookup_dcache+0x22/0x140 [ 332.410713] ? trace_hardirqs_off_caller+0x300/0x300 [ 332.415839] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 332.420863] d_alloc+0x96/0x380 [ 332.424150] ? __d_lookup+0x9e0/0x9e0 [ 332.427960] ? __d_alloc+0xb90/0xb90 [ 332.431704] __lookup_hash+0xd9/0x190 [ 332.435513] filename_create+0x1e5/0x5b0 [ 332.439599] ? kern_path_mountpoint+0x40/0x40 [ 332.444106] ? fget_raw+0x20/0x20 [ 332.447570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 332.453124] ? getname_flags+0x26e/0x590 [ 332.457195] do_mkdirat+0xda/0x310 [ 332.460759] ? __ia32_sys_mknod+0xb0/0xb0 [ 332.464925] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.470308] ? trace_hardirqs_off_caller+0x300/0x300 [ 332.475418] ? ksys_ioctl+0x81/0xd0 [ 332.479052] __x64_sys_mkdir+0x5c/0x80 [ 332.482947] do_syscall_64+0x1b9/0x820 [ 332.486841] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 332.492234] ? syscall_return_slowpath+0x5e0/0x5e0 [ 332.497176] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 332.502028] ? trace_hardirqs_on_caller+0x310/0x310 [ 332.507052] ? prepare_exit_to_usermode+0x291/0x3b0 [ 332.512080] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 332.516937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.522140] RIP: 0033:0x456987 [ 332.525351] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.544266] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 332.552015] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 0000000000456987 [ 332.559288] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 332.566556] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 08:45:10 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000102080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 332.573829] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 332.581098] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 08:45:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000680", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:10 executing program 0 (fault-call:3 fault-nth:27): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:10 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="f6ffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:45:10 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000004880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 332.765333] XFS (loop2): Invalid superblock magic number [ 332.817315] FAULT_INJECTION: forcing a failure. [ 332.817315] name failslab, interval 1, probability 0, space 0, times 0 [ 332.846803] CPU: 0 PID: 12803 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 332.855343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.864713] Call Trace: [ 332.867316] dump_stack+0x244/0x39d [ 332.870957] ? dump_stack_print_info.cold.1+0x20/0x20 [ 332.876155] ? __kernel_text_address+0xd/0x40 [ 332.880672] ? unwind_get_return_address+0x61/0xa0 [ 332.885630] should_fail.cold.4+0xa/0x17 [ 332.889740] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 332.894857] ? kasan_kmalloc+0xc7/0xe0 [ 332.898750] ? __kmalloc_track_caller+0x157/0x760 [ 332.903610] ? memdup_user+0x2c/0xa0 [ 332.907327] ? zap_class+0x640/0x640 [ 332.911043] ? do_syscall_64+0x1b9/0x820 [ 332.915119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 332.920688] ? check_preemption_disabled+0x48/0x280 [ 332.925733] ? find_held_lock+0x36/0x1c0 [ 332.929823] ? perf_trace_sched_process_exec+0x860/0x860 [ 332.935276] ? lock_release+0xa10/0xa10 [ 332.939253] ? perf_trace_sched_process_exec+0x860/0x860 [ 332.944739] ? usercopy_warn+0x110/0x110 [ 332.948824] __should_failslab+0x124/0x180 [ 332.953072] should_failslab+0x9/0x14 [ 332.956881] kmem_cache_alloc_trace+0x2d7/0x750 [ 332.961559] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 332.967105] ? _copy_from_user+0xdf/0x150 [ 332.971266] copy_mount_options+0x5f/0x430 [ 332.976394] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 332.981941] ksys_mount+0xd0/0x140 [ 332.985486] __x64_sys_mount+0xbe/0x150 [ 332.989471] do_syscall_64+0x1b9/0x820 [ 332.993367] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 332.998737] ? syscall_return_slowpath+0x5e0/0x5e0 [ 333.003671] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 333.008543] ? trace_hardirqs_on_caller+0x310/0x310 [ 333.013566] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 333.018588] ? prepare_exit_to_usermode+0x291/0x3b0 [ 333.023616] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 333.028475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.033668] RIP: 0033:0x459fda [ 333.036889] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 333.055794] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:45:10 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffdfc80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 333.064460] RAX: ffffffffffffffda RBX: 00007f944a7f7b30 RCX: 0000000000459fda [ 333.071742] RDX: 00007f944a7f7ad0 RSI: 0000000020000080 RDI: 00007f944a7f7af0 [ 333.079011] RBP: 0000000020000080 R08: 00007f944a7f7b30 R09: 00007f944a7f7ad0 [ 333.086287] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 333.093571] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 08:45:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000180", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:10 executing program 0 (fault-call:3 fault-nth:28): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) 08:45:10 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0500000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:45:10 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="001f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) [ 333.368494] FAULT_INJECTION: forcing a failure. [ 333.368494] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 333.380369] CPU: 1 PID: 12845 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 333.388876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.398238] Call Trace: [ 333.400852] dump_stack+0x244/0x39d [ 333.404504] ? dump_stack_print_info.cold.1+0x20/0x20 [ 333.409732] should_fail.cold.4+0xa/0x17 [ 333.413823] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 333.418951] ? __lock_acquire+0x62f/0x4c20 [ 333.423207] ? lock_downgrade+0x900/0x900 [ 333.427375] ? check_preemption_disabled+0x48/0x280 [ 333.432422] ? mark_held_locks+0x130/0x130 [ 333.436675] ? mark_held_locks+0x130/0x130 [ 333.440942] ? is_bpf_text_address+0xd3/0x170 [ 333.445469] ? kernel_text_address+0x79/0xf0 [ 333.449884] ? __kernel_text_address+0xd/0x40 [ 333.454387] ? unwind_get_return_address+0x61/0xa0 [ 333.459337] ? __save_stack_trace+0x8d/0xf0 [ 333.463688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.469252] ? should_fail+0x22d/0xd01 [ 333.473149] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 333.478274] __alloc_pages_nodemask+0x34b/0xdd0 [ 333.482951] ? __kmalloc_track_caller+0x157/0x760 [ 333.487797] ? memdup_user+0x2c/0xa0 [ 333.491523] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 333.496552] ? find_held_lock+0x36/0x1c0 [ 333.500639] ? trace_hardirqs_off+0xb8/0x310 [ 333.505058] cache_grow_begin+0xa5/0x8c0 [ 333.509125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 333.514669] ? check_preemption_disabled+0x48/0x280 [ 333.519719] kmem_cache_alloc_trace+0x684/0x750 [ 333.524400] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 333.529963] copy_mount_options+0x5f/0x430 [ 333.534236] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 333.539782] ksys_mount+0xd0/0x140 [ 333.543330] __x64_sys_mount+0xbe/0x150 [ 333.547319] do_syscall_64+0x1b9/0x820 [ 333.551219] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 333.556593] ? syscall_return_slowpath+0x5e0/0x5e0 [ 333.561540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 333.566418] ? trace_hardirqs_on_caller+0x310/0x310 [ 333.571444] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 333.576466] ? prepare_exit_to_usermode+0x291/0x3b0 [ 333.581498] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 333.586380] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.591574] RIP: 0033:0x459fda [ 333.594774] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 08:45:11 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0d51000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 333.613734] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 333.621508] RAX: ffffffffffffffda RBX: 00007f944a7f7b30 RCX: 0000000000459fda [ 333.628785] RDX: 00007f944a7f7ad0 RSI: 0000000020000080 RDI: 00007f944a7f7af0 [ 333.636060] RBP: 0000000020000080 R08: 00007f944a7f7b30 R09: 00007f944a7f7ad0 [ 333.643333] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 333.650624] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 08:45:11 executing program 5: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10040, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0d51000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680)=0x1, &(0x7f00000006c0)=0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 08:45:11 executing program 0 (fault-call:3 fault-nth:29): accept4(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 333.762313] XFS (loop2): Invalid superblock magic number 08:45:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000280", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:11 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000c40)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0d51000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000d40)=[{&(0x7f0000000800)=""/121, 0x79}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000b40)=""/240, 0xf0}], 0x4) 08:45:11 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0005000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[]) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000800000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 08:45:11 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) [ 333.920314] FAULT_INJECTION: forcing a failure. [ 333.920314] name failslab, interval 1, probability 0, space 0, times 0 [ 333.943058] CPU: 0 PID: 12884 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 333.951603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.960976] Call Trace: [ 333.963593] dump_stack+0x244/0x39d [ 333.967246] ? dump_stack_print_info.cold.1+0x20/0x20 [ 333.972462] ? filename_lookup+0x39a/0x520 [ 333.976715] ? user_path_at_empty+0x40/0x50 [ 333.981056] ? do_mount+0x180/0x1d90 [ 333.984784] ? ksys_mount+0x12d/0x140 [ 333.988596] ? do_syscall_64+0x1b9/0x820 [ 333.992673] should_fail.cold.4+0xa/0x17 [ 333.996773] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 334.002410] ? mntput+0x74/0xa0 [ 334.005719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.011286] ? check_preemption_disabled+0x48/0x280 [ 334.016329] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 334.021878] ? find_held_lock+0x36/0x1c0 [ 334.025973] ? filename_lookup+0x39f/0x520 [ 334.030216] ? perf_trace_sched_process_exec+0x860/0x860 [ 334.035687] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 334.041266] __should_failslab+0x124/0x180 [ 334.045769] should_failslab+0x9/0x14 [ 334.049578] kmem_cache_alloc_trace+0x2d7/0x750 [ 334.054257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.059826] vfs_new_fs_context+0x5e/0x77c [ 334.064076] ? ns_capable_common+0x13f/0x170 [ 334.068516] do_mount+0xb70/0x1d90 [ 334.072075] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 334.077624] ? copy_mount_string+0x40/0x40 [ 334.081871] ? copy_mount_options+0x5f/0x430 [ 334.086285] ? kmem_cache_alloc_trace+0x353/0x750 [ 334.091133] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 334.096711] ? _copy_from_user+0xdf/0x150 [ 334.100872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.106413] ? copy_mount_options+0x315/0x430 [ 334.111076] ksys_mount+0x12d/0x140 [ 334.114739] __x64_sys_mount+0xbe/0x150 [ 334.118731] do_syscall_64+0x1b9/0x820 [ 334.122625] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 334.128002] ? syscall_return_slowpath+0x5e0/0x5e0 [ 334.132935] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.137803] ? trace_hardirqs_on_caller+0x310/0x310 [ 334.142828] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 334.147853] ? prepare_exit_to_usermode+0x291/0x3b0 [ 334.152883] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.157757] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.162949] RIP: 0033:0x459fda [ 334.166149] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 334.185049] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 334.192761] RAX: ffffffffffffffda RBX: 00007f944a7f7b30 RCX: 0000000000459fda [ 334.200030] RDX: 00007f944a7f7ad0 RSI: 0000000020000080 RDI: 00007f944a7f7af0 [ 334.207302] RBP: 0000000020000080 R08: 00007f944a7f7b30 R09: 00007f944a7f7ad0 [ 334.214572] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 334.221845] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 334.291932] BUG: unable to handle kernel paging request at fffffffffffffff4 [ 334.294237] kobject: 'loop5' (0000000059356b63): kobject_uevent_env [ 334.299109] PGD 926d067 P4D 926d067 PUD 926f067 PMD 0 [ 334.299137] Oops: 0000 [#1] PREEMPT SMP KASAN [ 334.299168] CPU: 1 PID: 12884 Comm: syz-executor0 Not tainted 4.19.0-rc8-next-20181019+ #98 [ 334.306002] kobject: 'loop5' (0000000059356b63): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 334.310864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.310888] RIP: 0010:do_mount+0xb98/0x1d90 [ 334.310911] Code: 06 00 48 89 c2 48 89 c3 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 8a 11 00 00 48 b8 00 00 00 00 00 fc ff df <4c> 8b 33 49 8d 7e 18 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 5e 11 [ 334.365845] RSP: 0018:ffff8801c6377c28 EFLAGS: 00010246 [ 334.371226] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90001e62000 [ 334.378500] RDX: 1ffffffffffffffe RSI: ffffffff81e011ec RDI: 0000000000000282 [ 334.385775] RBP: ffff8801c6377db0 R08: ffff8801bdb1c100 R09: ffffed003b5e5b4f [ 334.393046] R10: ffffed003b5e5b4f R11: ffff8801daf2da7b R12: ffff8801cb499a30 [ 334.400325] R13: ffff8801c8d58900 R14: ffff8801c8d58900 R15: ffff880181134b80 [ 334.407602] FS: 00007f944a7f8700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 334.415843] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 334.421745] CR2: fffffffffffffff4 CR3: 00000001b883d000 CR4: 00000000001406e0 [ 334.429018] Call Trace: [ 334.431640] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 334.437211] ? copy_mount_string+0x40/0x40 [ 334.441464] ? copy_mount_options+0x5f/0x430 [ 334.445891] ? kmem_cache_alloc_trace+0x353/0x750 [ 334.450747] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 334.456298] ? _copy_from_user+0xdf/0x150 [ 334.460460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.466047] ? copy_mount_options+0x315/0x430 [ 334.470558] ksys_mount+0x12d/0x140 [ 334.474198] __x64_sys_mount+0xbe/0x150 [ 334.478186] do_syscall_64+0x1b9/0x820 [ 334.482088] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 334.487459] ? syscall_return_slowpath+0x5e0/0x5e0 [ 334.492408] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.497261] ? trace_hardirqs_on_caller+0x310/0x310 [ 334.502289] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 334.507340] ? prepare_exit_to_usermode+0x291/0x3b0 [ 334.512398] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.517255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.522451] RIP: 0033:0x459fda [ 334.525650] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 334.544567] RSP: 002b:00007f944a7f7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 334.552282] RAX: ffffffffffffffda RBX: 00007f944a7f7b30 RCX: 0000000000459fda [ 334.559554] RDX: 00007f944a7f7ad0 RSI: 0000000020000080 RDI: 00007f944a7f7af0 [ 334.566853] RBP: 0000000020000080 R08: 00007f944a7f7b30 R09: 00007f944a7f7ad0 [ 334.574140] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 334.581413] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 334.588702] Modules linked in: [ 334.591903] CR2: fffffffffffffff4 [ 334.595361] ---[ end trace c140f7951377784e ]--- [ 334.600131] RIP: 0010:do_mount+0xb98/0x1d90 [ 334.604472] Code: 06 00 48 89 c2 48 89 c3 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 8a 11 00 00 48 b8 00 00 00 00 00 fc ff df <4c> 8b 33 49 8d 7e 18 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 5e 11 [ 334.623412] RSP: 0018:ffff8801c6377c28 EFLAGS: 00010246 [ 334.628784] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90001e62000 [ 334.636056] RDX: 1ffffffffffffffe RSI: ffffffff81e011ec RDI: 0000000000000282 [ 334.643326] RBP: ffff8801c6377db0 R08: ffff8801bdb1c100 R09: ffffed003b5e5b4f [ 334.650614] R10: ffffed003b5e5b4f R11: ffff8801daf2da7b R12: ffff8801cb499a30 [ 334.657891] R13: ffff8801c8d58900 R14: ffff8801c8d58900 R15: ffff880181134b80 [ 334.665174] FS: 00007f944a7f8700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 334.673399] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 334.679276] CR2: fffffffffffffff4 CR3: 00000001b883d000 CR4: 00000000001406e0 [ 334.686544] Kernel panic - not syncing: Fatal exception [ 334.692816] Kernel Offset: disabled [ 334.696440] Rebooting in 86400 seconds..