[info] Using makefile-style concurrent boot in runlevel 2. [ 24.291466] audit: type=1800 audit(1539739726.101:21): pid=5408 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [ 24.319666] audit: type=1800 audit(1539739726.101:22): pid=5408 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.58' (ECDSA) to the list of known hosts. 2018/10/17 01:28:55 fuzzer started 2018/10/17 01:28:57 dialing manager at 10.128.0.26:33409 2018/10/17 01:28:57 syscalls: 1 2018/10/17 01:28:57 code coverage: enabled 2018/10/17 01:28:57 comparison tracing: enabled 2018/10/17 01:28:57 setuid sandbox: enabled 2018/10/17 01:28:57 namespace sandbox: enabled 2018/10/17 01:28:57 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/17 01:28:57 fault injection: enabled 2018/10/17 01:28:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/17 01:28:57 net packed injection: enabled 2018/10/17 01:28:57 net device setup: enabled 01:32:09 executing program 0: r0 = getpgid(0xffffffffffffffff) ptrace$peek(0x1, r0, &(0x7f0000000000)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x20, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000080)=0x40) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x66f73296, 0x2802) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) fstat(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f00000001c0)={0xffffffff, 0x8}) msgget(0x2, 0x10) socketpair(0x11, 0x80f, 0x4, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSMASK(r7, 0x40104593, &(0x7f0000000340)={0x1f, 0xd6, &(0x7f0000000240)="960f3031e4e8ea99843b71ca190aba1f99d5564ae6560a53056743eb9d2477d88485977b095a89e3e9bd18f0730c0945134a21172bf3ba8fdb249f0a5fbbe42749d31817f9de965825072527e3afcc9719830a9cdfdee1cbd4eecf0d6edf18e3e5d584906f3acddff9d54d3f3425386adced0c09378a8059248ce6d5aaeae5a158fd858b0c832fe09be36a0c1a6b6aabd0c4fb0aeb55a4e0306d32a92efb33937bc26ef6d254667719a6574f169332e0c8e6bc6effd5b3111fe8b36763b1c0abb763bee7111e53896f78bee9ecce367dcb1bff5665eb"}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000380)={0xc46e8b79e79e3fee, 0x9579}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000003c0), &(0x7f0000000400)=0x4) migrate_pages(r3, 0x0, &(0x7f0000000440)=0x8, &(0x7f0000000480)=0x9) write$P9_RREAD(r6, &(0x7f00000004c0)={0x52, 0x75, 0x2, {0x47, "85cac2e28b03e54c3c5539619e864bf6a6e7753465d53987a0652a540742ee0ce402538ec47c998b4aa9772b7747eb2dd4a210b2a308792d35c2674331f5bf2f30faa8c7d3dd1e"}}, 0x52) setsockopt$IP_VS_SO_SET_DEL(r6, 0x0, 0x484, &(0x7f0000000540)={0x3f, @loopback, 0x4e21, 0x1, 'sh\x00', 0x22, 0x4, 0x1b}, 0x2c) fsetxattr(r2, &(0x7f0000000580)=@known='trusted.overlay.nlink\x00', &(0x7f00000005c0)='\x00', 0x1, 0x1) kcmp(r0, r0, 0x0, r7, r6) ioctl$KVM_ENABLE_CAP(r7, 0x4068aea3, &(0x7f0000000600)={0x7d, 0x0, [0x5dde, 0xf, 0x3, 0x6433]}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000680)={'filter\x00', 0x4}, 0x68) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f00000009c0)=@broute={'broute\x00', 0x20, 0x1, 0x260, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000740], 0x0, &(0x7f0000000700), &(0x7f0000000740)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x8, 0x892f, 'nr0\x00', 'ip_vti0\x00', 'veth1_to_bond\x00', 'bridge_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @remote, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0x1a0}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x20, 'system_u:object_r:auditd_log_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x2d8) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000a40)={0x1, 0x6b}, 0x2) mq_timedsend(r2, &(0x7f0000000a80)="0b468d666aea8a985ef553385e732a88a93ddc141561f4f8d5fe719b6d14f754e72d842ca628be7716acf98c5914d15a14", 0x31, 0x753, &(0x7f0000000ac0)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000b00)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) capget(&(0x7f0000000b40)={0x39980732, r3}, &(0x7f0000000b80)={0x1000, 0x20, 0xbf, 0x2, 0x40, 0x7}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000bc0)=""/132) r8 = add_key$keyring(&(0x7f0000000c80)='keyring\x00', &(0x7f0000000cc0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$chown(0x4, r8, r4, r5) ioctl$KDENABIO(r6, 0x4b36) write$P9_RGETLOCK(r1, &(0x7f0000000d00)={0x23, 0x37, 0x1, {0x2, 0x5, 0xff, r3, 0x5, 'proc['}}, 0x23) syzkaller login: [ 227.749461] IPVS: ftp: loaded support on port[0] = 21 01:32:09 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101200, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000000c0)={@dev, 0x0}, &(0x7f0000000100)=0x14) sendto$packet(r0, &(0x7f0000000040)="d8997f6f4a2ea26482777f33036b4d", 0xf, 0x0, &(0x7f0000000140)={0x11, 0x4, r1, 0x1, 0x2, 0x6, @dev={[], 0xc}}, 0x14) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @pic={0xffff, 0x7, 0x8, 0x819d, 0x800, 0x6, 0x7f, 0x7ff, 0x88, 0x6, 0x6, 0x1ff, 0x3, 0x5dfb, 0x7, 0xf1c4}}) readahead(r0, 0x10001, 0x8) getsockopt$inet_dccp_int(r0, 0x21, 0x15, &(0x7f0000000280), &(0x7f00000002c0)=0x4) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000300)="e3bda758c6a83f6b54e5f56466000f3f", 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000340), 0x4) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000380)={@remote, @remote, @empty, 0x0, 0x7fffffff, 0x5, 0x100, 0x8000, 0x80020040, r1}) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000400)=0x1) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000440)) syz_open_dev$binder(&(0x7f0000000600)='/dev/binder#\x00', 0x0, 0x802) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x10000, 0x0) r3 = shmget$private(0x0, 0x3000, 0x100, &(0x7f0000ffa000/0x3000)=nil) shmat(r3, &(0x7f0000ffb000/0x4000)=nil, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) connect$l2tp(r2, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @local}, 0x4, 0x1, 0x3, 0x4}}, 0x2e) r4 = gettid() r5 = syz_open_procfs(r4, &(0x7f00000006c0)='net/snmp6\x00') fstat(r2, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() write$P9_RGETATTR(r5, &(0x7f0000000780)={0xa0, 0x19, 0x1, {0x2c00, {0x1, 0x2, 0x4}, 0x2a, r6, r7, 0x1d8, 0x0, 0xfffffffffffffff8, 0x8, 0x3, 0x80000001, 0x1, 0x1, 0x0, 0x1, 0x7, 0xffffffffffffe811, 0xfffffffffffffc01, 0x80000000, 0xffffffff}}, 0xa0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000840)=0x1) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000880)="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") setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000980)="1bd57b57daad2028f54a1a5c69d729f5426bdbae9aee322d2ff60ff97971b43bd3cf58256a1af5022775b7495531b28927ea69f3bbe0911a6fb95e6302eb2d94854bf2d4217af7e725c1cbc7aef9139f3b37c07720d40cd992fc0c809d336629fc5f1a9dcb98845f680b70293b15863af2593f6aeb4e4862d294d500a0e58b2aa455a0fa78aa413413222bfe7870bcf9b3b1a989ffb5e2a3f87abe51049c6874fde90ed30a25f670246845d7da50081571627a203d3b93ca3f9f15791211616d77d7ec7955dd41904e55d7c17469e81dba1d2af32f2b0b73268dcdad79e65317984704c9be359544a130bc623ec7acd1358fa01d67efec6aca47655d26d6d3922d08c0960c8009808456ca5768f32382e2219ad7c6f091aa4887aafbf9baeeb296e136ef5a1157ad0772d838cd092ff320c34804e1628fd5cb9924761523cc0302f6c430bb5e9548b7241ab3eb730306a155b3941c2c76b70a25777bbf5d9b969ef6e4d31f21c0b0a88b11fdfe77c4c88297f1ca785c4439b774b1d09ac02364f5ca6274519b3c8d7585215bbf9fc5b30d4145b7b1ad1b7af148a3fa0e4cf5b2f4288272d76d5a7342619c35ffc1096a5728a3e0580358032b41b161268a374bcf8c4cbecd2c4a3ec99bb67e4f66e6c7d508eed6cbaa0bc9ea4ce11b52743a531b80664dfc9f3e96a7f0885dbc8098f6541c332c5dd1514e1624e1f8e23e9a285eb735547a0241095e6a68081c9267c44849a2e4ac4d7f5e29c56b52ad189f957e407867cd1adae545b7c52c1b9ea03f2c6a6ab2d673e20ec15f3a4673a607bba7cfbc4493c081ee15da476fa26a7a1f5b2a1a0c8cd30d2b6ead42c86680371edb1dac8e413c546c022582e153e952de0279a57fc2524eefa7b8858a6fb2b29797dbbc5be56e5f6cae6fbe07014d4a4b4f5ebe1e54e2b6ab46d4e92346ed344affff156632a995413cbc1052f321eb30eab5a0a346e446ed704fe1396866eb06ca71c66e79dd63c00e9b6bec77acc529a40ef6380c168e1dd39e9c5764da908a1d750367810cde1feb164b598c0e6eee05c50a6603de42371166428cf924f595df62f03e52534175b75bfbbc48eb530b8ad9d7738f0dcd81a974e37a1a7d00de9b35c3f7c2eedecdb30086dfbc96355ab2a933a792d88e007313643e136eb63986303329e86cb7833f7dc1780d20783c4a47ec2334802a4c367b376d4575fca8281bc1278c955492813804abbc8a021a4075f4727ed3e79df3ac207c9b429ce8bf3969009119ff566280f052949fa5d25bdfdf9ebe74432b05d3e5d32ace504c41138e797de92a6ecf6188d4964af3d5a0b3943292a8619f67b338cfaf8fb88a27cf89bfc40795ef78814ddfb02d2e6e9dbb3c3ecabd161a35c06c06ad9a11baf4078248d448a304a2f4fa5bf7298e9dcc622db5149c87cf688f1159a681c163168737e1d35d528599ad9c424e038e4cbe83434842aa576db768bc224680372297d797a5a0d94c961d60f332e10045d5e78a0b8ea1cdb7c91a951bd854f7e951db19f73047d16f36f1fb7020bfab640a55ba5d91fa39bacea72075a4b6a748d7f3809b6726768a89b69e845400ad3944f2ca006d740bf47d57ec8bb2c35c1f815ab8dcc28d59b82d54b9d83b1b3c81c8522aeb3f747327c0b59cc664f99b5a4da11724725e3f6359054d42883da5eeac775c1f1b4c8b14991b122aef55ce69cff24c41d66ee71563c5e9948cb8016dbb04cd4f4b1113f63ca7fe0cbc9263c5c5495a1721ad2a2ac58af3c76e53f8e56118b226d62a8bf3ead98b1741492b748d9de1c85f5eaaddc38c78e1047b92b2ab18b72a7dc51a4ac2d47ae605a83a0958be84f1bc25a56a6609225533cf0ba9dc308e0fa4bb2ef61f35b9b8570c718b634aeaf18c9b80eda3e065efa8e7c2e5ee16e57ffa0e8908809d34876a44b541446d45f8afe43cae7229a3dcbe900ab2d3b0cbf42b75f3f733fe99199ed2008bd579b5c2c25b53d9a87ddecc4848f9b6d22b8e606e9a1c5a2b40b8f8eba9d17508f98553d3ab2bf7663e7615d48571d8a5948e3a58f2898b99d53dba88fd394e16c83883acb0a01d96d220bde77a58e9aa44e7bfc0a95584090fe5662fce54e92df46dcde064116959bd9850a15c373620a529f9d595f15530986fc7f23ca3442774a72ba3c055f9c34b6260ae8b3d01144131145b08c04a4477c5489093331cda7ba177ee845a09c344215a9732d6a8a714fac3bc7a3cc0a026752803cee1c59ee4b2d6e4ec5f3399132f15b0819b0f57c5789f062922505532f1be9529a825fc764dc65358610fa12d3976d66ed302ffc7b08e3b5a3caa66dbe6c6233ec72c4aab48709404c18a1593f1cbfb9f17d5725f84436390131cf33d99b6203f324b91eb22bea73f09524c27b1d9b8970edbcbc256164e0d66f99e87b41acc7bce48cb2530f561cf7c1341385a91ba35377e40e1c8a5f8b7a51e75825ed281439ad9436221a94d196282d9c2e820816b501d3c57e0ad41548bd21ef584fd493db784d837ca9b5715f84b5b7ddbf705972a4fbb8494c2782ed4ee15d57652b57cf50cf461820782421d230f2e0c51009201ee21a7caed89017b97b1c150deedfbf79cf2012c1b70e6a5014a93eee47bfbb442de500a89016fe0490d242a705fdbf628ac398ed7fdb007e6dccd14f53927dc543eb3a1cb8c6da323e31c143e1e10782cc084b96db4e0c5a2b388301a952ee8a35cd8bbec2cc3fbe0c0cf4b48d86c2a7b205c5011dee37db6fc582d419ee3252161766b1dcd31488aef80ae1c1d6dd8534811bb06fb8bbcd823426373aad62ea1f997195c6b55c7b011db52f963bac10cf7f5a38b014b904d9b534fa61a7af96c04d2c3904469738dc392bad4ca52e15816c2abb4596d4bf210950b5882bb155c196672238ee1a19220983763f53fe54118f4074073194c6ac136935dcd0d669f51dc2142b1d8c72633f4953c20557b2ee38e75ab519b6bd4544a12f23a243117421bfb02b1623cd599ba5be0201f40dbb7857cae495669a3957085d8fc9cdd0a6ade4deadfbefa4b5ea115a5896d44b6cfe02b9050e67767670477ac71f5b91f41ba4775e8f0a165c929b134e977f487880faf9fd88bf694f3f0e4fcca737c824098fb573b0133d2e9ed17c26b46092297af3cbe752e40eab829f7858af16fd81bf99ff660383522b30a0886b27202784d4107ad602ce0dc4402a64d987b8f336c7c39071c1567848b340a6fe64dc58b5827916ad04ebcbfb4756b736bd92eac1b6dd9fac1c067ea79c5b0d7d45004e1824a5cd3f20bf5e3cb7b29f2992cbd2622e09afff81837c1ed1f0814a167e7aa0273856f5c135ba0e81c1516a87073b786c33cb6ffdd6d89cad8475c2ff1a90a4e0cb75318aaad975374b260784a6ffc5f4c48f4dd1e447f790cc33a55f1a9d26cece6d02cfde20a7a6af316378b5c655d9acdb492cc7e2829b8e265a76891ac216dd6b85b8df2ebf9b70d2c2f9db9d3d89299b00eb9d504b91e6044d7c09c28bbcf70f90742e710a0fee351ea479a47d5397ac92c19522307cc671696021d305dd46654d725dae8abe4259eb59b165f51082e34705b0da0ab904b7ebac2f6b08fbd8e18eb9acc63ddb876a8520b6e2701c4445e9c18d8ac40639189e0442d77bed673d4857d998b2cdd385bae02f2fd789ba6c728b9bc06be1d748dad5a39b41bc66c9b4b8866d3153cc5238f9ad4ec7cc503cad8cfa11e32a3f1e06989c88979327896244bd07e1fd531c917444ec271c12f4634ba3dce308bd8a79f5e8b87f0678cbb0d298905b50d699048bb91fbae8d2f97a8f42316ff0fa6136cb3ba3ff4d2451f4ffda1d2723baa1d89d980d3c81c70881b97638ca654972d4c6f7970595441e306785c6a753ef65de1b5cb060709b94fb7028e45b2b5a36dbf2efd692801c9cbafa380ba287f79d90b50225eeaa44a4f44788aa3125c180e15a9229e6e00a706bf67f00190908c16f2364437488b14c9191f6cb551f47be1ee5c2d06d63e82ba8ddc0390d538e91c7a501d48705ecdd30dbba04d953563eacdb07b3f3f804907f409960009656b0c083d8ea53154ce89b1b30cf20720acab7055262d130d2fd318958f56949e165dba9836e3f6522c39568c354943cfad051a1b25d00dcd942252299e08495a7d72d45d84ae688a6784d345eb7725bd220af72f65936f34fc8bab03950c3214264f84df6a4003308945fdbd876babba97da0e33e3cfdf806f8932c92fb60159b50f78bc6cd9bda1481e014bf7d67638784c4f8b8737f3edd9e64c9a0c08b0a5ccdaf81b935b03f6b55b972dcca9720be420419dfc43ccc15da5dc3764845a1f8948abce7dfa3108b1b6c0946ca91ff1d464d68e5f0006b8851c0c012f0db33446652989a3033f5107afd3df000b5d3d4f7f1f97807a1dd7b2a5f8e7a44b31bad31986e410cc486db4ba6301a9429055e425cfffed1e62bf6db9237d16e9ab7ec8ffb7de7c27f1586cccecf041d0b92527f7a2e70ff4ba6927b2b7ef1762277c2a5b080d189e6cb395bddc0e305c26bee72acd0d129f75d526b20d3a1800b4eae0b1a5cb1ce25872fed55b4c22c8b023f58fd84c68e4727bc6ae91cd3ba641dc84af1e5df654900fc6a4436f975f41d901556d04435c40495c56488b51ace3e0c8c007e08636c5228581db70b00c1857b9388db35a872e4916055838003fe41d286efac270c45f3d49783d40c30bd8f24dd5b8243fd64f72ebb72f1cffe1e7164fb519a1956609c0083d1e9a47e2c256a2059326f2cc05081cb7525399288ad6165acf41f66b1f6726f71e838bb6a74ac9e8c3a8827fcdf074742253033ad31c6bd65c133635a9768986d9903268de2660b75be5e452667412f9a8f0811709a342a148bf2f8052883d346d573cad978b67f80c834c581eb6bb8ac6720e39c291caf0685bb343f4435ed7661a2c202060965006cbf930ef8846176beba2b666c781af280f305f379fb51c3ac6177f76efe29eca442d0322253118cde178e1b9bf4cd5b2f1b2ace7a8ce309b3303766a05ebbff06d74f66ac2ad3185707ce2213ea63e17f8f45eb8b78f13c2e0a4acf97cf737a1de915044cfc67b416df7c4648e01c69124fdfc779890ed0326f3761960639f40a1d98854e3a755d72ba3f7888f319b202782f6c2ba63b3e51ffc0c336ff758f8cc84c22c7d0d032e8207e6d6309374b640a3b3877ea634098efc222ca8804165bc143dee2f939588099de69d248c8940ffe923a36e23e5d8a9fcde5558226139c83a4c58052d351c11a36e686aa4eddc1c5094c5d2701e8c70b59f8ea6b799ef5579150261fd81547c04d79ee95f4e2f82f3ea885b543308adbc5cdc8dbe23963704ebc95f516c0c52293ffba04aeaabe3e299b7b8e20d27fe3e9e9fa0ea19e3c49128810d5bdc6ab334b7614bb7908b0c4fcc696998097da7382c0616ce7f8b80dd67da7f6520e1fe87e5887e2b16949733225f0b730aebd9cc389e65e36fcad5803e46d3eed97854d3d756e2206a7fc7d79faada6482c58737bb4f41c7bf4e7bafb040d8c0bcece55fe1295cdef11a6890e40075f64a44f18de0d824064b98f616f2257236d5510870e4397b5d9ae3fb221dfdf66cb12fcfeb603d3f2a1faf33cbee2bc026763971d287b46bb3f1a22f335ab37ffc4bb9a8c74ab9315267955e9b1d84394793728faa88bbf97d13ad258b238c8be8d71187e5e2fefea1ba3313d55a5e9b54fd2489c4c5ff1e2f06e2c6b857740694bfc44800c0ca6298576df83b014f", 0x1000) ioctl$SNDRV_TIMER_IOCTL_INFO(r5, 0x80e85411, &(0x7f0000001980)=""/7) ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$NBD_SET_SOCK(r0, 0xab00, r2) syz_open_dev$loop(&(0x7f00000019c0)='/dev/loop#\x00', 0xfff, 0x22000) accept$inet6(r2, &(0x7f0000001a00)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f0000001a40)=0x1c) [ 227.991932] IPVS: ftp: loaded support on port[0] = 21 01:32:09 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xfffffffffffff2fb, 0x40000) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000040)=0xfffffffffffffff8) r1 = getpid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)=0x3) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0xffffffffffff7fff, 0x4, 0x800}) read(r0, &(0x7f0000000100), 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_dccp_int(r3, 0x21, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000200)={"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"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000640)={&(0x7f0000000600)='./file0\x00', r2}, 0x10) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rfkill\x00', 0x220042, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) ioctl$FITRIM(r5, 0xc0185879, &(0x7f00000007c0)={0x80000000, 0x1ff, 0x200}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000800)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000880)={0x8, 0x120, 0xfa00, {0x2, {0x6, 0x3, "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", 0xa, 0xffff, 0x10000, 0x3, 0x569, 0x7fffffff, 0x0, 0x1}, r6}}, 0x128) r7 = request_key(&(0x7f00000009c0)='cifs.idmap\x00', &(0x7f0000000a00)={'syz', 0x1}, &(0x7f0000000a40)='/dev/fuse\x00', 0xfffffffffffffffa) keyctl$setperm(0x5, r7, 0x1000400) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000c40)={r2, 0x10, &(0x7f0000000c00)={&(0x7f0000000b40)=""/133, 0x85, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000cc0)={r2, 0x10, &(0x7f0000000c80)={&(0x7f0000000a80)=""/150, 0x96, r8}}, 0x10) prctl$setptracer(0x59616d61, r1) bind$bt_rfcomm(r4, &(0x7f0000000d00)={0x1f, {0xdd9, 0xc00, 0x3, 0xfa, 0x0, 0x2}, 0x9}, 0xa) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000d40)={0x0, 0x3, 0x4, 0x2, 0x1}) futex(&(0x7f0000000d80), 0x9, 0x0, &(0x7f0000000dc0)={0x0, 0x1c9c380}, &(0x7f0000000e00), 0x0) move_pages(r1, 0x8, &(0x7f0000000e40)=[&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil], 0x0, &(0x7f0000000e80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f0000000ec0)={0x3, r4}) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000f00)={0xffff, 0x8001, 0x1ff}) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000f40)) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000000f80)=""/88) socket$xdp(0x2c, 0x3, 0x0) [ 228.305976] IPVS: ftp: loaded support on port[0] = 21 01:32:10 executing program 3: r0 = dup(0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000000)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x1c) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000080)={r1, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x11}}}}, 0x84) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000140)={0x9d, 0x80000001, 0x63}) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000180)=0x1) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000240), &(0x7f0000000280)=0x4) write$P9_RSETATTR(r0, &(0x7f00000002c0)={0x7, 0x1b, 0x2}, 0x7) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)={r0, r0}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000340)=""/185, &(0x7f0000000400)=0xb9) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000440)={r2, 0x80000001, 0x6625}, 0x8) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000480)={0x3, 0x5, 0x9, 0x0, 0x7}) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000500)='trusted.overlay.nlink\x00', &(0x7f0000000540)={'L-', 0x1}, 0x28, 0x1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000580)={'ipvs\x00'}, &(0x7f00000005c0)=0x1e) connect$rds(r0, &(0x7f0000000600)={0x2, 0x4e24, @multicast1}, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000640)={r2, @in6={{0xa, 0x4e23, 0xca23, @empty, 0x2}}}, 0x84) r3 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3, r3) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000740)={0x359, 0x6, 0x34, &(0x7f0000000700)="3a5d04cac02fbab548d29155aba52344e454f893b5e13df810a7ef98d2a232641a505966637301f05b2c97f5b9121596417fdf07"}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000780)={{{@in=@broadcast, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000880)=0xe8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000008c0)={@loopback, @loopback, @mcast2, 0x80000001, 0x6, 0x8, 0x400, 0x0, 0xc00000, r4}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000980)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000940)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000009c0)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @in={0x2, 0x4e20, @broadcast}}}, 0x90) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000a80)={@ipv4={[], [], @broadcast}, 0x52, r4}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000ac0), 0x10) times(&(0x7f0000000b00)) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000b40)) [ 228.984585] IPVS: ftp: loaded support on port[0] = 21 01:32:11 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x404000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000040)={0x9, 0x14, [0x7, 0x10001, 0x400, 0x69, 0x0]}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000000200)=0xe8) sendmsg$nl_generic(r0, &(0x7f00000005c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x900000}, 0xc, &(0x7f0000000580)={&(0x7f0000000240)={0x304, 0x35, 0x2, 0x70bd2c, 0x25dfdbff, {0x1d}, [@nested={0xd4, 0x8f, [@generic="315f2ca14937f87bbdce7e81c02674c4659f0a38fad8f50ae1e54bcfedff0bee3939a0c11f8deabb694f74112b58274ff85f038ddcee1484400bd5cef0e35f5ce360a00877bae55fdddae6c9e69df8f2c6807e46b60f67609f81d44370c792058fe548dcb79374075c1cc84c69b9eb83c35fc8813dfa3cb71ff4f9cc5c7ece12239edda91fb95d7f5575635d12d48ad7c7f30a89d4e489e64b89946517875f188839dce55028b8660a73e3fa49c064381f3e76609d2c", @typed={0x18, 0x37, @str='/dev/qat_adf_ctl\x00'}]}, @nested={0x1f0, 0x64, [@generic="810a8d1a4d7b3766bef4c0cf1be72f06485c61648f1f1c0d0b1905c1ed14bd5e775031981d58e7dd09b0dcf53b780275d0d24754f9bf3c2609900e4d8c1d15a33268871aeb5bde38e5ece69e1f38599b6a7ea1dccf7d86caf3b76f7b1d91b5c8ea6770a72713beb2b72c232c547bb54474d084fd5170d42e6d6a7222e7ad833f318be6f821eeb499413432d488dd40e8a2a884168c15f1c6bf900f7437e92fcb8a3b488656a25a890fba0d25dc6cda577f2606f92368c40e5e0566cf069e856b83a40dc9477bcfbc95b1453802c2dea1b8b2b78d3df8", @generic="40667987b3001fd23ac673f30b04595a86dbba65298649f31912b930c70cf3c0d8292ceef9be5e9c18ceb389b21bdc16ccbe3c7f229feb434a477aa129682088c54a2d8e36f397ca9e189caf0abbb79dad516c2d81d3e38ee97fdf6fc68884020abca79b277271775083e4e19f76c3abe96e6e5dba60416ab0ec6045d60d03fc1cd6854a730a060ab6580cc842d24b7779e4e9d1b252d2ca", @generic="97824c6202b2ce0f9991fd7a9db9402adfb95d4d7d27861ab2c62a3a7091b7874158e7305710b3b494ae51044e42b3bd10650afba7a4dcde6237f41e04c3db09a6e38d16f25e2f1f503493294fde2993d6117c484e69db35c0e9fd", @typed={0x18, 0x6f, @str='/dev/qat_adf_ctl\x00'}, @typed={0x8, 0x22, @pid=r1}]}, @typed={0x8, 0x85, @u32=0xfffffffffffffff9}, @nested={0x24, 0x33, [@generic, @generic="b4d2f6886dc7d0823bf577d342109a328c301b", @typed={0x8, 0x51, @uid=r3}, @typed={0x4, 0x7c}]}]}, 0x304}, 0x1, 0x0, 0x0, 0x4008004}, 0x8010) r4 = syz_open_procfs(r1, &(0x7f0000000600)='net/bnep\x00') getsockname$llc(r4, &(0x7f0000000640)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x10) r5 = request_key(&(0x7f0000000840)='cifs.spnego\x00', &(0x7f0000000880)={'syz', 0x1}, &(0x7f00000008c0)='net/bnep\x00', 0x0) r6 = add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)="f16d797a52636b1be72ce54fde657d3ad2fd8e11c923fc76fdb37e605612dfa70a879c06ce4de50e39e91bdf66de8b741237c76a5ca2f8aca3e32090cc1d3daed2ecee4abb83ef1f823a972ffeb21720fa6f1800de86756b031d64964442168b839a067808fad4dc7b04aa40e9b3c18cc3e243282f6d34db6605f59ba163cd4320ec5f885d79ec4ebd14351220386f8d4c921819d041f73eda4685108fc6c39c2b94fd769330144c05fcbb3962c97a84d8940ed84a7590053df3a2ffa54c77c432de2df564296bc492ca95474b8fd28be16445356746e6776d09f1311ea79dcbf7753c38d825148591a789", 0xeb, r5) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x400, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000940)={'team0\x00', r2}) setpriority(0x2, r1, 0x613c) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000a00)={'nr0\x00', &(0x7f0000000980)=@ethtool_regs={0x4, 0x9, 0x54, "72dbfce7c50de3a7779700f2adc1eacabc66d003856ac799f711252514988116c13afebc3461f8be113adb3e890d7d99c125bc1cbeec26f2b21681d8ce3e63d69f2ca95f221f31bac4154ef08386371e931d01e4"}}) setsockopt$inet6_MCAST_MSFILTER(r7, 0x29, 0x30, &(0x7f0000000a40)={0x2, {{0xa, 0x4e23, 0x20000000000000, @mcast1, 0x9}}, 0x0, 0x4, [{{0xa, 0x4e24, 0x8000, @loopback, 0x609}}, {{0xa, 0x4e23, 0xffffffff, @mcast1, 0xfba}}, {{0xa, 0x4e22, 0x4, @loopback, 0x1f6d}}, {{0xa, 0x4e23, 0x604086cd, @mcast2, 0x8}}]}, 0x290) ioctl$SG_SET_FORCE_PACK_ID(r4, 0x227b, &(0x7f0000000d00)=0x1) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000d40)="e4ef104d5e7856cdd7c9356fb6bc1b49d3e52f73c04958c08dc329cd14eb4824b16afd81be8b0ec632648382e6c0d9799e1badc11b66cefbcf73e8d714c8d64a864c1206f46a20916dc8a03c4eb8432f60e86ec619fae7c6bfafe3f6521de4d1e50fbe088364bd93ff201e495418de1a78797df3d830219a4fd5accd5863b74958689287eac25d5c0a20ac3cdaf53466580473425af67749eb177e3ef14b7517f2f00e8d49798cdb5ea4", 0xaa) mount$9p_xen(&(0x7f0000000e00)=',md5sumtrustedsystem\x00', &(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)='9p\x00', 0x20000, &(0x7f0000000ec0)={'trans=xen,', {[{@dfltuid={'dfltuid', 0x3d, r3}}, {@version_u='version=9p2000.u'}, {@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@pcr={'pcr', 0x3d, 0x28}}]}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000f40)=0x401) ioctl$DRM_IOCTL_AGP_ALLOC(r7, 0xc0206434, &(0x7f0000000f80)={0x3, 0x0, 0x0, 0x401}) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000fc0)={0x400, r8, 0x10000, 0x101}) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000001000)={0x8, 0x3869, 0x2000000, 0x5312, 0x1}) sendmsg(r4, &(0x7f0000001280)={&(0x7f0000001040)=@sco={0x1f, {0x2, 0x1, 0x9, 0x0, 0x5, 0x6}}, 0x80, &(0x7f0000001240)=[{&(0x7f00000010c0)="83831827df9862cca74ae831d2b2a63096a4f24a3a9e6fac0f8a66e27494c5680daadc4362a3c40906ba8f1f8282145490d2039b241e3b7fdabdccc77b012ee73dc6cc08ef69c8e276b65dfccd27d6bc73aff1daf15a92e1c6c757d8fb01c0a9457da262ce0ce4bc69a7c1ba2c0221d53e09316f62d531b397637bb44e93ea9c544fb721", 0x84}, {&(0x7f0000001180)="c8a78efab16226f1d03f", 0xa}, {&(0x7f00000011c0)}, {&(0x7f0000001200)="1653385163dccbfcb64da54ebdfa", 0xe}], 0x4, 0x0, 0x0, 0x40}, 0x80) setsockopt$inet6_dccp_int(r4, 0x21, 0x11, &(0x7f00000012c0)=0x80000000, 0x4) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000001300)=r1) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f0000001340)={'team_slave_0\x00', {0x2, 0x4e21, @rand_addr=0x9}}) write$binfmt_aout(r7, &(0x7f0000001380)={{0x10b, 0x9ef, 0x3, 0xd8, 0x11a, 0x5, 0x1a8, 0x7}, "cafb8db7bca3247f340d125ab3"}, 0x2d) keyctl$assume_authority(0x10, r6) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f00000013c0)={0x0, @in6={{0xa, 0x4e22, 0x2, @empty, 0x5}}, 0x0, 0x10001, 0x6, 0x7, 0x40}, &(0x7f0000001480)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f00000014c0)={r9, 0x3}, &(0x7f0000001500)=0x8) [ 229.408194] IPVS: ftp: loaded support on port[0] = 21 [ 229.480049] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.490473] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.512024] device bridge_slave_0 entered promiscuous mode [ 229.612586] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.619071] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.638211] device bridge_slave_0 entered promiscuous mode [ 229.660323] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.687461] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.711007] device bridge_slave_1 entered promiscuous mode [ 229.771706] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.784316] bridge0: port 2(bridge_slave_1) entered disabled state 01:32:11 executing program 5: lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, '%'}, 0x2, 0x2) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) fchownat(r2, &(0x7f0000000180)='./file0/file0\x00', r0, r1, 0x400) ioctl$FIGETBSZ(r2, 0x2, &(0x7f00000001c0)) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000200)) r3 = socket$netlink(0x10, 0x3, 0x1d) ioctl$TIOCCONS(r2, 0x541d) syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000280)='./file1\x00', 0x800, 0x1, &(0x7f00000003c0)=[{&(0x7f00000002c0)="c686a24a77c74e7d1ad2cdd435d4c3bddf217f5dd4bff94448841f6893ce9d28ef26ca5e2613df4faa691de6e7bf9beaccc8494ec70aaba6581ae0269cd210848249ba500c163b5f95c44b79b66cea397c619c76831ddccc016ef86b6a3528612a73c02696ad2e796f80ceb9833a3bc85fc1c8c0dae22f5afca030a95cd41a2de0c10dc04f2f631ca1462cd1ee0f21cebff0d60662206b14432ae70b63f08751dee7170edecb51831abb13c29af5143ad42798e177162912d0f634c5a0b189799897928eb57381ed56d80cc1d239db63c125b0b0", 0xd4, 0x1d72dbe9}], 0x1000, &(0x7f0000000400)='security.evm\x00') lsetxattr(&(0x7f0000000440)='./file0/file1\x00', &(0x7f0000000480)=@random={'system.', "5d736563757269747989"}, &(0x7f00000004c0)='nfs\x00', 0x4, 0x1) mount(&(0x7f0000000500)=@sr0='/dev/sr0\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='mqueue\x00', 0x202040, &(0x7f00000005c0)="5d736563757269747989") bind$rds(r2, &(0x7f0000000600)={0x2, 0x4e24, @rand_addr=0x401}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x24, 0x6e, {"d98f60600ee8c2128c1a69"}}, {0x0, "ae226afe1b69bba72e1b49681105f2fe7ec7cd5f2cc1403dac1f35af408e9d3021256d0a61d04259aa36cc93eb63be0eb2210da17ac27b3ef3b34b7e4f0de40c8f8d61d796ab6619475ad6ee192dcb26c16a071690f7f8625c39b2ce93b46feda6248e145b718ed227b1a27c500bad8086595eb7a705e0e582c2c9ca6853155dd6d2af73efb8c489c5b1de6de9543fe521ed465227d269d7ddd6a3d9d519f77128308b742a09208738405dd1adc16328bf8c1c5a76570df0f79cf3e29ef02a54fbcb6d8c9251a195ed1ca1d860cfc7"}}, &(0x7f0000000740)=""/86, 0xf5, 0x56}, 0x20) lsetxattr$security_smack_transmute(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000880)='TRUE', 0x4, 0x1) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000008c0)) ioctl$RTC_AIE_OFF(r2, 0x7002) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000a40)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x48, r4, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffffd}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x48}}, 0x4001) write$input_event(r2, &(0x7f0000000a80)={{}, 0x16, 0x1f, 0x8}, 0x18) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000ac0)={0x7b, 0x0, [0x6, 0x10001, 0x2, 0x6da]}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000b40)=@sack_info={0x0, 0x8, 0x7}, &(0x7f0000000b80)=0xc) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000bc0)={r5, 0x7fffffff, 0x80000001, 0x9}, 0x10) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000c00)={0xe, 0x6, 0x10001, 0x3, 0xab, "61768894f920ebf26b19fd2cd8e571fc67fee1e397d6dcbe50af6958fffdab5271c2a25d64b0d189a9839866a37b6a185824810d12598de49c3c428662807cdf9d3719a7a5ff912d50353305ceaa3ba62114c9296bc8c91516002524acc141a65e01589f0d00737009eb5573879e47d861c576d6e79c2a7cda17c0233cb3bd821640ac70de6dd703b3904a05b40e8f961d38c5448dc61abb87b7df8e84c5524a33b3ce3e9d46ab0f5dfa45"}, 0xb7) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000cc0)={0x3}) setxattr$trusted_overlay_nlink(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='trusted.overlay.nlink\x00', &(0x7f0000000d80)={'U-', 0x1}, 0x28, 0x3) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x5) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000dc0)=0x5, 0x4) syz_mount_image$reiserfs(&(0x7f0000000e00)='reiserfs\x00', &(0x7f0000000e40)='./file0\x00', 0x6, 0x2, &(0x7f0000001000)=[{&(0x7f0000000e80)="049ccac119dfb8140dbeaa522b6b98c459e7b1c5849416fc8ca0366d35b71ebeca27a170b43153165ea060f5f2df4a439c169d28d23c63da4b1985834553cae81f353b64799bb28c6714b8dc1eeea38803ef6a03973405c2c66a74e6ac3d2b8c570f439ed47b1da2f94e9b6126577ac8439c8b1768d9c0ff", 0x78, 0x4}, {&(0x7f0000000f00)="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", 0xfb, 0x7}], 0x2000000, &(0x7f0000001040)={[{@data_writeback='data=writeback'}, {@expose_privroot='expose_privroot'}, {@conv='conv'}, {@tails_on='tails=on'}], [{@audit='audit'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@dont_measure='dont_measure'}, {@appraise='appraise'}, {@uid_eq={'uid', 0x3d, r0}}, {@measure='measure'}, {@dont_appraise='dont_appraise'}, {@appraise_type='appraise_type=imasig'}, {@smackfshat={'smackfshat', 0x3d, 'security.SMACK64TRANSMUTE\x00'}}]}) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000001140)={'team_slave_1\x00', {0x2, 0x4e22}}) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000001180)={'ip6gretap0\x00', {0x2, 0x4e23, @multicast2}}) [ 229.812081] device bridge_slave_1 entered promiscuous mode [ 229.838461] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.949855] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 230.009311] IPVS: ftp: loaded support on port[0] = 21 [ 230.015386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 230.065753] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 230.413952] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.438773] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.473479] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.484011] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.497045] device bridge_slave_0 entered promiscuous mode [ 230.516233] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.592495] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.613220] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.620140] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.633092] device bridge_slave_1 entered promiscuous mode [ 230.742475] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 230.905201] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 230.917694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.975032] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.200168] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 231.221865] team0: Port device team_slave_0 added [ 231.307158] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.323627] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.332187] device bridge_slave_0 entered promiscuous mode [ 231.341977] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 231.349452] team0: Port device team_slave_1 added [ 231.390359] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 231.412107] team0: Port device team_slave_0 added [ 231.427674] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 231.507374] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.520497] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.528057] device bridge_slave_1 entered promiscuous mode [ 231.547214] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 231.571466] team0: Port device team_slave_1 added [ 231.580501] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 231.599399] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.647176] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 231.722071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.768325] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 231.802780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.819090] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.830829] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.846473] device bridge_slave_0 entered promiscuous mode [ 231.857768] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 231.875128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.891390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.906847] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 231.923289] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.930412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.961804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.981161] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.993097] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.000332] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.007562] device bridge_slave_1 entered promiscuous mode [ 232.073847] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 232.088103] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 232.111155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.141728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.150497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.159020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.175326] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 232.206610] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.222254] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.240985] device bridge_slave_0 entered promiscuous mode [ 232.251432] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 232.260392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.268939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.329411] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.350224] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 232.375254] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 232.391628] team0: Port device team_slave_0 added [ 232.397297] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.408987] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.421929] device bridge_slave_1 entered promiscuous mode [ 232.492794] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.546000] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 232.566956] team0: Port device team_slave_1 added [ 232.589736] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 232.711186] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.741064] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 232.752826] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 232.816255] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.889378] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 232.997448] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 233.007388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.016879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.064821] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 233.095207] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.134232] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 233.152999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.163138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.182943] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 233.192729] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 233.200140] team0: Port device team_slave_0 added [ 233.243777] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 233.271447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.316768] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 233.325388] team0: Port device team_slave_1 added [ 233.339477] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 233.422627] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.481314] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 233.488208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.530630] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.537156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.544145] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.550522] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.566058] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 233.622078] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.662875] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.669289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.676038] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.682452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.702465] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 233.727301] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 233.761587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.772072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.791063] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 233.809828] team0: Port device team_slave_0 added [ 233.891925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.900231] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.940173] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 233.958299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.976030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.987449] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 233.995368] team0: Port device team_slave_1 added [ 234.016635] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 234.041564] team0: Port device team_slave_0 added [ 234.134899] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 234.143667] team0: Port device team_slave_1 added [ 234.151529] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 234.158405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.173239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.244749] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 234.261029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.272712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.301146] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 234.326267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.351693] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.379252] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 234.391439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 234.403589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.421911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.437086] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.452266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.541673] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 234.548857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.567142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.585654] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 234.620782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.628842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.670784] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 234.677949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.691503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.719548] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.726018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.732737] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.739107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.769319] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 234.901897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.451447] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.457863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.464574] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.470980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.485223] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 235.910878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.973839] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.980243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.986979] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.993384] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.012456] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 236.039350] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.045981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.052722] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.059097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.097486] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 236.983794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 236.992597] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.913463] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.158345] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.356858] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 239.631441] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 239.791713] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 239.801927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.816579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.939202] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.088044] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 240.097889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.114430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.281328] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.381415] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 240.521118] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.824671] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 240.840795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.848314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.872422] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.006847] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.026456] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.229225] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.370335] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 241.495368] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 241.541862] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 241.806664] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 241.833252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.846750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.957183] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 241.970468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 242.001498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.011767] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 242.020923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 242.027962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.269419] 8021q: adding VLAN 0 to HW filter on device team0 [ 242.414162] 8021q: adding VLAN 0 to HW filter on device team0 [ 242.449855] 8021q: adding VLAN 0 to HW filter on device team0 01:32:25 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000640)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x0, &(0x7f0000000040)='+'}) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=[@increfs_done], 0x0, 0x0, &(0x7f0000000780)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000380)={0x8, 0x0, &(0x7f0000000500)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f0000000400)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x14, 0x0, &(0x7f0000000680)=[@acquire_done], 0x0, 0x0, &(0x7f00000007c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0), 0x48, 0x0, &(0x7f0000000540)="f587fe19062113e2a33c67032824d4662974e970062eb693d5d4a58f17e2429d3980a167f8ffbaf81b0479dd36e0e56efe00025db03b4fbb05766ab159ad12d8edbde8015cccbcd9"}) [ 243.402284] Unknown ioctl -2113360285 [ 243.411365] Unknown ioctl 35083 [ 243.414958] Unknown ioctl 8817 [ 243.418438] Unknown ioctl -2120175988 [ 243.426898] Unknown ioctl 43776 [ 243.431817] Unknown ioctl -2113360285 [ 243.437349] Unknown ioctl 35083 [ 243.452249] Unknown ioctl 8817 [ 243.460883] Unknown ioctl -2120175988 [ 243.467288] Unknown ioctl 43776 01:32:25 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000005000)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0xa, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423605f3050015739d53d5"]}, 0x48}}, 0x0) 01:32:25 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000), 0x1, 0x0, &(0x7f0000000040)='+'}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=[@increfs_done], 0x0, 0x0, &(0x7f0000000780)}) 01:32:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={&(0x7f0000000040), 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000c000100aaaaaaaaaa00000008001b0000000000"], 0x1}}, 0x0) 01:32:25 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="0180c2000000aaaabaaaaabb86dd60093a0600083a00fe8000000000000000000000000000bbff2000000000000000000000201b931b0000000000089078"], &(0x7f0000000100)) 01:32:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={&(0x7f0000000000), 0xc, &(0x7f0000000400)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0x4}}}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0xb21}]}, 0x3c}}, 0x0) [ 244.169281] binder_alloc: binder_alloc_mmap_handler: 7006 20001000-20004000 already mapped failed -16 [ 244.185578] binder: BINDER_SET_CONTEXT_MGR already set [ 244.201546] binder: 7006:7093 ioctl 40046207 0 returned -16 [ 244.207632] binder_alloc: 7006: binder_alloc_buf, no vma [ 244.220553] binder: 7006:7009 transaction failed 29189/-3, size 24-8 line 2973 [ 244.252060] binder: 7006:7093 BC_INCREFS_DONE u0000000000000000 no match 01:32:26 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x7ff) [ 244.276505] binder: 7006:7009 Release 1 refcount change on invalid ref 1 ret -22 [ 244.323485] binder: send failed reply for transaction 2 to 7006:7017 [ 244.334127] binder: send failed reply for transaction 5 to 7047:7055 01:32:26 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x2, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x34c, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) clone(0x0, &(0x7f0000000140)="b30b488b8d030ab103b38ba2b3c644e1e22aafa3404e6e091f17a9d5690ca8195c780f21b8cc8d044454ec970cdcf4345d8f99b6e6a34c2c48761c48bb752811890e9f2d0e02d021d6b30e79540e616d0008e6ce1f1298ce2e0c73f634a851a6ecc771fe2dad34c222bb167f43297db877", &(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0)) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/175) write(r5, &(0x7f00000001c0), 0xfffffef3) getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r0, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 01:32:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x803, 0x68) ioctl(r1, 0x1000008912, &(0x7f0000000380)="0a5c2d023c126285718070") sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) writev(r0, &(0x7f0000002500)=[{&(0x7f0000000100)}], 0x1) sendto$inet(r0, &(0x7f0000000000), 0x1fe, 0xc0, &(0x7f00000000c0), 0x6) [ 244.364932] binder: undelivered TRANSACTION_ERROR: 29189 [ 244.548641] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 244.555493] binder: 7047:7126 transaction failed 29189/-22, size 24-8 line 2834 [ 244.565745] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 244.574436] binder: 7047:7126 BC_INCREFS_DONE u0000000000000000 no match [ 244.582262] binder: undelivered TRANSACTION_ERROR: 29189 01:32:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x2c, 0x32, 0x829, 0x0, 0x0, {0x3}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0x8000000000}}]}]}, 0x2c}}, 0x0) 01:32:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0xfffffffffffffffc}, 0x1c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00', 0xfffffffffffffffb}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f0000000040)=0x68) [ 245.139296] device lo entered promiscuous mode [ 245.172987] netlink: zone id is out of range [ 245.184431] netlink: get zone limit has 4 unknown bytes [ 245.206134] netlink: zone id is out of range [ 245.212669] netlink: get zone limit has 4 unknown bytes [ 245.282984] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "audit" [ 245.285598] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 01:32:27 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000240)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000880)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000a80)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file2\x00') rename(&(0x7f0000000080)='./file2\x00', &(0x7f0000000140)='./file1\x00') r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") unlink(&(0x7f0000000800)='./file1\x00') 01:32:27 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000640)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x0, &(0x7f0000000040)='+'}) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=[@increfs_done], 0x0, 0x0, &(0x7f0000000780)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000380)={0x8, 0x0, &(0x7f0000000500)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f0000000400)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x14, 0x0, &(0x7f0000000680)=[@acquire_done], 0x0, 0x0, &(0x7f00000007c0)}) 01:32:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000002c0)="775d81fbfb3001ac96fb07e76895ac84", 0x10) close(r0) 01:32:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0xfffffffffffffffc}, 0x1c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00', 0xfffffffffffffffb}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f0000000040)=0x68) 01:32:27 executing program 3: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xc) 01:32:27 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) sendto$inet6(r0, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) 01:32:27 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() ptrace$cont(0xffffffffffffffff, 0x0, 0x20, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00') link(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f00000002c0)=0x80000000, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000008c0), 0xffffffffffffffff) rename(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0\x00') chroot(&(0x7f00000000c0)='./file0\x00') 01:32:27 executing program 3: sendto$inet(0xffffffffffffffff, &(0x7f00000003c0), 0xfffffffffffffee0, 0x0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f0000003000), 0x4ea) read$FUSE(r0, &(0x7f0000005000), 0xe83) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000008000), 0x139f) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x10165) socket(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0), 0x4000000000002c0, 0x0, &(0x7f0000001540)) write$FUSE_OPEN(r0, &(0x7f0000000640)={0x20, 0x0, 0x3}, 0x20) ioctl(r1, 0xffffffffffffffff, &(0x7f0000000b40)) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) 01:32:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) writev(r0, &(0x7f0000002500)=[{&(0x7f0000000100)="cd", 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000000), 0x1fe, 0xc0, &(0x7f00000000c0), 0x6) [ 245.530040] __ntfs_error: 8 callbacks suppressed [ 245.530050] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 245.546615] binder_alloc: binder_alloc_mmap_handler: 7197 20001000-20004000 already mapped failed -16 [ 245.618058] binder: BINDER_SET_CONTEXT_MGR already set [ 245.643611] overlayfs: failed to resolve './file1': -2 [ 245.649580] binder: 7197:7199 ioctl 40046207 0 returned -16 [ 245.661985] hrtimer: interrupt took 30335 ns [ 245.669457] binder_alloc: 7197: binder_alloc_buf, no vma [ 245.679892] binder: 7197:7215 BC_INCREFS_DONE u0000000000000000 no match 01:32:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={"6272696467655f736c6176655f300004"}) 01:32:27 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") fanotify_init(0x48, 0x0) 01:32:27 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000140)={'syz_tun\x00', {0x2, 0x0, @rand_addr}}) [ 245.723438] binder: release 7197:7207 transaction 11 out, still active [ 245.736219] binder: 7197:7207 transaction failed 29189/-3, size 24-8 line 2973 [ 245.745770] binder: send failed reply for transaction 11, target dead 01:32:27 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 01:32:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000080)={{0x87, @local, 0x4e22, 0x3, 'dh\x00', 0x28, 0x20, 0x50}, {@empty, 0x4e24, 0x5, 0x5, 0x101, 0xfb5}}, 0x44) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000001200)={0x0, {0x2, 0x0, @loopback}, {}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='veth0_to_team\x00', 0x0, 0x20, 0x4}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000000580)=0xe8) r3 = epoll_create(0xfff) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@multicast2, 0x4e21, 0xfffffffffffffffd, 0x4e23, 0x3, 0xa, 0x80, 0x20, 0x32, r1, r2}, {0x4dcd, 0x9, 0x0, 0x8000, 0x4, 0x80000001, 0x5, 0x5}, {0x8, 0xf348, 0x4, 0x5}, 0xe8, 0x6e6bb3, 0x2, 0x1, 0x2, 0x3}, {{@in=@multicast1, 0x4d5, 0xff}, 0xa, @in6=@mcast1, 0x3501, 0x3, 0x0, 0xc7d7, 0xffffffff, 0x3}}, 0xe8) [ 245.855689] IPVS: set_ctl: invalid protocol: 135 172.20.20.170:20002 [ 245.893058] IPVS: set_ctl: invalid protocol: 135 172.20.20.170:20002 01:32:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={"6c6f001151160961000000001d00", 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_newaddr={0x34, 0x14, 0x101, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_ADDRESS={0x14, 0x1, @loopback}, @IFA_FLAGS={0x8, 0x8, 0x100}]}, 0x34}}, 0x0) 01:32:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0xfffffffffffff000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=@newlink={0x48, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_IFALIAS={0x14, 0x14, 'bcsf0\x00'}, @IFLA_IFNAME={0x14, 0x3, 'bridge_slave_1\x00'}]}, 0x48}}, 0x0) 01:32:27 executing program 0: accept$alg(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="1d1d09d988836c56c4e219496d0f16b8b5f42eed", 0x14) unshare(0x40000000) [ 245.933747] bridge0: port 1(bridge_slave_0) entered disabled state 01:32:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 01:32:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000001200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x0, @broadcast}, 0x0, 0x7, 0x8001, 0x3, 0x10, &(0x7f0000000040)='veth0_to_team\x00', 0xf83e, 0x7, 0x4}) 01:32:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20000, 0x0) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 01:32:27 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x2, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64031, 0xffffffffffffffff, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f00000000c0), 0x4) [ 246.125427] IPVS: ftp: loaded support on port[0] = 21 01:32:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="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") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000000000/0xd000)=nil, 0xd000, 0x0, 0x20011, r1, 0x0) unshare(0x20400) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000180)) 01:32:28 executing program 4: socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000003c0), 0xfffffffffffffee0, 0x0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f0000003000), 0x4ea) read$FUSE(r0, &(0x7f0000005000), 0xe83) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000008000), 0x139f) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x10165) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0), 0x4000000000002c0, 0x0, &(0x7f0000001540)) write$FUSE_OPEN(r0, &(0x7f0000000640)={0x20, 0x0, 0x3}, 0x20) ioctl(r1, 0xffffffffffffffff, &(0x7f0000000b40)) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 01:32:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0xff) 01:32:28 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000100)="1d1d09d988836c56c4e219496d0f", 0xe) unshare(0x40000000) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) [ 246.346973] IPVS: ftp: loaded support on port[0] = 21 01:32:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_type(r0, &(0x7f00000001c0)='threaded\b', 0xfff9) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000140)={0x0, 0x1, 0x0, 0xd4e}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000004c0)={0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x125}) 01:32:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) r2 = request_key(&(0x7f0000000440)='syzkaller\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f0000000500)='user\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='}vboxnet1\x00', r2) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) 01:32:28 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000040)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "7e9661", 0x10, 0x32, 0x0, @ipv4={[], [], @multicast2}, @local, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "00a311", 0x0, "94c426"}}}}}}}, 0x0) 01:32:28 executing program 3: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) [ 246.594814] IPVS: ftp: loaded support on port[0] = 21 01:32:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 01:32:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000880)={'mangle\x00'}, &(0x7f0000000780)=0x54) 01:32:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) read(r0, &(0x7f0000000100)=""/49, 0x31) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f00000000c0)=@ipv4_getrule={0x20, 0x22, 0x727}, 0x20}}, 0x0) 01:32:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800100000003) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000fe8000000000000000000000000000aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d227a7c592100e4eb7752d524f82b549a137fc56a78c355c621019717deeed7959857c56efc4e4e2494cb95922736296894935b66b855a92c84637a4df94ebc22a25e53bb5ecfab515ac5e80d9cfea2d7943f32e9f1f6a5324bb4f2c193107fffd549f0bc9b65d108c600b46e6d35f42c1c1b2d5de86192812d283d9221e229bf268e8335069062c3b50bbd25aeb621a66934cab4ff970992d4f844ca8ad7ee39979c1d864acc8c7eb9d82fe8f29068e7566935040508b25348385d4cc1fcab726c9fb6096e493ae"], 0x1) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) 01:32:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=@raw, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41f00, 0x1}, 0x48) r3 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendmmsg$alg(r3, &(0x7f0000000200)=[{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000240)='o', 0x1}], 0x1}], 0x1, 0x0) [ 246.810773] IPVS: ftp: loaded support on port[0] = 21 01:32:29 executing program 4: accept$packet(0xffffffffffffff9c, &(0x7f0000000140), &(0x7f0000000180)=0x14) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write(r0, &(0x7f0000000100)="1d1d09d988836c56c4e219496d0f16b8b5f42eed7bfd02a8cb36ca", 0x1b) r1 = socket$inet6(0xa, 0x3, 0x3e) unshare(0x40000000) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") 01:32:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) [ 247.550013] IPVS: ftp: loaded support on port[0] = 21 01:32:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8, 0xd, 0xf0ffff}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 01:32:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) poll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x8}, {r0, 0x5022}], 0x2, 0xff) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/20, 0x14}, 0x0) 01:32:30 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200), 0x8) 01:32:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 01:32:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x8) 01:32:30 executing program 4: accept$packet(0xffffffffffffff9c, &(0x7f0000000140), &(0x7f0000000180)=0x14) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write(r0, &(0x7f0000000100)="1d1d09d988836c56c4e219496d0f16b8b5f42eed7bfd02a8cb36ca", 0x1b) r1 = socket$inet6(0xa, 0x3, 0x3e) unshare(0x40000000) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") [ 248.938356] gretap0: refused to change device tx_queue_len [ 248.953576] IPVS: ftp: loaded support on port[0] = 21 [ 248.954691] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 01:32:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getgroups(0x2, &(0x7f0000000340)=[0xffffffffffffffff, 0xee01]) fchown(0xffffffffffffffff, r1, r2) unshare(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)=ANY=[], 0x0) r3 = socket$inet(0x10, 0x4000000003, 0x0) sendmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000220007031dff39d5fd760500000000000000fd21fe1c4095421ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) [ 248.998394] audit: type=1326 audit(1539739950.801:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7372 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 01:32:30 executing program 2: getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080), 0x10) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000380)=ANY=[]) eventfd2(0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x40086602, &(0x7f0000000100)={0x3400c, 0x0}) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) mkdirat(r0, &(0x7f0000000400)='./file0\x00', 0x0) 01:32:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={"6c6f001151160961000000001d00", 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_newaddr={0x2c, 0x14, 0x101, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_ADDRESS={0x14, 0x1, @loopback}]}, 0x2c}}, 0x0) 01:32:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x20, 0x2e, 0x119, 0x0, 0x0, {0x2}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @binary="04"}]}]}, 0x20}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.current\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000400), 0x8) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') [ 249.205002] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 249.258166] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') write$P9_RSTATFS(r0, &(0x7f0000000040)={0x43}, 0x43) 01:32:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5405, 0x0) [ 249.332919] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000000)=@delqdisc={0x24}, 0x24}}, 0x0) 01:32:31 executing program 2: mmap(&(0x7f0000227000/0x1000)=nil, 0x1000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 01:32:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) [ 249.750061] audit: type=1326 audit(1539739951.551:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7372 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 01:32:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f00000000c0), 0x4) 01:32:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000140)=0x4, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)="775d81fbfb3001ac96fb07e76895ac84", 0x10) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) close(r0) 01:32:31 executing program 3: r0 = socket(0x1000004000000010, 0x80802, 0x0) write(r0, &(0x7f0000000480)="2400000058001f02ff07f4f9002304000a04f51108000100020100020800028001000000", 0x24) connect(0xffffffffffffffff, &(0x7f0000000000)=@rc, 0xfffffffffffffde7) 01:32:31 executing program 2: r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000080)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) [ 249.856305] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:31 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) 01:32:31 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd60910ae000103c00000000000000000000001fa6c955ff5f2586c200000000000000000000000000014e20000004019078007740b9001cc102"], &(0x7f0000000100)={0x1}) 01:32:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x61, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f00000000c0)="c4c379146600006543a02d0000000000000064670f01cab8010000000f01d946d8f1e1b066ba400066edb9f60800000f32f2400f0964460f35", 0x39}], 0x0, 0x0, &(0x7f0000000000), 0x17a) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) sysfs$3(0x3) r3 = accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @dev}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000140)={0x0, 0x5, 0x0, 0x80, 0x1ff, 0x9, 0x3, 0x80, 0x0, 0x2, 0x13}, 0xb) 01:32:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x800000000000a) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x0, 0xc0, [0x20000580, 0x0, 0x0, 0x200005b0, 0x200005e0], 0x0, &(0x7f00000007c0), &(0x7f0000000580)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x138) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 01:32:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000000), 0x4) [ 250.073113] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 250.077842] IPVS: ftp: loaded support on port[0] = 21 01:32:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=@ethtool_sset_info={0x37, 0x0, 0x80}}) [ 250.182829] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x12cf) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000070c0), 0x365) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) lstat(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000500)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x4, 0x0, 0x0, 0x5, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 01:32:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) [ 250.406349] IPVS: ftp: loaded support on port[0] = 21 [ 250.490369] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) 01:32:32 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009c3000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000300)={'mangle\x00'}, &(0x7f0000000380)=0xfffffffffffffcca) 01:32:32 executing program 4: creat(&(0x7f0000000340)='./bus\x00', 0x0) statfs(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)=""/25) 01:32:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = accept(r0, &(0x7f0000000080)=@hci, &(0x7f0000000000)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14, 0x80000) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000180)={@mcast2, r2}, 0x14) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000001200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)='veth0_to_team\x00'}) 01:32:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:32 executing program 4: [ 250.868457] IPVS: ftp: loaded support on port[0] = 21 01:32:32 executing program 3: 01:32:32 executing program 5: mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:32 executing program 0: 01:32:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={&(0x7f0000000000), 0xc, &(0x7f0000000400)={&(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000000140012000c00010069706970000000000000020008002000210b0000"], 0x1}}, 0x0) 01:32:33 executing program 1: 01:32:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) r2 = request_key(&(0x7f0000000440)='syzkaller\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f0000000500)='user\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='}vboxnet1\x00', r2) listen(r1, 0x0) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) 01:32:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 251.514418] IPVS: ftp: loaded support on port[0] = 21 01:32:33 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009c3000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000300)={'mangle\x00'}, &(0x7f0000000380)=0xfffffffffffffcca) 01:32:33 executing program 4: 01:32:33 executing program 3: 01:32:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:33 executing program 0: 01:32:33 executing program 1: 01:32:33 executing program 3: 01:32:33 executing program 0: 01:32:33 executing program 1: 01:32:33 executing program 4: 01:32:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:33 executing program 3: [ 252.008162] IPVS: ftp: loaded support on port[0] = 21 01:32:34 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009c3000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000300)={'mangle\x00'}, &(0x7f0000000380)=0xfffffffffffffcca) 01:32:34 executing program 0: 01:32:34 executing program 4: 01:32:34 executing program 1: 01:32:34 executing program 3: 01:32:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:34 executing program 3: 01:32:34 executing program 4: 01:32:34 executing program 0: 01:32:34 executing program 1: [ 252.564534] IPVS: ftp: loaded support on port[0] = 21 01:32:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x0, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:34 executing program 3: 01:32:34 executing program 2: 01:32:34 executing program 4: 01:32:34 executing program 1: 01:32:34 executing program 0: 01:32:34 executing program 3: 01:32:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)) 01:32:34 executing program 4: 01:32:35 executing program 0: 01:32:35 executing program 3: 01:32:35 executing program 2: [ 253.222948] EXT4-fs (sda1): re-mounted. Opts: 01:32:35 executing program 1: 01:32:35 executing program 4: 01:32:35 executing program 2: 01:32:35 executing program 3: 01:32:35 executing program 0: 01:32:35 executing program 1: 01:32:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)) 01:32:35 executing program 4: 01:32:35 executing program 2: 01:32:35 executing program 3: 01:32:35 executing program 0: 01:32:35 executing program 1: [ 253.532495] EXT4-fs (sda1): re-mounted. Opts: 01:32:35 executing program 2: 01:32:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)) 01:32:35 executing program 3: 01:32:35 executing program 4: 01:32:35 executing program 1: 01:32:35 executing program 0: 01:32:35 executing program 2: 01:32:35 executing program 4: [ 253.789869] EXT4-fs (sda1): re-mounted. Opts: 01:32:35 executing program 3: 01:32:35 executing program 1: 01:32:35 executing program 0: 01:32:35 executing program 4: 01:32:35 executing program 2: 01:32:35 executing program 3: 01:32:35 executing program 0: 01:32:35 executing program 4: 01:32:35 executing program 5: 01:32:35 executing program 1: 01:32:35 executing program 2: 01:32:35 executing program 3: 01:32:35 executing program 0: 01:32:36 executing program 4: 01:32:36 executing program 5: 01:32:36 executing program 3: 01:32:36 executing program 2: 01:32:36 executing program 1: 01:32:36 executing program 0: 01:32:36 executing program 1: 01:32:36 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX]) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 01:32:36 executing program 3: 01:32:36 executing program 5: 01:32:36 executing program 0: 01:32:36 executing program 1: 01:32:36 executing program 2: [ 254.482605] overlayfs: unrecognized mount option "0xffffffffffffffff" or missing value 01:32:36 executing program 4: 01:32:36 executing program 5: 01:32:36 executing program 3: 01:32:36 executing program 1: 01:32:36 executing program 2: 01:32:36 executing program 0: 01:32:36 executing program 4: 01:32:36 executing program 5: 01:32:36 executing program 3: 01:32:36 executing program 2: 01:32:36 executing program 0: 01:32:36 executing program 4: 01:32:36 executing program 1: 01:32:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x803, 0x7) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") sendmsg$nl_netfilter(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYRESHEX], 0xfe53}}, 0x0) 01:32:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) 01:32:36 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x0, &(0x7f0000000040)='+'}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000400)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x14, 0x0, &(0x7f0000000680)=[@acquire_done], 0x0, 0x0, &(0x7f00000007c0)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0), 0x48, 0x0, &(0x7f0000000540)="f587fe19062113e2a33c67032824d4662974e970062eb693d5d4a58f17e2429d3980a167f8ffbaf81b0479dd36e0e56efe00025db03b4fbb05766ab159ad12d8edbde8015cccbcd9"}) 01:32:36 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x5) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2, 0x1b}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x5, @loopback}}}, 0x88) 01:32:36 executing program 3 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:36 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xfffffffffffffffd, 0x401, 0xc145, 0x8, 0x6, 0x0, 0x7, 0x9, 0x300000000, 0x11b}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x0, @multicast2}}) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$inet6(0xa, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$tun(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="a86daf4397b09f410000df"], 0x1) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0x1) close(r5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000200)=0xc) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x0) r6 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x10000000) syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x7fff, 0x200000) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) dup3(r0, r6, 0x80000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000400)={0x0, 0x0, 0x40}, &(0x7f0000000440)=0x14) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000280)={'team0\x00', @dev={[], 0x19}}) [ 255.071742] FAULT_INJECTION: forcing a failure. [ 255.071742] name failslab, interval 1, probability 0, space 0, times 1 [ 255.093582] CPU: 1 PID: 7752 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 255.102068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.111443] Call Trace: [ 255.114151] dump_stack+0x244/0x39d [ 255.117824] ? dump_stack_print_info.cold.1+0x20/0x20 [ 255.123083] ? lock_downgrade+0x900/0x900 [ 255.127327] should_fail.cold.4+0xa/0x17 [ 255.131422] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 255.136576] ? lock_downgrade+0x900/0x900 [ 255.140831] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 255.146415] ? proc_fail_nth_write+0x9e/0x210 [ 255.150935] ? proc_cwd_link+0x1d0/0x1d0 [ 255.154176] binder: 7753:7762 BC_ACQUIRE_DONE u0000000000000000 no match [ 255.155027] ? find_held_lock+0x36/0x1c0 [ 255.155106] ? perf_trace_sched_process_exec+0x860/0x860 [ 255.171433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.177049] __should_failslab+0x124/0x180 [ 255.181366] should_failslab+0x9/0x14 [ 255.185218] __kmalloc+0x2e0/0x760 [ 255.188934] ? strncpy_from_user+0x5a0/0x5a0 [ 255.193557] ? fput+0x130/0x1a0 [ 255.196932] ? do_syscall_64+0x9a/0x820 [ 255.200930] ? __x64_sys_memfd_create+0x142/0x4f0 [ 255.205799] ? do_syscall_64+0x9a/0x820 [ 255.209806] __x64_sys_memfd_create+0x142/0x4f0 [ 255.214499] ? memfd_fcntl+0x1910/0x1910 [ 255.218601] do_syscall_64+0x1b9/0x820 [ 255.222575] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 255.227970] ? syscall_return_slowpath+0x5e0/0x5e0 [ 255.232922] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 255.237812] ? trace_hardirqs_on_caller+0x310/0x310 [ 255.242852] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 255.247891] ? prepare_exit_to_usermode+0x291/0x3b0 [ 255.252934] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 255.257810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.263018] RIP: 0033:0x457569 [ 255.266246] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 255.285189] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 255.292918] RAX: ffffffffffffffda RBX: 0000000020001840 RCX: 0000000000457569 [ 255.300203] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 255.307492] RBP: 000000000072bf00 R08: 0000000000000020 R09: 00000000fbad8001 [ 255.314846] R10: 0000000020001840 R11: 0000000000000246 R12: 00007f1f259756d4 01:32:37 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = accept(r0, &(0x7f0000000180)=@pptp={0x18, 0x2, {0x0, @loopback}}, &(0x7f0000000040)=0x80) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)="00015a0baaa76c657300") getdents64(r2, &(0x7f0000000440)=""/163, 0xa3) getdents(r2, &(0x7f0000000ea9)=""/407, 0x197) r3 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0x100}, 0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000340)={0x0, 0x2faef05f, 0xe195, 0xb177}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000480)={r4, 0x3}, 0x8) sendto$llc(r3, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) ioctl$void(r1, 0x5451) r5 = accept(r3, &(0x7f0000000280)=@nfc_llcp, &(0x7f0000000300)=0x80) bind$nfc_llcp(r5, &(0x7f0000000600)={0x27, 0x1, 0x0, 0x7, 0x2, 0x7fff, "a21f505b2df622ea87ecca33983db2bb6a1694b682ccccedc5b6a82cf836a2df3ae19cce0597b11d3d13d3c4b7069c0deed47ca5602a61b845d805dd24e65b", 0x14}, 0x60) setsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f0000002dc0)={0x0, 0x2710}, 0x10) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x9, 0x4) getsockopt$packet_buf(r5, 0x107, 0xf, &(0x7f0000000500)=""/167, &(0x7f00000005c0)=0xa7) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000038c0)={0x0, @local, @multicast1}, &(0x7f0000003900)=0xc) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000004c0)='veth1_to_bridge\x00', 0x10) recvmmsg(r3, &(0x7f0000003180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f0000002900)=""/221, 0xdd}, {&(0x7f00000000c0)=""/110, 0x6e}, {&(0x7f0000000200)=""/70, 0x46}, {&(0x7f0000002a00)=""/194, 0xc2}, {&(0x7f0000000380)=""/132, 0x81}], 0x5, &(0x7f0000000140)=""/15, 0xf, 0x7}, 0xfffffffffffffffd}, {{&(0x7f0000002f40)=@llc, 0x80, &(0x7f0000002b00), 0x27d, &(0x7f0000001600)=""/4096, 0x1000}, 0xbe}, {{0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x7ffffffe}, 0x4}], 0x3, 0x142, 0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000680)={0x100000000, 0x7fffffff, 0x8, 0x9, 0x5387780e, 0x4, 0x7fffffff, 0x100000000, 0x0, 0x8}) 01:32:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x9, 0x77, 0x0, 0x1, 0x81}, 0x2c) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x400, 0x0) connect$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x1, 0x0, 0x7, 0x7, 0x10000, "2da62068191d227f68cf1d13105ca13cb1d067b7692b6e4f7573bd8d00d4c091ce1935d5c6a7e60380a7eeac0ae76960393efa6f723f7646cb40506fc59ba9", 0x14}, 0x60) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1a00003ddd41a1115d95165542f4eafd0000000000000000000000000061186c0000000000000000a7a97558fca8f31038789d1f55c8d93d5b520e2a9f4b3f2a01"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) r2 = getpid() syz_open_procfs$namespace(r2, &(0x7f0000000080)='ns/net\x00') ioctl(r1, 0x94, &(0x7f0000000040)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x80, 0x0) [ 255.322133] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 255.329848] binder: 7753:7761 transaction failed 29189/-22, size 24-8 line 2834 01:32:37 executing program 3 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:37 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB="04000000000000007b000000000000000900000000000000", @ANYRES32=r0, @ANYBLOB="00000000ffffffff0000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00j\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="00000000ff0700000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="00000000ca01000000eef40cfe02d71d97886c2d1200000000000000", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="0000000086bb00000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="000000007f0000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000097c27c660000000000000000000000000000000000000000"]) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000001600), 0x800, &(0x7f0000000000)={[{@dir_umask={'dir_umask', 0x3d, 0x2}}, {@codepage={'codepage', 0x3d, 'macgaelic'}}]}) 01:32:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) 01:32:37 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) write$P9_RLERROR(r1, &(0x7f00000000c0)={0x7e, 0x7, 0x2, {0x75, "c9f3a2277ecc582c3a85fc8889d50fd13f00b07bc4497a7566088cb0a5de69a97808eb8126c1d3d66e2e7f3cce36c85297d31b94af728a7161fdea36c04965d48536c084c134a06220ea5301c7a3861ed7e1a920251c7aa06223b1fb2c8ce2c3be15b85e4e3bd69eec45b3ce2b97cc8d7e888113c6"}}, 0x7e) write$FUSE_STATFS(r1, &(0x7f0000000040)={0x60, 0xfffffffffffffff5, 0x4, {{0x7, 0x7, 0x5, 0x1, 0x6, 0x200, 0x0, 0x1c000000}}}, 0x60) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6f) [ 255.530870] FAULT_INJECTION: forcing a failure. [ 255.530870] name failslab, interval 1, probability 0, space 0, times 0 [ 255.606709] hfs: can't find a HFS filesystem on dev loop1 [ 255.651260] CPU: 0 PID: 7785 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 255.659726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.669102] Call Trace: [ 255.671726] dump_stack+0x244/0x39d [ 255.675547] ? dump_stack_print_info.cold.1+0x20/0x20 [ 255.680794] should_fail.cold.4+0xa/0x17 [ 255.684894] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 255.690036] ? zap_class+0x640/0x640 [ 255.693780] ? __lock_acquire+0x62f/0x4c20 [ 255.698041] ? lock_downgrade+0x900/0x900 [ 255.702282] ? check_preemption_disabled+0x48/0x280 [ 255.707332] ? find_held_lock+0x36/0x1c0 [ 255.711493] ? expand_files.part.8+0x571/0x9a0 [ 255.716102] ? perf_trace_sched_process_exec+0x860/0x860 [ 255.721580] ? find_held_lock+0x36/0x1c0 [ 255.725694] __should_failslab+0x124/0x180 [ 255.729961] should_failslab+0x9/0x14 [ 255.733884] kmem_cache_alloc+0x2be/0x730 [ 255.738124] ? shmem_destroy_callback+0xc0/0xc0 [ 255.742825] shmem_alloc_inode+0x1b/0x40 [ 255.746907] alloc_inode+0x63/0x190 [ 255.750554] new_inode_pseudo+0x71/0x1a0 [ 255.754639] ? prune_icache_sb+0x1c0/0x1c0 [ 255.758950] ? _raw_spin_unlock+0x2c/0x50 [ 255.763126] new_inode+0x1c/0x40 [ 255.766518] shmem_get_inode+0xf1/0x920 [ 255.770524] ? shmem_encode_fh+0x340/0x340 [ 255.774798] ? lock_downgrade+0x900/0x900 [ 255.778977] ? lock_release+0xa10/0xa10 [ 255.782979] ? perf_trace_sched_process_exec+0x860/0x860 [ 255.788459] ? usercopy_warn+0x110/0x110 [ 255.792554] __shmem_file_setup.part.50+0x83/0x2a0 [ 255.792577] shmem_file_setup+0x65/0x90 [ 255.792594] __x64_sys_memfd_create+0x2af/0x4f0 [ 255.792610] ? memfd_fcntl+0x1910/0x1910 [ 255.792635] do_syscall_64+0x1b9/0x820 [ 255.792674] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 255.792690] ? syscall_return_slowpath+0x5e0/0x5e0 [ 255.792702] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 255.792717] ? trace_hardirqs_on_caller+0x310/0x310 [ 255.792730] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 255.792744] ? prepare_exit_to_usermode+0x291/0x3b0 [ 255.792773] ? trace_hardirqs_off_thunk+0x1a/0x1c 01:32:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) [ 255.849587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.854804] RIP: 0033:0x457569 [ 255.858025] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 255.876958] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 255.884707] RAX: ffffffffffffffda RBX: 0000000020001840 RCX: 0000000000457569 [ 255.891997] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 255.899287] RBP: 000000000072bf00 R08: 0000000000000020 R09: 00000000fbad8001 [ 255.906576] R10: 0000000020001840 R11: 0000000000000246 R12: 00007f1f259756d4 [ 255.913935] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 255.923241] binder: 7753:7762 transaction failed 29189/-22, size 24-8 line 2834 [ 255.934947] binder: 7753:7801 BC_ACQUIRE_DONE u0000000000000000 no match 01:32:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000100), 0x8) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000000)=""/19) close(r2) close(r1) 01:32:37 executing program 0: socketpair$unix(0x1, 0x40000000000003, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_tables_targets\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3ff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) r2 = syz_open_pts(r1, 0x0) read(r2, &(0x7f0000000080)=""/1, 0x229) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)) ioctl$PIO_FONTX(r1, 0x540e, &(0x7f0000000400)="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") r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 01:32:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) 01:32:37 executing program 3 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) [ 256.148199] FAULT_INJECTION: forcing a failure. [ 256.148199] name failslab, interval 1, probability 0, space 0, times 0 [ 256.190056] CPU: 1 PID: 7819 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 256.198527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.207898] Call Trace: [ 256.210559] dump_stack+0x244/0x39d [ 256.214221] ? dump_stack_print_info.cold.1+0x20/0x20 [ 256.219511] should_fail.cold.4+0xa/0x17 [ 256.223608] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 256.229192] ? lock_downgrade+0x900/0x900 [ 256.233361] ? check_preemption_disabled+0x48/0x280 [ 256.238490] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 256.243445] ? kasan_check_read+0x11/0x20 [ 256.247614] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 256.252940] ? zap_class+0x640/0x640 [ 256.256691] ? rcu_softirq_qs+0x20/0x20 [ 256.260723] ? find_held_lock+0x36/0x1c0 [ 256.264876] ? rcu_read_unlock+0x16/0x60 [ 256.268967] ? lock_downgrade+0x900/0x900 [ 256.273133] ? check_preemption_disabled+0x48/0x280 [ 256.278180] __should_failslab+0x124/0x180 [ 256.282441] should_failslab+0x9/0x14 [ 256.286267] kmem_cache_alloc_trace+0x4b/0x750 [ 256.290885] memcg_kmem_get_cache+0x3c7/0x910 [ 256.295408] ? mem_cgroup_handle_over_high+0x150/0x150 [ 256.300719] ? expand_files.part.8+0x571/0x9a0 [ 256.305326] ? perf_trace_sched_process_exec+0x860/0x860 [ 256.310874] ? find_held_lock+0x36/0x1c0 [ 256.314969] kmem_cache_alloc+0x193/0x730 [ 256.319147] ? shmem_destroy_callback+0xc0/0xc0 [ 256.323841] shmem_alloc_inode+0x1b/0x40 [ 256.327932] alloc_inode+0x63/0x190 [ 256.331580] new_inode_pseudo+0x71/0x1a0 [ 256.335685] ? prune_icache_sb+0x1c0/0x1c0 [ 256.339951] ? _raw_spin_unlock+0x2c/0x50 [ 256.344130] new_inode+0x1c/0x40 [ 256.347517] shmem_get_inode+0xf1/0x920 [ 256.351515] ? shmem_encode_fh+0x340/0x340 [ 256.355771] ? lock_downgrade+0x900/0x900 [ 256.359946] ? lock_release+0xa10/0xa10 [ 256.363941] ? perf_trace_sched_process_exec+0x860/0x860 [ 256.369412] ? usercopy_warn+0x110/0x110 [ 256.373505] __shmem_file_setup.part.50+0x83/0x2a0 [ 256.378461] shmem_file_setup+0x65/0x90 [ 256.382458] __x64_sys_memfd_create+0x2af/0x4f0 [ 256.387149] ? memfd_fcntl+0x1910/0x1910 [ 256.391247] do_syscall_64+0x1b9/0x820 [ 256.395161] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 256.400552] ? syscall_return_slowpath+0x5e0/0x5e0 [ 256.405502] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 256.410368] ? trace_hardirqs_on_caller+0x310/0x310 [ 256.415406] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 256.420446] ? prepare_exit_to_usermode+0x291/0x3b0 [ 256.425496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 256.430373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.435586] RIP: 0033:0x457569 [ 256.438801] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 256.457972] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 256.465726] RAX: ffffffffffffffda RBX: 0000000020001840 RCX: 0000000000457569 [ 256.473011] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 256.480294] RBP: 000000000072bf00 R08: 0000000000000020 R09: 00000000fbad8001 [ 256.487583] R10: 0000000020001840 R11: 0000000000000246 R12: 00007f1f259756d4 [ 256.494936] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 256.521575] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000440)=""/90) 01:32:38 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000000c0)={0x3, 0x2, 'client1\x00', 0x3, "206b4f224fdde168", "9240729919b37a2be069cae1aeb07da677eec2edada3dbbce1070c142f287421", 0x5, 0xfffffffffffff800}) socket(0x10, 0x3, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0x8) 01:32:38 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x444, @mcast2, 0xffffffff80000001}}, [0x3, 0x1, 0x1587, 0x76, 0x23, 0x7, 0x4, 0x4, 0x5, 0x8, 0x7fffffff, 0x7fff, 0x3, 0x1000, 0x800]}, &(0x7f00000000c0)=0x100) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0xc0305710, &(0x7f0000000300)={0x0, 0xe4, 0xc1e7, 0x3b45}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000100)={r3, 0x7, 0x3, [0xe0000000000000, 0x3, 0x10001]}, &(0x7f0000000280)=0xe) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="f8d4"]) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f0000000340)=[{}, {}, {}, {}], 0x0, [{}, {}, {}]}, 0xa8) 01:32:38 executing program 3 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:38 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0xfffffffffffffffd, 0x401, 0xc145, 0x8, 0x6, 0x0, 0x7, 0x9, 0x300000000, 0x11b}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x0, @multicast2}}) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$inet6(0xa, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$tun(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="a86daf4397b09f410000df"], 0x1) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0x1) close(r5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000200)=0xc) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x0) r6 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x10000000) syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x7fff, 0x200000) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) dup3(r0, r6, 0x80000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000400)={0x0, 0x0, 0x40}, &(0x7f0000000440)=0x14) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000280)={'team0\x00', @dev={[], 0x19}}) [ 256.733030] FAULT_INJECTION: forcing a failure. [ 256.733030] name failslab, interval 1, probability 0, space 0, times 0 [ 256.769287] CPU: 0 PID: 7836 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 256.777761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.787128] Call Trace: [ 256.789744] dump_stack+0x244/0x39d [ 256.793404] ? dump_stack_print_info.cold.1+0x20/0x20 [ 256.798628] should_fail.cold.4+0xa/0x17 [ 256.802734] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 256.807943] ? __kernel_text_address+0xd/0x40 [ 256.812491] ? unwind_get_return_address+0x61/0xa0 [ 256.817464] ? find_held_lock+0x36/0x1c0 [ 256.821565] ? perf_trace_sched_process_exec+0x860/0x860 [ 256.827046] __should_failslab+0x124/0x180 [ 256.831304] should_failslab+0x9/0x14 [ 256.835123] kmem_cache_alloc+0x2be/0x730 [ 256.839288] ? mpol_shared_policy_init+0x235/0x650 [ 256.844235] ? current_time+0x72/0x1b0 [ 256.848193] __d_alloc+0xc8/0xb90 [ 256.851691] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 256.856728] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 256.861832] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 256.867045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.872601] ? timespec64_trunc+0xea/0x180 [ 256.876853] ? inode_init_owner+0x340/0x340 [ 256.881198] ? _raw_spin_unlock+0x2c/0x50 [ 256.885365] ? current_time+0x10b/0x1b0 [ 256.889356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.894913] ? __lockdep_init_map+0x105/0x590 [ 256.899430] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 256.904984] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 256.910543] d_alloc_pseudo+0x1d/0x30 [ 256.914368] alloc_file_pseudo+0x158/0x3f0 [ 256.918627] ? alloc_file+0x4d0/0x4d0 [ 256.922467] ? usercopy_warn+0x110/0x110 [ 256.926560] __shmem_file_setup.part.50+0x110/0x2a0 [ 256.931600] shmem_file_setup+0x65/0x90 [ 256.935590] __x64_sys_memfd_create+0x2af/0x4f0 [ 256.940276] ? memfd_fcntl+0x1910/0x1910 [ 256.944367] do_syscall_64+0x1b9/0x820 [ 256.948270] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 256.953673] ? syscall_return_slowpath+0x5e0/0x5e0 [ 256.958623] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 256.963670] ? trace_hardirqs_on_caller+0x310/0x310 [ 256.968712] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 256.973753] ? prepare_exit_to_usermode+0x291/0x3b0 [ 256.978791] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 256.983680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.988885] RIP: 0033:0x457569 [ 256.992101] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 257.011026] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 257.018763] RAX: ffffffffffffffda RBX: 0000000020001840 RCX: 0000000000457569 [ 257.026048] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a 01:32:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000440)=""/90) [ 257.033329] RBP: 000000000072bf00 R08: 0000000000000020 R09: 00000000fbad8001 [ 257.040612] R10: 0000000020001840 R11: 0000000000000246 R12: 00007f1f259756d4 [ 257.047915] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 01:32:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept(r0, 0x0, &(0x7f0000000040)=0xffffffffffffff22) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0xb00, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140083365200000000000000000000001c000000"], 0x14}}, 0x0) 01:32:38 executing program 0: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) unshare(0x600) clock_gettime(0x2000000007, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x8, 0x0, 0x0, 0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={r0, r1+10000000}, &(0x7f0000000080)={&(0x7f0000000380), 0x8}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x80, 0x0) ioctl$NBD_SET_SIZE(r2, 0xab02, 0x1) 01:32:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000440)=""/90) 01:32:39 executing program 3 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:39 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x2000, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000440)=ANY=[@ANYBLOB="04000000000000bf00000000feffffffffffffff0600000000000000010000000000000000000000010000000000000000000000000a50d84d9418b9c85267107357795507735ece9d00bc75ecd7103ca1ec33e2ff9d5643713bedefca432f184299fc71b6644c30e1513c4a64e1c1c76f7c262987c7c3f9e94928a764418c4499084e26962f727cd309d152340ed8e462173210f61efa501283d6564d078722f534fc43194d99c9"]) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000400)=0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000340)=r1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000300)={0x0, @multicast2, 0x4e23, 0x1, 'sh\x00', 0x10, 0x5, 0x6d}, 0x2c) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], 0x2d4) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000280)={0x0, 0x8, 0x8, &(0x7f0000000200)=0x9c9}) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000240)=@md5={0x1, "abcda708b18569ea41d2b090c90de0bc"}, 0x11, 0xfffffffffffffffc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x83de4571dd3037f2, 0x1) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f0000000140)=0x208) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000180)={0x2, 0x1f, 0x20}) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000380)={0x18, 0x0, {0x0, @link_local, "626e6e6c30008000000061a6d900"}}) syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x80) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000002c0)={0x200, 0x2, 0x9}) 01:32:39 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x180, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x5000002102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000800), 0xffffffffffffffff) lremovexattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@random={'security.', "520972697374e363757367725669643a4465"}) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00t\x00', 0xffffffffffffffff, 0x700}, &(0x7f0000001fee)="520972697374e363757367725669643a4465", 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x10000) preadv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f0000000840)=""/233, 0xe9}, {&(0x7f0000000780)=""/2, 0x2}], 0x2, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={r1, 0x0, 0x7fff, 0x0, 0x5}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x55, "36e1e87da24833088306c92b2037c630f4b7d24ccb5f77d6b18d51ada1e34b27c5db5e53513d719d93dbe339129e678d34bdab70f0963c456c3f53e661bcf48c632bb1cc647350c7a8755470174d28e9387f02004e"}, &(0x7f0000000400)=0x5d) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000300)={r3, 0x75, "02d8f5323db88666142b6074e2db30f4b9d66bb8c5707706df9a5d9757c4cb028360ccd87ded9bd3e8f621e8cc2a5811afbcc964841d1a1b451d261b1f217adb02b9e57c186a18034357e00892635822c9e3b46e65ad840ed82f54a85382ee7b752e9f97de26f04b0064bd3a5124bd9e3ca967c0f4"}, &(0x7f00000006c0)=0x7d) recvmsg$kcm(r0, &(0x7f0000001800)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000001700)=[{&(0x7f00000004c0)=""/132, 0x84}, {&(0x7f0000000580)=""/150, 0x96}, {&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000001640)=""/169, 0xa9}], 0x4, &(0x7f0000001740)=""/177, 0xb1, 0x3}, 0x40) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080), &(0x7f0000000100)=0x2) write$FUSE_GETXATTR(r2, &(0x7f0000000180)={0x18, 0x0, 0x6, {0x3c45}}, 0x18) read$FUSE(r0, &(0x7f0000002000), 0x1000) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000200)=[{0x1, 0x5, 0xffffffffffffffff, 0x1}, {0xfffffffffffffffa, 0xffffffffffff8551, 0x7}, {0x5, 0x0, 0x1, 0xfff}, {0x3ff, 0xfffffffffffffff7, 0x3, 0x9}]}) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000940)=""/150) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000740)={&(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000140)) 01:32:39 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$P9_RCLUNK(r0, &(0x7f00000000c0)={0x7, 0x79, 0x2}, 0x7) r1 = getgid() getgroups(0x5, &(0x7f0000000140)=[0x0, 0xee00, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) alarm(0x6) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000300)=[r1, r3, 0x0]) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000002c0)={r0}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setresuid(r2, r2, r2) fallocate(r0, 0x10, 0x0, 0x1000f2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x28, &(0x7f0000000280)}, 0x10) r5 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) ioctl$VT_ACTIVATE(r4, 0x5606, 0x0) sendfile(r5, r5, &(0x7f0000d83ff8)=0x2a00, 0x8000fffffffe) 01:32:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000020c0), 0x1000) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000340)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) tkill(r2, 0x15) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000340)={0x50, 0x0, 0x2}, 0x50) io_setup(0x8, &(0x7f0000000140)=0x0) io_submit(r4, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140)}]) [ 258.469070] FAULT_INJECTION: forcing a failure. [ 258.469070] name failslab, interval 1, probability 0, space 0, times 0 01:32:40 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000440)=""/90) [ 258.533835] audit: type=1800 audit(1539739960.341:33): pid=7886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="bus" dev="sda1" ino=16630 res=0 [ 258.541917] CPU: 0 PID: 7881 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 258.561597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.570974] Call Trace: [ 258.573592] dump_stack+0x244/0x39d [ 258.577295] ? dump_stack_print_info.cold.1+0x20/0x20 [ 258.577353] ? __save_stack_trace+0x8d/0xf0 [ 258.577382] should_fail.cold.4+0xa/0x17 [ 258.586917] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 258.586937] ? save_stack+0x43/0xd0 [ 258.586957] ? kasan_kmalloc+0xc7/0xe0 [ 258.603706] ? percpu_ref_put_many+0x11c/0x260 [ 258.608323] ? zap_class+0x640/0x640 [ 258.612065] ? find_held_lock+0x36/0x1c0 [ 258.616172] ? perf_trace_sched_process_exec+0x860/0x860 [ 258.621677] ? lock_downgrade+0x900/0x900 [ 258.625864] __should_failslab+0x124/0x180 [ 258.630129] should_failslab+0x9/0x14 [ 258.633960] kmem_cache_alloc+0x2be/0x730 [ 258.638134] ? d_set_d_op+0x31d/0x410 [ 258.641984] __alloc_file+0xa8/0x470 [ 258.645727] ? file_free_rcu+0xd0/0xd0 [ 258.649668] ? d_instantiate+0x79/0xa0 [ 258.653585] ? lock_downgrade+0x900/0x900 [ 258.657772] ? kasan_check_read+0x11/0x20 [ 258.657856] ? do_raw_spin_unlock+0xa7/0x330 [ 258.657876] ? do_raw_spin_trylock+0x270/0x270 [ 258.657896] alloc_empty_file+0x72/0x170 [ 258.675246] alloc_file+0x5e/0x4d0 [ 258.678814] ? _raw_spin_unlock+0x2c/0x50 [ 258.682993] alloc_file_pseudo+0x261/0x3f0 [ 258.687254] ? alloc_file+0x4d0/0x4d0 [ 258.687276] ? usercopy_warn+0x110/0x110 [ 258.687306] __shmem_file_setup.part.50+0x110/0x2a0 [ 258.687327] shmem_file_setup+0x65/0x90 [ 258.704222] __x64_sys_memfd_create+0x2af/0x4f0 [ 258.708920] ? memfd_fcntl+0x1910/0x1910 [ 258.708951] do_syscall_64+0x1b9/0x820 [ 258.708967] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 258.708986] ? syscall_return_slowpath+0x5e0/0x5e0 [ 258.709002] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.709021] ? trace_hardirqs_on_caller+0x310/0x310 [ 258.709041] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 258.742200] ? prepare_exit_to_usermode+0x291/0x3b0 [ 258.747250] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.752146] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.757360] RIP: 0033:0x457569 [ 258.760578] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:32:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000004700)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000012000/0x1000)=nil, 0x1000}, 0x1}) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl(r0, 0x8000, &(0x7f0000000100)="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") r3 = dup(r2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000127c0)={'team0\x00'}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af24, &(0x7f00000000c0)) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000000)) close(r1) [ 258.779506] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 258.787240] RAX: ffffffffffffffda RBX: 0000000020001840 RCX: 0000000000457569 [ 258.794533] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 258.801825] RBP: 000000000072bf00 R08: 0000000000000020 R09: 00000000fbad8001 [ 258.809120] R10: 0000000020001840 R11: 0000000000000246 R12: 00007f1f259756d4 [ 258.816406] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 01:32:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) listen(0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$tun(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="e2aeaf81d400508e4ac409f2deef6261bbb4591850b9fcc9c71b8750cf4fcc56a4de461aa75f1170849ea6cb93651dc223874aa59288ebb1be2f93f5e4eec917fe55ea480f5c6ec611a796064731ff8d82e558b4f2f8aa020e878fb591609b2cfa2bad89f762e7841650dd2c63f7bb4b9fbd"], 0x1) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(r2) 01:32:40 executing program 3 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:40 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000440)=""/90) [ 259.124547] FAULT_INJECTION: forcing a failure. [ 259.124547] name failslab, interval 1, probability 0, space 0, times 0 [ 259.164239] CPU: 1 PID: 7909 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 259.172895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.182272] Call Trace: [ 259.184890] dump_stack+0x244/0x39d [ 259.188622] ? dump_stack_print_info.cold.1+0x20/0x20 [ 259.193859] ? debug_smp_processor_id+0x1c/0x20 [ 259.198553] ? perf_trace_lock+0x14d/0x7a0 [ 259.202819] should_fail.cold.4+0xa/0x17 [ 259.206911] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 259.212127] ? is_bpf_text_address+0xd3/0x170 [ 259.216673] ? kernel_text_address+0x79/0xf0 [ 259.221105] ? __kernel_text_address+0xd/0x40 [ 259.225623] ? unwind_get_return_address+0x61/0xa0 [ 259.230592] ? __save_stack_trace+0x8d/0xf0 [ 259.234940] ? find_held_lock+0x36/0x1c0 [ 259.239044] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 259.243906] ? perf_trace_sched_process_exec+0x860/0x860 [ 259.249391] __should_failslab+0x124/0x180 [ 259.253672] should_failslab+0x9/0x14 [ 259.257496] kmem_cache_alloc_trace+0x2d7/0x750 [ 259.262191] ? __might_sleep+0x95/0x190 [ 259.266261] apparmor_file_alloc_security+0x17b/0xac0 [ 259.271479] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 259.277044] ? apparmor_path_rename+0xcd0/0xcd0 [ 259.281741] ? rcu_read_lock_sched_held+0x14f/0x180 [ 259.286780] ? kmem_cache_alloc+0x33a/0x730 [ 259.291118] ? d_set_d_op+0x31d/0x410 [ 259.295034] security_file_alloc+0x4c/0xa0 [ 259.299299] __alloc_file+0x12a/0x470 [ 259.303300] ? file_free_rcu+0xd0/0xd0 [ 259.307209] ? d_instantiate+0x79/0xa0 [ 259.311285] ? lock_downgrade+0x900/0x900 [ 259.315487] ? kasan_check_read+0x11/0x20 [ 259.319674] ? do_raw_spin_unlock+0xa7/0x330 [ 259.324104] ? do_raw_spin_trylock+0x270/0x270 [ 259.328723] alloc_empty_file+0x72/0x170 [ 259.332810] alloc_file+0x5e/0x4d0 [ 259.336371] ? _raw_spin_unlock+0x2c/0x50 [ 259.340545] alloc_file_pseudo+0x261/0x3f0 [ 259.345071] ? alloc_file+0x4d0/0x4d0 [ 259.348894] ? usercopy_warn+0x110/0x110 [ 259.352992] __shmem_file_setup.part.50+0x110/0x2a0 [ 259.358039] shmem_file_setup+0x65/0x90 [ 259.362042] __x64_sys_memfd_create+0x2af/0x4f0 [ 259.366736] ? memfd_fcntl+0x1910/0x1910 [ 259.370839] do_syscall_64+0x1b9/0x820 [ 259.374757] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 259.380359] ? syscall_return_slowpath+0x5e0/0x5e0 [ 259.385313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.390182] ? trace_hardirqs_on_caller+0x310/0x310 [ 259.395225] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 259.400279] ? prepare_exit_to_usermode+0x291/0x3b0 [ 259.405338] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.410286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.415502] RIP: 0033:0x457569 [ 259.418718] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.437668] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 259.445412] RAX: ffffffffffffffda RBX: 0000000020001840 RCX: 0000000000457569 [ 259.452715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 259.460016] RBP: 000000000072bf00 R08: 0000000000000020 R09: 00000000fbad8001 [ 259.467318] R10: 0000000020001840 R11: 0000000000000246 R12: 00007f1f259756d4 01:32:41 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000440)=""/90) 01:32:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000080)="eb280a1a75511eb82753cf3edb473d6a", 0xfffffffffffffe9c) close(r1) [ 259.474608] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 01:32:41 executing program 3 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) [ 259.578315] audit: type=1800 audit(1539739961.381:34): pid=7886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="bus" dev="sda1" ino=16630 res=0 01:32:41 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000008031, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x19) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000040)={0x8000, 0x5}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x0) 01:32:41 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000440)=""/90) 01:32:41 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$P9_RCLUNK(r0, &(0x7f00000000c0)={0x7, 0x79, 0x2}, 0x7) r1 = getgid() getgroups(0x5, &(0x7f0000000140)=[0x0, 0xee00, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) alarm(0x6) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000300)=[r1, r3, 0x0]) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000002c0)={r0}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setresuid(r2, r2, r2) fallocate(r0, 0x10, 0x0, 0x1000f2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x28, &(0x7f0000000280)}, 0x10) r5 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) ioctl$VT_ACTIVATE(r4, 0x5606, 0x0) sendfile(r5, r5, &(0x7f0000d83ff8)=0x2a00, 0x8000fffffffe) [ 259.649579] syz-executor0 (7880) used greatest stack depth: 14536 bytes left [ 259.807062] FAULT_INJECTION: forcing a failure. [ 259.807062] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 259.818956] CPU: 0 PID: 7934 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 259.827445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.836834] Call Trace: [ 259.839459] dump_stack+0x244/0x39d [ 259.842230] audit: type=1800 audit(1539739961.611:35): pid=7929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="bus" dev="sda1" ino=16629 res=0 [ 259.843121] ? dump_stack_print_info.cold.1+0x20/0x20 [ 259.843156] should_fail.cold.4+0xa/0x17 [ 259.871726] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 259.876874] ? print_usage_bug+0xc0/0xc0 [ 259.880977] ? mark_held_locks+0x130/0x130 [ 259.885241] ? zap_class+0x640/0x640 [ 259.888986] ? print_usage_bug+0xc0/0xc0 [ 259.893075] ? zap_class+0x640/0x640 [ 259.896812] ? lock_downgrade+0x900/0x900 [ 259.900986] ? check_preemption_disabled+0x48/0x280 [ 259.906042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.911612] ? should_fail+0x22d/0xd01 [ 259.915550] ? find_held_lock+0x36/0x1c0 [ 259.919672] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 259.924891] __alloc_pages_nodemask+0x34b/0xdd0 [ 259.929588] ? current_time+0x72/0x1b0 [ 259.933509] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 259.938552] ? inode_init_owner+0x340/0x340 [ 259.942906] ? find_held_lock+0x36/0x1c0 [ 259.947020] ? trace_hardirqs_off+0xb8/0x310 [ 259.951465] cache_grow_begin+0xa5/0x8c0 [ 259.955553] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 259.961113] ? check_preemption_disabled+0x48/0x280 [ 259.966165] kmem_cache_alloc+0x66b/0x730 [ 259.970343] ? do_sys_ftruncate+0x428/0x550 [ 259.974720] getname_flags+0xd0/0x590 [ 259.978556] ? __lock_is_held+0xb5/0x140 [ 259.982687] getname+0x19/0x20 [ 259.985915] do_sys_open+0x383/0x700 [ 259.989686] ? filp_open+0x80/0x80 [ 259.993258] ? trace_hardirqs_off_caller+0x300/0x300 [ 259.998391] ? do_sys_ftruncate+0x449/0x550 [ 260.002748] __x64_sys_open+0x7e/0xc0 [ 260.006591] do_syscall_64+0x1b9/0x820 [ 260.010509] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 260.015926] ? syscall_return_slowpath+0x5e0/0x5e0 [ 260.020881] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.025762] ? trace_hardirqs_on_caller+0x310/0x310 [ 260.030813] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 260.035866] ? prepare_exit_to_usermode+0x291/0x3b0 [ 260.040923] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.045810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.051020] RIP: 0033:0x4111a1 [ 260.054237] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 260.073169] RSP: 002b:00007f1f25974a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 260.080910] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004111a1 [ 260.080920] RDX: 00007f1f25974afa RSI: 0000000000000002 RDI: 00007f1f25974af0 [ 260.080928] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 01:32:41 executing program 1: close(0xffffffffffffffff) r0 = socket$kcm(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000002c0)=0x44, 0x4) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000340)="dcb7a57203b1d3e72e3e64e626a37ffbf89539c6f5b71ced5576736b192928a5778bfba0b23a555a03bd98d9950d754cc403c8ebd0526391f19434687086ee8c9d1d2f8206ea046b33d5a7f2b7e55311799f8cac35dd3b9c", 0x58, 0x6}], 0x8, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x7, 0x0) ioctl$VT_ACTIVATE(r3, 0x5606, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)="2f6465762f6e65742f74756eff", 0x241, 0x0) socket$kcm(0x2, 0x40000003, 0x2) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xffffffba) close(r3) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) socket$bt_rfcomm(0x1f, 0x1, 0x3) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x0, 0x70, 0x1000, 0x401, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x5, 0x8, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x3ff, 0xea92, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x4, 0x0, 0x3, 0x0, 0x7}) 01:32:41 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup2(r0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xfffffffffffffffe, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb20, 0x1, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x2}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000000)={0x81, 0x8, 0x10001, 0x0, 0x0}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000180)={r3, 0xd6}, 0x8) [ 260.080937] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 260.080945] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 260.139730] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 260.147919] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:42 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000440)=""/90) 01:32:42 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') ptrace(0x4207, r0) connect$inet6(0xffffffffffffffff, &(0x7f0000000480)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) 01:32:42 executing program 3 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbff, 0x2082}, 0xc) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000000)={&(0x7f0000000280), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="58020000", @ANYRES16=r1, @ANYBLOB="0101000000000000000001000000440001000c00070000000000000000000c0006006c626c637200000008000b006469700008000800000000000800090000000000080001000a0000000800050000000000"], 0x58}}, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040)=0x5, 0x4) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f0000000080)) 01:32:42 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000440)=""/90) 01:32:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000001c0)={0xffff, 0x2, 0x3}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8, 0x0, 0x0, 0x100000000000000}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f0000000440)='./file0\x00', 0xff, 0x2, &(0x7f0000001500)=[{&(0x7f0000000480)="5c5f50c30f31be1d9f6a6f2c7476b6791df5f3191af517fc7367849b5a1ee84f60248831824962b6392580d7c44d7f4efa9aca7b2e7aac8978ae9f30403ee1c130c5941041e55fd23c47a9e723a04b65db0cb93393691d453ed3477bcc3b10f188f7a86c3862", 0x66, 0x7}, {&(0x7f0000000500)="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", 0x1000, 0x3}], 0x1001000, &(0x7f0000001540)=ANY=[@ANYBLOB="6572726f72733d636f6e74696e75652c6e6f71756f744f2c686173683d72352c626c6f4b6b2d616c6c6f6361746f0445ffff6b6673747261ee736d7574653d2f6465762f70746d78002c0000000000000000000000"]) getpeername$inet(r2, &(0x7f00000015c0)={0x2, 0x0, @local}, &(0x7f0000001600)=0x10) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000003c0)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000001640)={0x0, 0x3a8}, &(0x7f0000001680)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000016c0)={0x9, 0x8004, 0x4, 0xffff, r5}, 0x10) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000180)) dup3(r1, r0, 0x0) 01:32:42 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) [ 260.637218] FAULT_INJECTION: forcing a failure. [ 260.637218] name failslab, interval 1, probability 0, space 0, times 0 [ 260.707327] syz-executor0 (7929) used greatest stack depth: 14264 bytes left [ 260.722826] CPU: 1 PID: 7966 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 260.731304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.740702] Call Trace: [ 260.743329] dump_stack+0x244/0x39d [ 260.743363] ? dump_stack_print_info.cold.1+0x20/0x20 [ 260.752207] ? print_usage_bug+0xc0/0xc0 01:32:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x20000000040043, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x3, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vlan0\x00', 0x10) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000080)={'vlan0\x00', 0x1}) ioctl(r1, 0x401, &(0x7f0000000340)="153f6234488dd281766070") r3 = socket(0xa, 0x1, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000500)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000100)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x28, &(0x7f00000001c0)={@multicast1, @local}, 0xc) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000200)={@multicast2}, &(0x7f0000000240)=0xc) [ 260.752235] should_fail.cold.4+0xa/0x17 [ 260.752248] ? find_held_lock+0x36/0x1c0 [ 260.752275] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 260.752296] ? lock_downgrade+0x900/0x900 [ 260.773766] ? check_preemption_disabled+0x48/0x280 [ 260.778822] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 260.783785] ? kasan_check_read+0x11/0x20 [ 260.787967] ? find_held_lock+0x36/0x1c0 [ 260.792079] ? perf_trace_sched_process_exec+0x860/0x860 [ 260.797569] __should_failslab+0x124/0x180 [ 260.801837] should_failslab+0x9/0x14 [ 260.805692] kmem_cache_alloc+0x2be/0x730 [ 260.809867] ? zap_class+0x640/0x640 [ 260.813608] ? print_usage_bug+0xc0/0xc0 [ 260.817727] ? mark_held_locks+0x130/0x130 [ 260.821994] __alloc_file+0xa8/0x470 [ 260.825736] ? file_free_rcu+0xd0/0xd0 [ 260.829679] ? find_held_lock+0x36/0x1c0 [ 260.833780] ? is_bpf_text_address+0xac/0x170 [ 260.838301] ? lock_downgrade+0x900/0x900 [ 260.842678] ? check_preemption_disabled+0x48/0x280 [ 260.847736] alloc_empty_file+0x72/0x170 [ 260.851834] path_openat+0x170/0x5150 [ 260.855692] ? rcu_softirq_qs+0x20/0x20 [ 260.859710] ? unwind_dump+0x190/0x190 [ 260.863639] ? zap_class+0x640/0x640 [ 260.867419] ? path_lookupat.isra.43+0xc00/0xc00 [ 260.872298] ? unwind_get_return_address+0x61/0xa0 [ 260.877268] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 260.882316] ? expand_files.part.8+0x571/0x9a0 [ 260.886935] ? find_held_lock+0x36/0x1c0 [ 260.891031] ? __alloc_fd+0x347/0x6e0 [ 260.894916] ? lock_downgrade+0x900/0x900 [ 260.894930] ? getname+0x19/0x20 [ 260.894955] ? kasan_check_read+0x11/0x20 01:32:42 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000008000)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000008080)={0x4, 0x6, 0x800, 0x8, 0x16, 0xffffffffffffff80}) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000008040)={0x7, 0x0, 0x3f, 0x8, 0x5, 0x2, 0x7, 0x9, 0x3, 0x4, 0x0, 0x4}) getsockopt$bt_BT_VOICE(r0, 0x112, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x2) recvmmsg(r0, &(0x7f0000007dc0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)=""/34, 0x22}, {&(0x7f00000001c0)=""/218, 0xda}, {&(0x7f00000002c0)=""/192, 0xc0}], 0x3, &(0x7f00000003c0)=""/82, 0x52, 0x7fffffff}, 0x8}, {{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000440)=""/27, 0x1b}, {&(0x7f0000000480)=""/247, 0xf7}, {&(0x7f0000000580)=""/102, 0x66}, {&(0x7f0000000600)=""/6, 0x6}, {&(0x7f0000000640)=""/90, 0x5a}, {&(0x7f00000006c0)=""/174, 0xae}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x7, &(0x7f0000001800)=""/242, 0xf2, 0xfff}, 0x401}, {{0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000001900)=""/69, 0x45}, {&(0x7f0000001980)=""/213, 0xd5}, {&(0x7f0000001a80)=""/182, 0xb6}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/236, 0xec}, {&(0x7f0000002c40)=""/52, 0x34}, {&(0x7f0000002c80)=""/73, 0x49}], 0x7, 0x0, 0x0, 0x8c7}, 0x4}, {{&(0x7f0000002d80)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000002f80)=[{&(0x7f0000002e00)=""/84, 0x54}, {&(0x7f0000002e80)=""/183, 0xb7}, {&(0x7f0000002f40)=""/3, 0x3}], 0x3, &(0x7f0000002fc0)=""/4096, 0x1000, 0x2}, 0xff}, {{&(0x7f0000003fc0)=@nfc, 0x80, &(0x7f0000006440)=[{&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/84, 0x54}, {&(0x7f00000050c0)=""/205, 0xcd}, {&(0x7f00000051c0)=""/13, 0xd}, {&(0x7f0000005200)=""/101, 0x65}, {&(0x7f0000005280)=""/216, 0xd8}, {&(0x7f0000005380)=""/4096, 0x1000}, {&(0x7f0000006380)=""/190, 0xbe}], 0x8, &(0x7f00000064c0)=""/40, 0x28, 0x7c}, 0x2}, {{&(0x7f0000006500)=@ipx, 0x80, &(0x7f00000078c0)=[{&(0x7f0000006580)=""/94, 0x5e}, {&(0x7f0000006600)=""/61, 0x3d}, {&(0x7f0000006640)=""/148, 0x94}, {&(0x7f0000006700)=""/73, 0x49}, {&(0x7f0000006780)=""/5, 0x5}, {&(0x7f00000067c0)=""/249, 0xf9}, {&(0x7f00000068c0)=""/4096, 0x1000}], 0x7, &(0x7f0000007940)=""/122, 0x7a, 0x3ffc00000000}, 0x4}, {{&(0x7f00000079c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007b40)=[{&(0x7f0000007a40)=""/239, 0xef}], 0x1, &(0x7f0000007b80)=""/44, 0x2c, 0x7fffffff}, 0x6}, {{&(0x7f0000007bc0)=@generic, 0x80, &(0x7f0000007d80)=[{&(0x7f0000007c40)=""/183, 0xb7}, {&(0x7f0000007d00)=""/81, 0x51}], 0x2, 0x0, 0x0, 0x1}, 0x2}], 0x8, 0x40000000, 0x0) sendto$packet(r0, &(0x7f0000000080)="3416ad6a5f7b58e3a8a019cc537d56278de74b65509066a9dfad3146029fd19d46a1923510cb3e01dc2bf0ce2b96e09fdfc11d0ebd668b2dc690c8d9cceb1e058824d3e8da9aae5d74ab954d2bba9c192a0783eb5d7b05da1d84e1051fa5155ff6dd2ab87bec119dd4899a0ffcbb4aaef17cc0679c950240a4d9e35989b26f0170e207a27dc6b0e3879aa8e25271750469e02c206b6a3cd140de1bd60a00d360d3f2f488d09e9568c57120079da201c7b625c65e9645542a75a57e4cb77003c1b8af19ee4c94932de853f7af92ceda940fbf90dba46a2bf1b2e64c5722710429d7c0ad4ec84132a18ca7", 0xea, 0x4004801, &(0x7f0000007fc0)={0x11, 0x5, r2, 0x1, 0x3f, 0x6, @remote}, 0x14) [ 260.894973] ? do_raw_spin_unlock+0xa7/0x330 [ 260.902516] ? do_raw_spin_trylock+0x270/0x270 [ 260.902533] ? __lock_is_held+0xb5/0x140 [ 260.902547] ? __check_object_size+0xb1/0x782 [ 260.902572] ? _raw_spin_unlock+0x2c/0x50 [ 260.902588] ? __alloc_fd+0x347/0x6e0 [ 260.902614] do_filp_open+0x255/0x380 [ 260.902630] ? may_open_dev+0x100/0x100 [ 260.902682] ? get_unused_fd_flags+0x122/0x1a0 [ 260.944923] ? __alloc_fd+0x6e0/0x6e0 [ 260.948756] ? __lock_is_held+0xb5/0x140 [ 260.952846] do_sys_open+0x568/0x700 [ 260.952867] ? filp_open+0x80/0x80 [ 260.952890] ? trace_hardirqs_off_caller+0x300/0x300 [ 260.960165] ? do_sys_ftruncate+0x449/0x550 [ 260.969603] __x64_sys_open+0x7e/0xc0 [ 260.973432] do_syscall_64+0x1b9/0x820 [ 260.977349] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 260.982740] ? syscall_return_slowpath+0x5e0/0x5e0 [ 260.987715] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.992590] ? trace_hardirqs_on_caller+0x310/0x310 [ 260.997634] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 261.002717] ? prepare_exit_to_usermode+0x291/0x3b0 [ 261.007774] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.012671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.017883] RIP: 0033:0x4111a1 [ 261.021102] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 261.040022] RSP: 002b:00007f1f25974a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 261.047745] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004111a1 [ 261.055023] RDX: 00007f1f25974afa RSI: 0000000000000002 RDI: 00007f1f25974af0 [ 261.062303] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 261.069578] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 261.076854] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 01:32:42 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0xfff, 0x2800) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000280)={'ipvs\x00'}, &(0x7f00000002c0)=0x1e) prlimit64(0x0, 0x0, &(0x7f0000000140)={0x0, 0x100000000}, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000fd7ff0), &(0x7f0000000000), 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x10000, 0x0) connect$netlink(r2, &(0x7f0000000180)=@kern={0x10, 0x0, 0x0, 0x4002004}, 0xc) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000001c0)=0x2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) signalfd4(r3, &(0x7f0000000300)={0x5}, 0x8, 0x80000) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000020000"]) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) inotify_init1(0x0) 01:32:43 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="f5ca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0xc000, 0x0) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f0000000180)=0x10001) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0xaaaaaaaaaaaab97, 0x8, &(0x7f00000000c0)=[@vmwrite={0x8, 0x0, 0x1, 0x0, 0x200, 0x0, 0x0, 0x0, 0x6cc}, @cr4={0x1, 0x60401}], 0x10000000000000c0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) r4 = request_key(&(0x7f0000000380)='.request_key_auth\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)='\x00', 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r4) ioctl$KVM_RUN(r2, 0xae80, 0x0) semget$private(0x0, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000300)=""/67) 01:32:43 executing program 3 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:43 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) [ 261.271583] FAULT_INJECTION: forcing a failure. [ 261.271583] name failslab, interval 1, probability 0, space 0, times 0 [ 261.334083] CPU: 0 PID: 8005 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 261.342556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.344176] *** Guest State *** [ 261.351937] Call Trace: [ 261.351968] dump_stack+0x244/0x39d [ 261.351995] ? dump_stack_print_info.cold.1+0x20/0x20 [ 261.352015] ? lock_downgrade+0x900/0x900 [ 261.352032] ? check_preemption_disabled+0x48/0x280 [ 261.352066] should_fail.cold.4+0xa/0x17 [ 261.352088] ? rcu_softirq_qs+0x20/0x20 [ 261.352113] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 261.362970] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 261.367021] ? is_bpf_text_address+0xd3/0x170 [ 261.367042] ? kernel_text_address+0x79/0xf0 [ 261.367061] ? __kernel_text_address+0xd/0x40 [ 261.367078] ? unwind_get_return_address+0x61/0xa0 [ 261.367098] ? __save_stack_trace+0x8d/0xf0 [ 261.371881] CR4: actual=0x0000000000062441, shadow=0x0000000000060401, gh_mask=ffffffffffffe871 [ 261.376293] ? find_held_lock+0x36/0x1c0 [ 261.376337] ? do_syscall_64+0x1b9/0x820 [ 261.376355] ? perf_trace_sched_process_exec+0x860/0x860 [ 261.376384] __should_failslab+0x124/0x180 [ 261.383057] CR3 = 0x0000000000000000 [ 261.384436] should_failslab+0x9/0x14 [ 261.384456] kmem_cache_alloc_trace+0x2d7/0x750 [ 261.384477] ? __might_sleep+0x95/0x190 [ 261.384504] apparmor_file_alloc_security+0x17b/0xac0 [ 261.384526] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 261.391168] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 261.398519] ? apparmor_path_rename+0xcd0/0xcd0 [ 261.398548] ? rcu_read_lock_sched_held+0x14f/0x180 [ 261.398567] ? kmem_cache_alloc+0x33a/0x730 [ 261.398583] ? zap_class+0x640/0x640 [ 261.398607] security_file_alloc+0x4c/0xa0 [ 261.398628] __alloc_file+0x12a/0x470 [ 261.403677] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 261.407583] ? file_free_rcu+0xd0/0xd0 [ 261.407605] ? find_held_lock+0x36/0x1c0 [ 261.407636] ? is_bpf_text_address+0xac/0x170 [ 261.407678] ? lock_downgrade+0x900/0x900 [ 261.407694] ? check_preemption_disabled+0x48/0x280 [ 261.407716] alloc_empty_file+0x72/0x170 [ 261.412687] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 261.417154] path_openat+0x170/0x5150 [ 261.417174] ? rcu_softirq_qs+0x20/0x20 [ 261.417189] ? unwind_dump+0x190/0x190 [ 261.417217] ? zap_class+0x640/0x640 [ 261.417238] ? path_lookupat.isra.43+0xc00/0xc00 [ 261.417270] ? unwind_get_return_address+0x61/0xa0 [ 261.422054] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 261.430443] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 261.430462] ? expand_files.part.8+0x571/0x9a0 [ 261.430486] ? find_held_lock+0x36/0x1c0 [ 261.430513] ? __alloc_fd+0x347/0x6e0 [ 261.430531] ? lock_downgrade+0x900/0x900 [ 261.430544] ? getname+0x19/0x20 [ 261.430569] ? kasan_check_read+0x11/0x20 [ 261.430584] ? do_raw_spin_unlock+0xa7/0x330 [ 261.430601] ? do_raw_spin_trylock+0x270/0x270 [ 261.435125] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 261.438764] ? __lock_is_held+0xb5/0x140 [ 261.438780] ? __check_object_size+0xb1/0x782 [ 261.438811] ? _raw_spin_unlock+0x2c/0x50 [ 261.438828] ? __alloc_fd+0x347/0x6e0 [ 261.438866] do_filp_open+0x255/0x380 [ 261.444782] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 261.448564] ? may_open_dev+0x100/0x100 [ 261.448600] ? get_unused_fd_flags+0x122/0x1a0 [ 261.448618] ? __alloc_fd+0x6e0/0x6e0 [ 261.448637] ? __lock_is_held+0xb5/0x140 [ 261.448694] do_sys_open+0x568/0x700 [ 261.452857] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 261.456226] ? filp_open+0x80/0x80 [ 261.456249] ? trace_hardirqs_off_caller+0x300/0x300 [ 261.456263] ? do_sys_ftruncate+0x449/0x550 [ 261.456286] __x64_sys_open+0x7e/0xc0 [ 261.456308] do_syscall_64+0x1b9/0x820 [ 261.456324] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 261.456343] ? syscall_return_slowpath+0x5e0/0x5e0 [ 261.461469] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 261.464991] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.465012] ? trace_hardirqs_on_caller+0x310/0x310 [ 261.465032] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 261.465052] ? prepare_exit_to_usermode+0x291/0x3b0 [ 261.465076] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.465101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.470541] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 261.475895] RIP: 0033:0x4111a1 [ 261.475915] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 261.475924] RSP: 002b:00007f1f25974a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 261.475941] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004111a1 [ 261.475952] RDX: 00007f1f25974afa RSI: 0000000000000002 RDI: 00007f1f25974af0 [ 261.475961] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 261.475971] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 261.475981] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 01:32:43 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000000000045, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") sendfile(r0, r1, &(0x7f0000000180)=0x30101, 0x8402) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ppoll(&(0x7f0000000100)=[{r0, 0x1000}, {r2}, {r1, 0x2000}, {r0, 0x101}, {r1, 0x481}, {r1, 0x20}, {r1, 0x2}], 0x7, &(0x7f00000001c0), &(0x7f0000000200)={0xfffffffffffffbff}, 0x8) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)={0x0, @aes256, 0x1, "7307ea5a9c15a1de"}) [ 261.591113] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 261.667754] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 261.791093] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 261.856964] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 261.865629] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 261.872807] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 01:32:43 executing program 5: r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x2) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f00000001c0)={0x7caf, 0xc7, 0x0, 0x1, 0x7ff}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x4000, @dev, [0x0, 0x300000000000000, 0x0, 0x0, 0x4000000]}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) clock_getres(0x3, &(0x7f0000000000)) r3 = socket$netlink(0x10, 0x3, 0xf) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="00fb154300cb2c59e7cb1fe5165a174d2c835efc49"], 0x1, 0x2) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 01:32:43 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) [ 261.880530] Interruptibility = 00000000 ActivityState = 00000000 [ 261.900114] *** Host State *** [ 261.917615] RIP = 0xffffffff811f9ef3 RSP = 0xffff880187fe7390 [ 261.930796] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 01:32:43 executing program 3 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) [ 262.002798] FSBase=00007f4d00ca0700 GSBase=ffff8801daf00000 TRBase=fffffe0000003000 01:32:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup3(r2, r0, 0x80000) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000003c0)="0f20d86635080000000f22d866b80500000066b9060d20500f01c1ba6100b01aeed9a6390b0f0174170f009a0050670f01caba610066b80010000066ef260f22276766c74424004edeac976766c74424022c0000006766c744240600000000670f011424", 0x64}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)={0x5}) rt_sigqueueinfo(0x0, 0x0, &(0x7f00000001c0)={0x13, 0x0, 0x9}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 262.057913] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 262.114850] CR0=0000000080050033 CR3=00000001cd519000 CR4=00000000001426e0 01:32:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000000c0)={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000001c0)={r1, @in6={{0xa, 0x4e23, 0xe8fe, @dev={0xfe, 0x80, [], 0x20}, 0x8}}}, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x401, 0xc}, 0x8) sendto$inet(r0, &(0x7f0000000000)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) [ 262.182102] FAULT_INJECTION: forcing a failure. [ 262.182102] name failslab, interval 1, probability 0, space 0, times 0 [ 262.192212] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87c01360 [ 262.217020] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 01:32:44 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000440)=""/90) [ 262.244594] *** Guest State *** [ 262.254205] *** Control State *** [ 262.260500] CPU: 1 PID: 8046 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 262.268949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.268961] Call Trace: [ 262.280934] dump_stack+0x244/0x39d [ 262.284732] ? dump_stack_print_info.cold.1+0x20/0x20 [ 262.289973] should_fail.cold.4+0xa/0x17 [ 262.294071] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.296285] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 262.299207] ? perf_trace_lock+0x7a0/0x7a0 [ 262.299227] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.299244] ? check_preemption_disabled+0x48/0x280 [ 262.299267] ? zap_class+0x640/0x640 [ 262.326644] ? debug_smp_processor_id+0x1c/0x20 [ 262.331372] ? perf_trace_lock_acquire+0x15b/0x800 [ 262.336338] ? find_held_lock+0x36/0x1c0 [ 262.340438] ? __lock_is_held+0xb5/0x140 [ 262.344623] ? perf_trace_rdev_dump_survey+0x608/0x800 [ 262.349970] ? perf_trace_sched_process_exec+0x860/0x860 [ 262.355468] __should_failslab+0x124/0x180 [ 262.359738] should_failslab+0x9/0x14 [ 262.363563] kmem_cache_alloc_trace+0x2d7/0x750 [ 262.368259] ? check_preemption_disabled+0x48/0x280 [ 262.373310] __kthread_create_on_node+0x137/0x540 [ 262.378256] ? loop_get_status64+0x140/0x140 [ 262.382712] ? kthread_parkme+0xb0/0xb0 [ 262.386751] ? __lockdep_init_map+0x105/0x590 [ 262.391274] ? __lockdep_init_map+0x105/0x590 [ 262.395805] ? loop_get_status64+0x140/0x140 [ 262.400237] kthread_create_on_node+0xb1/0xe0 [ 262.404764] ? __kthread_create_on_node+0x540/0x540 [ 262.409809] ? kasan_check_read+0x11/0x20 [ 262.414046] lo_ioctl+0x7f6/0x1d60 [ 262.417623] ? lo_rw_aio+0x1ef0/0x1ef0 [ 262.421611] blkdev_ioctl+0x9ac/0x2010 [ 262.427996] ? blkpg_ioctl+0xc10/0xc10 [ 262.431902] ? lock_downgrade+0x900/0x900 [ 262.436068] ? check_preemption_disabled+0x48/0x280 [ 262.441112] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 262.446259] ? kasan_check_read+0x11/0x20 [ 262.450431] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 262.455730] ? rcu_softirq_qs+0x20/0x20 [ 262.459740] ? __fget+0x4d1/0x740 [ 262.463224] ? ksys_dup3+0x680/0x680 [ 262.467029] block_ioctl+0xee/0x130 [ 262.470705] ? blkdev_fallocate+0x400/0x400 [ 262.475052] do_vfs_ioctl+0x1de/0x1720 [ 262.478972] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 262.484545] ? ioctl_preallocate+0x300/0x300 [ 262.488978] ? __fget_light+0x2e9/0x430 [ 262.492976] ? fget_raw+0x20/0x20 [ 262.496574] ? rcu_read_lock_sched_held+0x14f/0x180 [ 262.501616] ? kmem_cache_free+0x24f/0x290 [ 262.505895] ? putname+0xf7/0x130 [ 262.509374] ? do_syscall_64+0x9a/0x820 [ 262.513367] ? do_syscall_64+0x9a/0x820 [ 262.517368] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 262.521978] ? security_file_ioctl+0x94/0xc0 [ 262.526416] ksys_ioctl+0xa9/0xd0 [ 262.529898] __x64_sys_ioctl+0x73/0xb0 [ 262.533962] do_syscall_64+0x1b9/0x820 [ 262.537870] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 262.543265] ? syscall_return_slowpath+0x5e0/0x5e0 [ 262.548345] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.553209] ? trace_hardirqs_on_caller+0x310/0x310 [ 262.558247] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 262.563297] ? prepare_exit_to_usermode+0x291/0x3b0 [ 262.568340] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.573215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.578432] RIP: 0033:0x4573d7 [ 262.581646] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.600715] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 262.608446] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004573d7 [ 262.615733] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 262.623020] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 262.630306] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 262.637595] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 262.646169] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 262.660934] EntryControls=0000d1ff ExitControls=002fefff [ 262.676420] CR4: actual=0x0000000000062441, shadow=0x0000000000060401, gh_mask=ffffffffffffe871 [ 262.696133] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 262.703972] CR3 = 0x0000000000000000 [ 262.717830] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 262.736949] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 01:32:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x4000000007, 0x0) perf_event_open(&(0x7f0000001000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x40202) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000180)) recvfrom(r0, &(0x7f0000000100)=""/127, 0x7f, 0x40, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000000)=""/16) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0xc4c85512, &(0x7f0000001000)) 01:32:44 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000440)=""/90) [ 262.748127] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 262.779620] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 262.815432] reason=80000021 qualification=0000000000000000 [ 262.847465] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 262.883981] IDTVectoring: info=00000000 errcode=00000000 [ 262.927026] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 262.957376] TSC Offset = 0xffffff719f40d881 [ 262.962357] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 262.984143] EPT pointer = 0x00000001ce0a201e [ 262.994913] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 263.014523] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 263.050868] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 263.069310] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 263.078175] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 263.086343] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 263.095390] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 263.103590] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 263.111778] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 263.118303] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 263.125983] Interruptibility = 00000000 ActivityState = 00000000 [ 263.132387] *** Host State *** [ 263.135720] RIP = 0xffffffff811f9ef3 RSP = 0xffff880187227390 [ 263.141987] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 263.148508] FSBase=00007f4d00c5e700 GSBase=ffff8801dae00000 TRBase=fffffe0000003000 [ 263.156491] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 263.163631] CR0=0000000080050033 CR3=00000001cd519000 CR4=00000000001426f0 [ 263.170851] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87c01360 [ 263.177630] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 263.183869] *** Control State *** [ 263.187434] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 263.194262] EntryControls=0000d1ff ExitControls=002fefff 01:32:45 executing program 1: setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000)={0x83}, 0xb) r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f00000001c0)={0x1, 0x0, [{0x7, 0x3, 0x0, 0x0, @adapter={0x8, 0x1, 0xfffffffffffeffff, 0x7, 0x6}}]}) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f00000000c0)={0x1, r2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e22, 0x14, @remote, 0x8000}, @in6={0xa, 0x4e24, 0x9, @empty, 0x2}, @in6={0xa, 0x4e24, 0xffffffff7fffffff, @empty, 0x80000000}], 0x64) 01:32:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x3fffffef7fff) writev(r0, &(0x7f0000000000)=[{&(0x7f0000ac9000)="290000002000190600003fffffffda060200000003000000000000000d00140000050000000500e8ff", 0x29}], 0x1) r1 = dup2(r0, r0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000080)=""/234) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), 0x4) 01:32:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup3(r2, r0, 0x80000) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000003c0)="0f20d86635080000000f22d866b80500000066b9060d20500f01c1ba6100b01aeed9a6390b0f0174170f009a0050670f01caba610066b80010000066ef260f22276766c74424004edeac976766c74424022c0000006766c744240600000000670f011424", 0x64}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)={0x5}) rt_sigqueueinfo(0x0, 0x0, &(0x7f00000001c0)={0x13, 0x0, 0x9}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:32:45 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000440)=""/90) 01:32:45 executing program 3 (fault-call:2 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:45 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000440)=""/90) [ 263.199829] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 263.206926] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 263.213792] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 263.220480] reason=80000021 qualification=0000000000000000 [ 263.227079] IDTVectoring: info=00000000 errcode=00000000 [ 263.232719] TSC Offset = 0xffffff712923fbba [ 263.237158] EPT pointer = 0x00000001cf1d601e 01:32:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) socket$inet_dccp(0x2, 0x6, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xfffffffffffffffd, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000700b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x0, &(0x7f0000000380), 0x78) 01:32:45 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000000)=""/19, 0x13}], 0x2, &(0x7f0000001340)=""/75, 0x4b}, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600200000000a0000000000dfffff0400e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000170000000000000000000000000000000000000000000000"], 0x80}}, 0x0) [ 263.377784] FAULT_INJECTION: forcing a failure. [ 263.377784] name failslab, interval 1, probability 0, space 0, times 0 01:32:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) [ 263.540223] CPU: 1 PID: 8087 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 263.548717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.558101] Call Trace: [ 263.560733] dump_stack+0x244/0x39d [ 263.564394] ? dump_stack_print_info.cold.1+0x20/0x20 [ 263.569623] should_fail.cold.4+0xa/0x17 [ 263.573746] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.579461] ? pick_next_task_fair+0xa35/0x1c90 [ 263.584438] ? rcu_read_lock_sched_held+0x14f/0x180 01:32:45 executing program 5: perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x400, 0x583000) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$sock_int(r1, 0x1, 0xc, &(0x7f0000000240), 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000040)=ANY=[]}) [ 263.589487] ? zap_class+0x640/0x640 [ 263.593223] ? print_usage_bug+0xc0/0xc0 [ 263.597318] ? __account_cfs_rq_runtime+0x790/0x790 [ 263.602366] ? find_held_lock+0x36/0x1c0 [ 263.606552] ? __lock_is_held+0xb5/0x140 [ 263.610682] ? perf_trace_sched_process_exec+0x860/0x860 [ 263.616191] __should_failslab+0x124/0x180 [ 263.620685] should_failslab+0x9/0x14 [ 263.624516] kmem_cache_alloc+0x2be/0x730 [ 263.628721] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 263.633832] __kernfs_new_node+0x127/0x8d0 [ 263.638103] ? trace_hardirqs_off_caller+0x300/0x300 [ 263.643344] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 263.648153] ? _raw_spin_unlock_irq+0x60/0x80 [ 263.652695] ? __schedule+0x168b/0x21d0 [ 263.656720] ? zap_class+0x640/0x640 [ 263.660567] ? zap_class+0x640/0x640 [ 263.664309] ? trace_hardirqs_on+0xbd/0x310 [ 263.668677] ? kasan_check_read+0x11/0x20 [ 263.672856] ? find_held_lock+0x36/0x1c0 [ 263.677080] kernfs_new_node+0x95/0x120 [ 263.681088] kernfs_create_dir_ns+0x4d/0x160 [ 263.685527] internal_create_group+0x5fc/0xd80 [ 263.690149] ? remove_files.isra.1+0x190/0x190 [ 263.695015] ? up_write+0x7b/0x220 [ 263.698576] ? down_write_nested+0x130/0x130 [ 263.703014] ? down_read+0x120/0x120 [ 263.706770] sysfs_create_group+0x1f/0x30 [ 263.711097] lo_ioctl+0x1307/0x1d60 [ 263.714890] ? lo_rw_aio+0x1ef0/0x1ef0 [ 263.718805] blkdev_ioctl+0x9ac/0x2010 [ 263.722724] ? blkpg_ioctl+0xc10/0xc10 [ 263.726635] ? lock_downgrade+0x900/0x900 [ 263.730829] ? check_preemption_disabled+0x48/0x280 [ 263.735937] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 263.740953] ? kasan_check_read+0x11/0x20 [ 263.745131] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 263.750434] ? rcu_softirq_qs+0x20/0x20 [ 263.754679] ? __fget+0x4d1/0x740 [ 263.758175] ? ksys_dup3+0x680/0x680 [ 263.761933] block_ioctl+0xee/0x130 [ 263.765591] ? blkdev_fallocate+0x400/0x400 [ 263.769937] do_vfs_ioctl+0x1de/0x1720 [ 263.774124] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 263.779719] ? ioctl_preallocate+0x300/0x300 [ 263.784160] ? __fget_light+0x2e9/0x430 [ 263.788160] ? fget_raw+0x20/0x20 [ 263.791639] ? rcu_read_lock_sched_held+0x14f/0x180 [ 263.796792] ? kmem_cache_free+0x24f/0x290 [ 263.801050] ? putname+0xf7/0x130 [ 263.804534] ? do_syscall_64+0x9a/0x820 [ 263.808537] ? do_syscall_64+0x9a/0x820 [ 263.812541] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 263.817155] ? security_file_ioctl+0x94/0xc0 [ 263.822199] ksys_ioctl+0xa9/0xd0 [ 263.825706] __x64_sys_ioctl+0x73/0xb0 [ 263.829626] do_syscall_64+0x1b9/0x820 [ 263.833566] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 263.838958] ? syscall_return_slowpath+0x5e0/0x5e0 [ 263.843911] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.848783] ? trace_hardirqs_on_caller+0x310/0x310 [ 263.853828] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 263.858870] ? prepare_exit_to_usermode+0x291/0x3b0 [ 263.863912] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.868795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.874002] RIP: 0033:0x4573d7 01:32:45 executing program 5: r0 = msgget$private(0x0, 0xa) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/12) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) socketpair(0x10, 0x7, 0x2, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0x40a85323, &(0x7f0000000080)={{0xfffffffffffffffe, 0x8}, 'port0\x00', 0x80, 0x0, 0x8000, 0x2, 0x1, 0xc95, 0x5, 0x0, 0x2, 0x3c}) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x12c, r4, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x100}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsf0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xbab}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x54}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xbe2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1a}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0xf53}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8001}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x401}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x12c}, 0x1, 0x0, 0x0, 0x1}, 0x804) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000140)={{0x0, 0x100000001}, {0x80}}) 01:32:45 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r2, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000480), 0x80000) mount(&(0x7f0000000600)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x10, &(0x7f0000000000)) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r0, 0xec, "3be195", "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"}}, 0x110) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x1}, {0xa, 0x4e23, 0x7, @empty, 0x2}, r0, 0x4de8a597}}, 0x48) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="1b4a542f9d3c080500"], &(0x7f0000000400)=0xd) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r4, 0x5, 0x81, 0x100000000, 0x100000001, 0x2000000000000000}, 0x14) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) 01:32:45 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000000)=[{0x81, 0x4, 0x0, 0x0, @tick, {}, {}, @connect={{0x1}, {0x9, 0x7}}}], 0x30) [ 263.877217] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.896456] RSP: 002b:00007f1f25953a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 263.904201] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004573d7 [ 263.911503] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 263.919130] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 263.926430] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 263.933770] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 01:32:45 executing program 3 (fault-call:2 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:45 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x200000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) readv(r0, &(0x7f0000001780)=[{&(0x7f0000000100)=""/203, 0xcb}], 0x1) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8, 0x200000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x4, 0x1}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000340)={r2, 0x2, 0x4}, &(0x7f0000000380)=0x8) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) close(r3) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r3}) 01:32:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) 01:32:45 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000100)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) fchdir(r2) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r3) perf_event_open(&(0x7f0000000080)={0x2, 0x41, 0x26, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="0200000000000000090000000000000000000000fbffffff0100000000000000000000000100000000000000000000000100010000000000f4ffffff00000000e20000000000000000000000000000000000000000000000"]) [ 264.140782] FAULT_INJECTION: forcing a failure. [ 264.140782] name failslab, interval 1, probability 0, space 0, times 0 [ 264.178549] CPU: 0 PID: 8123 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 264.187028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.196406] Call Trace: [ 264.199038] dump_stack+0x244/0x39d [ 264.202731] ? dump_stack_print_info.cold.1+0x20/0x20 [ 264.207981] should_fail.cold.4+0xa/0x17 [ 264.212215] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.212233] ? __lock_is_held+0xb5/0x140 [ 264.212247] ? zap_class+0x640/0x640 [ 264.212275] ? enqueue_entity+0x34b/0x20d0 [ 264.221529] ? zap_class+0x640/0x640 [ 264.221548] ? print_usage_bug+0xc0/0xc0 [ 264.221563] ? __account_cfs_rq_runtime+0x790/0x790 [ 264.221584] ? find_held_lock+0x36/0x1c0 [ 264.221605] ? __lock_is_held+0xb5/0x140 [ 264.250525] ? perf_trace_sched_process_exec+0x860/0x860 [ 264.256024] __should_failslab+0x124/0x180 [ 264.260290] should_failslab+0x9/0x14 [ 264.264124] kmem_cache_alloc+0x2be/0x730 [ 264.268313] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 264.273362] __kernfs_new_node+0x127/0x8d0 [ 264.277631] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 264.282463] ? zap_class+0x640/0x640 [ 264.286202] ? print_usage_bug+0xc0/0xc0 [ 264.290290] ? zap_class+0x640/0x640 [ 264.294035] ? trace_hardirqs_on+0xbd/0x310 [ 264.298383] ? kasan_check_read+0x11/0x20 [ 264.302567] ? find_held_lock+0x36/0x1c0 [ 264.306699] kernfs_new_node+0x95/0x120 [ 264.310728] kernfs_create_dir_ns+0x4d/0x160 [ 264.315185] internal_create_group+0x5fc/0xd80 [ 264.319812] ? remove_files.isra.1+0x190/0x190 [ 264.324418] ? up_write+0x7b/0x220 [ 264.327985] ? down_write_nested+0x130/0x130 [ 264.332420] ? down_read+0x120/0x120 [ 264.336179] sysfs_create_group+0x1f/0x30 [ 264.340358] lo_ioctl+0x1307/0x1d60 [ 264.344023] ? lo_rw_aio+0x1ef0/0x1ef0 [ 264.347954] blkdev_ioctl+0x9ac/0x2010 [ 264.351875] ? blkpg_ioctl+0xc10/0xc10 [ 264.355796] ? lock_downgrade+0x900/0x900 [ 264.359967] ? check_preemption_disabled+0x48/0x280 [ 264.359993] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 264.360011] ? kasan_check_read+0x11/0x20 [ 264.360031] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 264.360050] ? rcu_softirq_qs+0x20/0x20 [ 264.360077] ? __fget+0x4d1/0x740 [ 264.386908] ? ksys_dup3+0x680/0x680 [ 264.390685] block_ioctl+0xee/0x130 [ 264.394336] ? blkdev_fallocate+0x400/0x400 [ 264.398698] do_vfs_ioctl+0x1de/0x1720 [ 264.402613] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 264.408197] ? ioctl_preallocate+0x300/0x300 [ 264.412715] ? __fget_light+0x2e9/0x430 [ 264.416791] ? fget_raw+0x20/0x20 [ 264.420265] ? rcu_read_lock_sched_held+0x14f/0x180 [ 264.425306] ? kmem_cache_free+0x24f/0x290 [ 264.429560] ? putname+0xf7/0x130 [ 264.433040] ? do_syscall_64+0x9a/0x820 [ 264.437035] ? do_syscall_64+0x9a/0x820 [ 264.441030] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 264.446085] ? security_file_ioctl+0x94/0xc0 [ 264.450516] ksys_ioctl+0xa9/0xd0 [ 264.454087] __x64_sys_ioctl+0x73/0xb0 [ 264.458001] do_syscall_64+0x1b9/0x820 [ 264.461908] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.467293] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.472242] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.477110] ? trace_hardirqs_on_caller+0x310/0x310 [ 264.482147] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 264.487186] ? prepare_exit_to_usermode+0x291/0x3b0 [ 264.492227] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.497100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.502308] RIP: 0033:0x4573d7 [ 264.505520] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.524579] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.532310] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004573d7 01:32:46 executing program 5: socket$inet(0x2, 0x6, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB], &(0x7f0000000480)=0x1) syz_genetlink_get_family_id$fou(&(0x7f0000000640)='fou\x00') add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x8100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000340)=0xffffffffffffffff, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa00800}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="00072abd7000fbdbdf250c00000008000600070000002000020014000100fe8000000000000000000000000000aa080002004e24000028000300080003000200000014000200697036746e6c30000000000000000000080005007f00000108000500ff0000000c00030008000800040000000800050001000000200001000c0006006e6f6e650000000008000b007369700008000200870000004000030008000800070000000a0002007665746830000000000000000000000008000400eef7"], 0x1}}, 0x44000) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000), 0xc5) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'rose0\x00'}) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000300)='./file0\x00', 0x4, 0x8, &(0x7f0000002a80)=[{&(0x7f0000000740)="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", 0x1000, 0x7}, {&(0x7f00000004c0)="a392cbefffdf1370ff2d57cd3b1c332de58584815d02f7e44182e8fa70bc6af0fa0c0ee897bff297eea016bd073de73b0e3dac81934b80bfb2f26464026edffcd2ea0c7c09637fd80bde80176e6fd70a95e7626ef61a5da2d288be56fe02df0e4b2b85e9dc0499f379f8cc36c6b6f66e36e3b0a7b2a30e1e6a7fe8d3364a74aba25049a7d2e22dd72679e994cb72024ec903468c703ae0db841ee72bd9b48f67e130a7adc0aa32ded92426d6f96ed7900dab80b5f2144e0e4555e3ae7d89a4c8fc0e75f7", 0xc4, 0x2}, {&(0x7f0000000340), 0x0, 0x8001}, {&(0x7f0000001740)="a27f39995591b89ac6a947a6de7b7de641cd66de6406073225e23db8cff5db6c55bfb04893ac6b49e6f1935b7a008bc9705f78c43461767ad8c961e6dc6ab70d33afbd57c0b1109596c6c4f94512b0d698d7b65fa0f0db37448539351411c8dfa9849e5133755938296dc99fad6ee913c984e641a6fad8b791e3670705d57715034e71d0835f8b313283a62ecbd84ffa58f167ef7027dba6a02769ff11a5a87ae77cc5b4826daa8c4e38df30aaf1c3ac46d0e25cfd0e9bf2e934", 0xba, 0x1}, {&(0x7f0000001800)="12b708d645864f2e4a1577d38cc760db0bc7336cbb713abd41706e4d63f03ba0ae70d5b010250dd2bc31fa542025d4e103dd002e34e65331d1b9c657fee86e05a055f25628122bd43b4d7be76b70880bc4422c9a61d6e41f2f9f2794956218d0f8efc6304ce11f5b55095d7d6ff0f21bb8bedf3f478d6d1a8a19975c9ceb8d9aedc79dc92188061fe4bc95ca5ef9eb14d195ff20209bbd03cc57dbc7d8e147238c614e47fd2fc2da8c7c0fce62030651e8a44d5a27582ffb6ce8b97f6beeee381184f58c36431b3e02a80a99d1c477f416be71fdda2cc74e66b08bb34f59adfc4fd5a97158224c630a17630c208e3f3ad913b454992bb2ca3573ed6d577257f7c690954f61729d60c931dab53c82802e4cebc3e7575df5bf0654aa5f35fabe7b39ad9abc2b126f3d9c4fbb9ad24ccd3f39a1e9cd7d47ecc4c92a68dd04c8d778ef21487f16081d9da57d5c17a0a5ba5032777c6b3fbdde9dd78a177f2df8e0c3eb9fc64b818caf98af9680583c4323c202d6c8eb5723da8d33e61609fd24e30769c7043422f50bf7be5315a6d1949ec369b87824c918efa34b146951a6199c6b4d6bea90d8bb61664b72355644be23148a6bc5554f2f54a518444b05aace59c5023138fac6713f218fc863ba0b355e4eb1d6b95703b11ce4a0e9857450def826b26e7e220d6fc38e1260f69e6425f184b3ae75994c9067d19c402b75d4ff37c4d82b4629aed1542093d5205c576b3bdbdd08369027190481c8d036b02d5286ce9f1c6e227389907865342082af2f52afe3281dc298d1b296a69c6061424d344904ee245778099524a3f9d55aa1b10ea85b4c1f561b09f251a670ad628e6b72cd083b4ec2f28feb28b34f5ea3468ed3ec8a1f0c81bcbc4af1091de3e44977e3d133d787d91165f696bf2d3a372ed206e6e46af5381b7626ddb085aa138f409a3e195c0ea136f4ed2bf1c7fcd5c12f2460ad7a054c66bdda91067207cbb95d8e1b04519b12366e8baaae75c2bbf69ce91283e2707f87338cca3a272400a699cf4b164e9fdbdf09d101a135b4e36e3cf2cabcb18e9fbdcb738fe5ee27ce80ac497de601f672c80e6af34eac0e8d79da511f6826866e82decdc1084d548c4a46a44d60d3956dd343570629d2690875a5479c8c101a494f3ad7f629f1e86fdc5c2ca2848c9976e4e434bcae0aa880ef81880e5db842bd832bd3ca9791672cccf8a8d538f09b80c9b869bb838126eae50e9abeb8cc23a51fe84ef27d5daf939e050a0c9a25db37942bf9e740c5b7b53116b61d731da40420fd29bfc1280b3fff054af5082de90b413814cb5a0d9c4bb84991cdb695c84e5e1592c4b509462acda2f2100073c587d91656892786cb430fdd2090f2cc3cf23511fcbe90c47fbfe0d9a453d988169375932a4b1d50cef694445d39038e7269f3cfad1d150b865afd0aa74035a742675b1f31be011b456c8da3c0d4e8ab5746a21db3823799b1b85cd2a05351a1214ce0c2ff5d8a6b0760c1a99455241a2a981ef028f8efae47bae76dccf90b0b3327b913c8ea57208f4d95cee1e051fa26e5064cb6d1fcda7f7d7f2745613aa3e2f18fd84b679fb8edbe9808d486dd6e80c29ace3a318bba32543c6bdd39db26ef962eb060b4269de05ec3f1b4ee34b7e7730946c2a084a126f903655fbb0b97751d0eb522cdb99682adf00eada54127840514338abb3c07702ab62b1799090458badd4a3d451414ac8db9a08e7d2f0cf5814424075fa70a6a14baf2ae536879a54d572ba8bceccbfbad91e6bf88bdcec1320a9b70dbd0c8635e362f8276951230a95ee0fb9fe412e0488a216b54bb3bf4a92435b0373009e7ffc91bbfc42584be8db42dc761f8f954a75545e42335c220a9806c8c3985ae6badfa91f4aaa4c4f50aa1eff1c92da392b6f7d93788ab99abf0f22ca2aed87eee10f9df4cc8e1486ceff4703f047d0b68f858d046ae87c01265cf5d9a53b5f44438043c56355a72db5405f2d46404f5c2a7f98408694af6703ed106a78aa50f0dbdbbf093397ace2ecc583e0370aa2c22157b8b73bc744e55f848e280ba5e21c34fa699e3e696dca84dbd7eee0d3c62f1553950eacf652caa78a32c3cbba3c3a84b92c4ad28a20a4389ad3d0b48245ec09b2a711021700d7ec64b81ea69e5f80afab3dcdcc8b5a7d9026a1f67cae96d131ca7c8fd380c5e608fbff1a5b1a82b3dadeb7c326bc880c2cdbf7abfd7befc4cf6dce9acb1916176f39fb1ec582677b93480f998bdac4c55953cabb7a98954a500f257cbf839172de8da4f0d07d5b4fe90c19f1a6d30ee01060f24eaa4c91eea7cb4bab33573398e0f0ca7f3779e2fc4c4cbf824984fa90df327ceba24bfbc5505e199927a4f850afa442deac4134cb0a915c57e13757e1d29519af0feaa355ca38b9dd0e533a1b335180f0f004a2aaaa13dc1ecad60573fe4d0934a20724ce05b577a20c054179f421bf8b079c86eb62ec0168ac5f654c3d92803e1635883216b3c47b2e2e08a7e4dd06fde8fe94a58c4018a2d1bb9e52a8c7b6d4ea4ff68a5fb0861821def39acee35f5daa3d25998ca47bf61063d64183ed9fc36b9c555b9f64e79fa6177be0206f1c7da66e2291007e88b3c142a37afce1f476ed82421254b1b4082558c6d7e6031ad878872edb2dc3074cd610a69c18cc9d5eff219b5fc89b22cf4d5a82497253cbf5c1badb01eb497737fd9b932c7433dd409eb71f2d61a0ab01c5a5a70528d5fb30840d32b6a4f97d643363f4490acea36f71768a502a7834d4d29ac206e1056f448c97c99455582d765b22da090a7a558138d0bb2220272846f746d73bc0e426ae7ff14b685e598aeb07a33306ca534f05cb56f8a16afb2c980d5bb669394dfcf8e86726640dd5cd0812cb00f56d68bd3e089bc0b60d34f7447a16a0fdd726ffc27adc5c3b74b94ec4718fa9887696c23031605c4aed11b318ec732e8dcbb6b16b8da7c6da04cbafba29c6bbb48af44fd0ffec5a3c53a79f9adad21a8fdfa4f0ab153d12e1cd828f70838fc656fe97f987770f686095aa42dadd9bf6bf8807d6e86971d5763e705e498bd556bf157a0fb971b17faa6fa9d4324103b302566f5292c2f622b275714a26dc8a6b0068e39175d9294782c5da762cf7d4e6c2d6bfcf73dcccb6735c3479dba7e17ae267e35419812e76715fa10360dd9ebbcb09c4f98cfb1bcd077eefb971cbf1d7b66e4ddfc8fa7bc6abc677e2a28ff003e2bb1d21fb56f011f342b7430dcf553d990e52fcfcd38bccf09cc7a2db5b4ce63446fe59bd32bb366ad9d943c21a7f8a9f4ae06b91c99faa51e0fc6b5ac9c309adaa3621d9dcb85bcf26fe7a6f7851cf6c104bf4c79115d9ed9dd946cdd8326e908181f228df9491d67c6c5a61466924b3579679eaeb0bc762a2539aa15f872a854a4de5a3c4ac98e5051190633eb3ed7a9d27db4284cedd74db161ff450f7b5872e31e7a62794428018f85da574e48eafe44ae630250518776429796f8f9352510373bc0a0cf7f46545dd175c3dae60ff9f640ebe95782c8f0e8f03b7263a2afd4623e925d46c3051bad6d8f0fc60bb300ed71598441a492eb819e17f1762f6f09c697e53c62d327ba543ec261684491eb15e7ca361d1504c6b779c25a8915c2eae7d978994ad202258ca4e0e0e3555e0be9c7f928dfded669202204b08f1ab5b83619eeb83150808ab6bd7630e0cc9c3f0f93bed20c559b6ba538677bb3ebb08ba1d44ed2ec779e7c35ad15998e927dc094ec00ab4a04aaf0b73a0c477f7570bea4758e4c737373c2bf1180c21090fa12c1c8e171420e78606c83a7cd66d31a9314e8358ea4b98d2408ad049cb1cbc408b6e12e79271d0a637b88328778f745e54e4e5fb7d37f6d609e39a0cff55fa40f90d0b330965589a0f98b7f4f8245df8f7665c78307aee5b0f5cc88f8c8ce9406745ed5ad75406a00b9f0919f4bf63019f5169d88e76ccceaff240cdf982635fe42ddf477d0da008461b60d3fafd471fce70d249702844bc80e55334072373c402028718b80b2e8fc35c3b1b9cca005fb5b8297aae4b055c464b73ec3ce0a80999632a896749b0de809e0e676301ef84d122e492ed42c8ac7e0d6145dcf8d7c95ba71a2878fbc816af66363ca67f2d6eca52fc02b5fb0b14885f35cb440296a1ec55e9228471992838974be1cf2aa6b9d74de66adf6fe00e847127b2cea5c941e53616246eb43926bb8758b87c29bd4dd28d96f27c24485d028219d9919c42dbf4cedfd10734aa99299494e98419eb449eeea0cfef925a6dab9ffbf6b8d5aefb20d2a8d1370dffb9711f511987421417824efc04ff19d42f9859348e0e735f575c85819eed96ee30e81951c0515be366d3a027ec4f7172f5d56d77ae826becd683dd3f67b19cb7533b849c797e2210b9e7eb286b84e86ce9569c4d277c47fa0f36cb406d84f779bd7627ba9b4f33e1347317c6f0a699c556126cb424ebac1090d35dc656643d8f34140a2309e729178636e330aed5991e10e0ed643461fc6fdc0b39e58a00a351ad16a89a4eccff6e2a038b316c378c7a4484100a49ee98fe97b3133b173029269a620af8e2e189ae835f3a2334ebe8abfc818cd0f19193f5b69c92885b92b6c343c0b35691d0f8983d135db3a7184e70d68a41a0b5e293bb17512d05b4e0c7285125e61cd253ea7ee049b42b832cdfe0304441691c3633829f7595268e76cfc00bd82b81ac1d82d1a44c4270fec6e47cf824822651265bacdc73ded32151980b729e8d526fc2d054e44cd0456fe29ff7b6aff41429066772880fc5460fbf9b8868885fa641d6ef59895090a3dee451b619afb6e5b42db293c562426f340e56920b718340af1232cbdf11b597468eb8ea1019674e3a3d5aed2998ce0be8a9f418d17d1c0900fe625c159434b493c505ff97e89a84d73f6509078d3e04a8b5f86afad292876d5bde2ddfca97a61859f8c594a7c350d5dbc952fa2a79529c30a40f4b62b7b97760bf02b01988a54e46addb5b93068e9a94679a8482fc704818a166a96dd6237fe0994d92654787d514d0d5acd24d98eb882d3c64265fd89a4755f69bc79cf9d545e381651d1c8792b2bf1cc29df2052348505ed6732c237833718da69cb97baa6b01a04bbb14aec2c3ac05a7128a740b3571db85b6e5b18c7dd25968d6011d9b7b1a7ef4c6fbca351993bb20c1bcedb4c53646b61ed23f9175c292ae3301874710012967658a3eaeb5715c7768e921c30b0f194fac411d58d3360c2594b5e0cc6c5e04d514b12980c106ed6f7dba437548e87182e0e4a2499b4ec375cf9335d40b10a97c1f442ebb327b5e7d6786b773196c7f012d80fe1a55e92ce9aecadd380ef35f89ed5b1828354ec4e038d6ec2b73d09b0df9ff12a5e1a84af1f43d554b9a02819e0fc468b7d492f5fac968101218ef3100a5906ec7fe4b6b37b7db208a7536a08b9e4994c482e3528828988e8b794b9a1df7a5682a597602ed85e483d62be09d723436c33bb6a44817e83d7f6e4e26190168b0c98f89fbfd2b8d2f6cd7f5a4521539e268ee6c5e129daa3f2d43df0da9f489fd8a4104e99f934c5368fb37a6ea93088fd10675e2cac7305952ada2bced9d3648bb8046b0f3eb04cb48e4a36fe3562ff1a10ff8daecbc29a8dee723ded614aa5ab0d92c497f65cf23fc1a64a271c22384b3869b5168732ca55753869ee61bce7e883d11d476cff0a835d9a5d54b80b6c4c77cc34ff94640fd050a92ec2ce847e943b22c5e2031fc31d7ea9ddff62f42ae92d7bbe130238c890494a09", 0x1000, 0xff800000}, {&(0x7f0000002800)="d40d56bf036befba85bb8b8b0c3e012fb18a10c43c830daf4f0e5c568823eb53fd21fff4a7c0ba3a6ace3bec824d1a5f4048f184dc675107ea47edbed2d5db5ee1bbd6ff78bb87e58f095ee505f98cf69261ae50522188875028cb04452f9da3aa41473375062c70111903d0021ac3d855176b15b967d6dbf2c080477f3895770ac03cdbf42f8a8a1d", 0x89, 0x2e}, {&(0x7f00000028c0)="68e568ef5aa4be18e2ed24233c2cd37444a01a2c3ad00748fda6ce77a3122bcd8c150bb6880a4531639593dff9b74a3fc6764bff65b95fd2d3dbe6e5befb9127b30d8cf24f7d1d41daaa2df658dfc31b96168a7c13199617a04c919cd9dec3fb720c30f52d713e4e83e267f570fc6c25d0fa55a1f19630adfaf99febcf54f54b3eed86f37ec8c96660e91edbd8", 0x8d, 0x6a}, {&(0x7f0000002980)="61d291b043d62778c2bfd93cfd58a05a2b942d5570316c5d34940191acf6474d4e76c437ed318172dfe3dc64f389c6e1eb7b88429cb87509a99a0801bb5bdb6c209c70f9396eb1262b93f8dced17e6a7c793bf9b3030f22220937a291e908a1947267cea8c00b7194f01a41f3d85461697b64957b1967f535d250cc32b8a42f9cb4cfea7ce4efee01ea8b1347bb975daa8ab594b40c7ab6849ba800683b4e611075599c1c13f53ff4d7519f14524d3ca4517d73fea24950ab02072ea0cc2544f982d416859f8b8f36cb28ed404ebc6b8c5a4aa65e388f8cb1e85a2bc344c1865bc76b8", 0xe3, 0x8}], 0x1840, &(0x7f0000000400)='\x00') [ 264.539704] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 264.547099] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 264.554389] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 264.561704] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 01:32:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) 01:32:46 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r2, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000480), 0x80000) mount(&(0x7f0000000600)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x10, &(0x7f0000000000)) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r0, 0xec, "3be195", "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"}}, 0x110) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x1}, {0xa, 0x4e23, 0x7, @empty, 0x2}, r0, 0x4de8a597}}, 0x48) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="1b4a542f9d3c080500"], &(0x7f0000000400)=0xd) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r4, 0x5, 0x81, 0x100000000, 0x100000001, 0x2000000000000000}, 0x14) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) 01:32:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) 01:32:46 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r2, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000480), 0x80000) mount(&(0x7f0000000600)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x10, &(0x7f0000000000)) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r0, 0xec, "3be195", "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"}}, 0x110) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x1}, {0xa, 0x4e23, 0x7, @empty, 0x2}, r0, 0x4de8a597}}, 0x48) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="1b4a542f9d3c080500"], &(0x7f0000000400)=0xd) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r4, 0x5, 0x81, 0x100000000, 0x100000001, 0x2000000000000000}, 0x14) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) 01:32:46 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r2, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000480), 0x80000) mount(&(0x7f0000000600)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x10, &(0x7f0000000000)) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r0, 0xec, "3be195", "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"}}, 0x110) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast2, 0x1}, {0xa, 0x4e23, 0x7, @empty, 0x2}, r0, 0x4de8a597}}, 0x48) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="1b4a542f9d3c080500"], &(0x7f0000000400)=0xd) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000600)={r4, 0x5, 0x81, 0x100000000, 0x100000001, 0x2000000000000000}, 0x14) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) 01:32:47 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x20080, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) set_tid_address(&(0x7f0000000140)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x410082, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000000)={0xe0001}) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f00000000c0)={[0x0, 0x0, 0x0, 0x20000000040000]}) 01:32:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/attr/exec\x00', 0x2, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0xff, 0x22000) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000280), &(0x7f00000002c0)=0x110) r1 = syz_open_dev$sndtimer(&(0x7f00000b5ff1)='/dev/snd/timer\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000080)=0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f0000000300)={0x20000000}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000200)) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 265.233837] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:47 executing program 3 (fault-call:2 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:47 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000000c0)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$int_out(r0, 0x80004508, &(0x7f0000000080)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x800, 0x0) perf_event_open(&(0x7f00000002c0)={0x7, 0x70, 0xdb, 0x2, 0x40000, 0x100000000, 0x0, 0x2, 0x80000, 0x4, 0x8, 0x6, 0x7, 0x1ff, 0x2, 0xffff, 0xfffffffffffff8ad, 0x1, 0x0, 0x783, 0x6, 0x2, 0x8, 0x2, 0xb8, 0x1, 0x8, 0x7fff, 0x0, 0x400, 0x10001, 0xa2e, 0x9, 0x6, 0x7fffffff, 0x5, 0x9, 0xffff, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000240), 0x2}, 0x20000, 0x5, 0x92, 0x7, 0x7f, 0x6, 0x20}, r1, 0x3, r2, 0x2) ioctl$NBD_SET_SIZE(r2, 0xab02, 0x8) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f00000001c0)='syz0\x00', 0x1ff) write$P9_RLERRORu(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="24000000070200170047504c766d6e6574306370757365742a776c616e303a7d0700000080d257eb919c7ef4e69493ad230439eb40a69940615f65d7c67b6db19c737f7f4757376b76df24a1df622cd8e747c20907d04db86dc21797d8f3088aa3740a99f3921bea5ebfff901a118b52e35fe8cb06b5424793f51c18ba6cd0381b89dba057cd75a3a7798f2ae3f611815d9c739b30a4b0b7b2e48fbfdff2197ab74b8db2ed0ce21ef213772b7864c83bedc88c92136cebc07ab6a3184b4e320c2d245bc9b2cd3b3132979326ba1e46109d30ea49953d86a3f3b073d235ed"], 0x24) [ 265.493042] FAULT_INJECTION: forcing a failure. [ 265.493042] name failslab, interval 1, probability 0, space 0, times 0 [ 265.535289] CPU: 1 PID: 8187 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 265.544048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.553431] Call Trace: [ 265.556056] dump_stack+0x244/0x39d [ 265.559733] ? dump_stack_print_info.cold.1+0x20/0x20 [ 265.564957] ? radix_tree_tag_set+0x3d0/0x3d0 [ 265.569492] should_fail.cold.4+0xa/0x17 [ 265.573591] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 265.579278] ? kernfs_activate+0x8e/0x2c0 [ 265.583456] ? zap_class+0x640/0x640 [ 265.587193] ? lock_release+0xa10/0xa10 [ 265.591193] ? perf_trace_sched_process_exec+0x860/0x860 [ 265.596703] ? find_held_lock+0x36/0x1c0 [ 265.600897] ? __lock_is_held+0xb5/0x140 [ 265.605000] ? perf_trace_sched_process_exec+0x860/0x860 [ 265.610496] ? find_held_lock+0x36/0x1c0 [ 265.614601] __should_failslab+0x124/0x180 [ 265.618865] should_failslab+0x9/0x14 [ 265.622710] kmem_cache_alloc+0x2be/0x730 [ 265.626886] ? find_held_lock+0x36/0x1c0 [ 265.630978] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 265.636018] __kernfs_new_node+0x127/0x8d0 [ 265.636042] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 265.636060] ? kasan_check_write+0x14/0x20 [ 265.636082] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 265.654360] ? __kernfs_new_node+0x697/0x8d0 [ 265.658803] ? wait_for_completion+0x8a0/0x8a0 [ 265.663415] ? zap_class+0x640/0x640 [ 265.667264] ? kasan_check_write+0x14/0x20 [ 265.667288] ? __lock_is_held+0xb5/0x140 [ 265.667304] ? wait_for_completion+0x8a0/0x8a0 [ 265.667330] ? mutex_unlock+0xd/0x10 01:32:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x4) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000040)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x143}, 0x4000080) recvmmsg(r1, &(0x7f0000001b40)=[{{0x0, 0x118, &(0x7f0000000240), 0x0, 0x0, 0x26085d6cce6967cc}}], 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) [ 265.675679] ? kernfs_activate+0x21a/0x2c0 [ 265.675702] kernfs_new_node+0x95/0x120 [ 265.675725] __kernfs_create_file+0x5a/0x340 [ 265.675747] sysfs_add_file_mode_ns+0x222/0x530 [ 265.675773] internal_create_group+0x3df/0xd80 [ 265.706039] ? remove_files.isra.1+0x190/0x190 [ 265.710674] ? up_write+0x7b/0x220 [ 265.714241] ? down_write_nested+0x130/0x130 [ 265.718703] ? down_read+0x120/0x120 [ 265.722452] sysfs_create_group+0x1f/0x30 [ 265.726785] lo_ioctl+0x1307/0x1d60 [ 265.730442] ? lo_rw_aio+0x1ef0/0x1ef0 [ 265.734354] blkdev_ioctl+0x9ac/0x2010 [ 265.738270] ? blkpg_ioctl+0xc10/0xc10 [ 265.742176] ? lock_downgrade+0x900/0x900 [ 265.746343] ? check_preemption_disabled+0x48/0x280 [ 265.751387] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 265.756334] ? kasan_check_read+0x11/0x20 [ 265.760503] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 265.765804] ? rcu_softirq_qs+0x20/0x20 [ 265.769810] ? __fget+0x4d1/0x740 [ 265.773302] ? ksys_dup3+0x680/0x680 [ 265.777050] block_ioctl+0xee/0x130 [ 265.780733] ? blkdev_fallocate+0x400/0x400 [ 265.785074] do_vfs_ioctl+0x1de/0x1720 [ 265.788985] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 265.794542] ? ioctl_preallocate+0x300/0x300 [ 265.798968] ? __fget_light+0x2e9/0x430 [ 265.802960] ? fget_raw+0x20/0x20 [ 265.806431] ? rcu_read_lock_sched_held+0x14f/0x180 [ 265.811475] ? kmem_cache_free+0x24f/0x290 [ 265.815733] ? putname+0xf7/0x130 [ 265.819278] ? do_syscall_64+0x9a/0x820 [ 265.823276] ? do_syscall_64+0x9a/0x820 [ 265.827327] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 265.831933] ? security_file_ioctl+0x94/0xc0 [ 265.836362] ksys_ioctl+0xa9/0xd0 [ 265.839837] __x64_sys_ioctl+0x73/0xb0 [ 265.843747] do_syscall_64+0x1b9/0x820 [ 265.847676] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 265.853064] ? syscall_return_slowpath+0x5e0/0x5e0 [ 265.858009] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.862874] ? trace_hardirqs_on_caller+0x310/0x310 [ 265.867971] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 265.873020] ? prepare_exit_to_usermode+0x291/0x3b0 [ 265.878060] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.882930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.888134] RIP: 0033:0x4573d7 [ 265.891349] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.910271] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 265.917999] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004573d7 [ 265.925285] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 265.932570] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 265.939856] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 265.947137] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 01:32:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) [ 266.025698] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x46000, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0xc, 0x6, 0x0, 0x14, 0x3, 0x9, 0x0, 0x9d, 0xffffffffffffffff}}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0xfffffffffffffffe, 0x0) 01:32:48 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x22b00, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f00000001c0)) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) mount$bpf(0x0, &(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c80)='bpf\x00', 0x0, &(0x7f0000000cc0)) 01:32:48 executing program 3 (fault-call:2 fault-nth:13): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mlockall(0x1) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/251, 0xfffffea3}], 0x1, &(0x7f00000011c0)=""/157, 0xfc8d}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) 01:32:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) [ 266.537338] FAULT_INJECTION: forcing a failure. [ 266.537338] name failslab, interval 1, probability 0, space 0, times 0 [ 266.541800] Unknown ioctl 1074021761 [ 266.561319] CPU: 1 PID: 8212 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 266.569779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.579631] Call Trace: [ 266.582266] dump_stack+0x244/0x39d [ 266.585920] ? dump_stack_print_info.cold.1+0x20/0x20 [ 266.591131] ? radix_tree_tag_set+0x3d0/0x3d0 [ 266.595731] should_fail.cold.4+0xa/0x17 [ 266.599831] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.604954] ? kernfs_activate+0x8e/0x2c0 [ 266.609121] ? zap_class+0x640/0x640 [ 266.611950] overlayfs: failed to resolve './file1': -2 [ 266.612848] ? lock_release+0xa10/0xa10 [ 266.612865] ? perf_trace_sched_process_exec+0x860/0x860 [ 266.612890] ? find_held_lock+0x36/0x1c0 [ 266.612913] ? __lock_is_held+0xb5/0x140 [ 266.635736] ? perf_trace_sched_process_exec+0x860/0x860 [ 266.641211] ? find_held_lock+0x36/0x1c0 [ 266.645301] __should_failslab+0x124/0x180 [ 266.649557] should_failslab+0x9/0x14 [ 266.653370] kmem_cache_alloc+0x2be/0x730 [ 266.657536] ? find_held_lock+0x36/0x1c0 [ 266.661622] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 266.666675] __kernfs_new_node+0x127/0x8d0 [ 266.667695] Unknown ioctl 1074021761 [ 266.670930] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 266.670950] ? kasan_check_write+0x14/0x20 [ 266.670968] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 266.670983] ? __kernfs_new_node+0x697/0x8d0 [ 266.671002] ? wait_for_completion+0x8a0/0x8a0 [ 266.671022] ? zap_class+0x640/0x640 [ 266.701338] ? kasan_check_write+0x14/0x20 [ 266.705590] ? __lock_is_held+0xb5/0x140 [ 266.709669] ? wait_for_completion+0x8a0/0x8a0 [ 266.714274] ? mutex_unlock+0xd/0x10 [ 266.718016] ? kernfs_activate+0x21a/0x2c0 [ 266.722269] kernfs_new_node+0x95/0x120 [ 266.726258] __kernfs_create_file+0x5a/0x340 [ 266.730685] sysfs_add_file_mode_ns+0x222/0x530 [ 266.735370] internal_create_group+0x3df/0xd80 [ 266.739970] ? remove_files.isra.1+0x190/0x190 [ 266.744557] ? up_write+0x7b/0x220 [ 266.748105] ? down_write_nested+0x130/0x130 [ 266.752518] ? down_read+0x120/0x120 [ 266.756261] sysfs_create_group+0x1f/0x30 [ 266.760416] lo_ioctl+0x1307/0x1d60 [ 266.764055] ? lo_rw_aio+0x1ef0/0x1ef0 [ 266.767953] blkdev_ioctl+0x9ac/0x2010 [ 266.771850] ? blkpg_ioctl+0xc10/0xc10 [ 266.775743] ? lock_downgrade+0x900/0x900 [ 266.779893] ? check_preemption_disabled+0x48/0x280 [ 266.784922] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 266.789857] ? kasan_check_read+0x11/0x20 [ 266.794014] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 266.799298] ? rcu_softirq_qs+0x20/0x20 [ 266.803292] ? __fget+0x4d1/0x740 [ 266.806755] ? ksys_dup3+0x680/0x680 [ 266.810487] block_ioctl+0xee/0x130 [ 266.814124] ? blkdev_fallocate+0x400/0x400 [ 266.818450] do_vfs_ioctl+0x1de/0x1720 [ 266.822345] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 266.827892] ? ioctl_preallocate+0x300/0x300 [ 266.832307] ? __fget_light+0x2e9/0x430 [ 266.836292] ? fget_raw+0x20/0x20 [ 266.839761] ? rcu_read_lock_sched_held+0x14f/0x180 [ 266.844789] ? kmem_cache_free+0x24f/0x290 [ 266.849032] ? putname+0xf7/0x130 [ 266.852495] ? do_syscall_64+0x9a/0x820 [ 266.856476] ? do_syscall_64+0x9a/0x820 [ 266.860458] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 266.865062] ? security_file_ioctl+0x94/0xc0 [ 266.869484] ksys_ioctl+0xa9/0xd0 [ 266.872951] __x64_sys_ioctl+0x73/0xb0 [ 266.876850] do_syscall_64+0x1b9/0x820 [ 266.880742] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 266.886116] ? syscall_return_slowpath+0x5e0/0x5e0 [ 266.891050] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.895903] ? trace_hardirqs_on_caller+0x310/0x310 [ 266.900926] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 266.905959] ? prepare_exit_to_usermode+0x291/0x3b0 [ 266.910987] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.915840] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.921030] RIP: 0033:0x4573d7 [ 266.924250] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.943168] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 266.950883] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004573d7 [ 266.958172] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 266.965441] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 266.972730] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 266.980001] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 01:32:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40100000003, 0x87) sendto$inet6(r0, &(0x7f0000000080), 0xfc00, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) socketpair$inet(0x2, 0x2, 0x7f, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000140)=0x5, 0x4) r2 = getpgid(0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2, 0x4, 0x81, 0x862b, 0x0, 0xfffffffffffffff7, 0x4000, 0x2, 0x1, 0x2, 0x6, 0x8, 0x1000, 0x8000, 0x8, 0x7fffffff, 0xd069, 0x7, 0x8, 0x101, 0x9, 0x9, 0x8001, 0x2, 0x7fffffff, 0x0, 0x6, 0xffff, 0x6, 0xe6, 0x1, 0x7c0cb36, 0x8, 0xfffffffffffffff7, 0x3f, 0x2, 0x0, 0x5e69, 0x4, @perf_config_ext={0x7}, 0x20000, 0x9, 0x0, 0x7, 0x0, 0xd5, 0x7fff}, r2, 0xb, r1, 0x0) 01:32:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xd4}, 0x2c) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x4000, 0x0) accept(r0, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7}], {0x95, 0x0, 0x2000000}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 01:32:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) [ 267.036334] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:48 executing program 3 (fault-call:2 fault-nth:14): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) [ 267.336462] FAULT_INJECTION: forcing a failure. [ 267.336462] name failslab, interval 1, probability 0, space 0, times 0 [ 267.391193] CPU: 0 PID: 8249 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 267.399679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.409049] Call Trace: [ 267.411674] dump_stack+0x244/0x39d [ 267.415327] ? dump_stack_print_info.cold.1+0x20/0x20 [ 267.420539] ? radix_tree_tag_set+0x3d0/0x3d0 [ 267.425070] should_fail.cold.4+0xa/0x17 [ 267.429152] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.434280] ? kernfs_activate+0x8e/0x2c0 [ 267.438444] ? zap_class+0x640/0x640 [ 267.442170] ? lock_release+0xa10/0xa10 [ 267.446157] ? perf_trace_sched_process_exec+0x860/0x860 [ 267.451630] ? find_held_lock+0x36/0x1c0 [ 267.455724] ? __lock_is_held+0xb5/0x140 [ 267.459823] ? perf_trace_sched_process_exec+0x860/0x860 [ 267.465286] ? find_held_lock+0x36/0x1c0 [ 267.469370] __should_failslab+0x124/0x180 [ 267.473622] should_failslab+0x9/0x14 [ 267.477442] kmem_cache_alloc+0x2be/0x730 [ 267.481603] ? find_held_lock+0x36/0x1c0 [ 267.485691] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 267.490727] __kernfs_new_node+0x127/0x8d0 [ 267.494987] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 267.499765] ? kasan_check_write+0x14/0x20 [ 267.504016] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 267.508956] ? __kernfs_new_node+0x697/0x8d0 [ 267.513554] ? wait_for_completion+0x8a0/0x8a0 [ 267.518154] ? zap_class+0x640/0x640 [ 267.521887] ? kasan_check_write+0x14/0x20 [ 267.526141] ? __lock_is_held+0xb5/0x140 [ 267.530218] ? wait_for_completion+0x8a0/0x8a0 [ 267.534830] ? mutex_unlock+0xd/0x10 [ 267.538557] ? kernfs_activate+0x21a/0x2c0 [ 267.542810] kernfs_new_node+0x95/0x120 [ 267.546806] __kernfs_create_file+0x5a/0x340 [ 267.551237] sysfs_add_file_mode_ns+0x222/0x530 [ 267.555928] internal_create_group+0x3df/0xd80 [ 267.560536] ? remove_files.isra.1+0x190/0x190 [ 267.565132] ? up_write+0x7b/0x220 [ 267.568694] ? down_write_nested+0x130/0x130 [ 267.573110] ? down_read+0x120/0x120 [ 267.577023] sysfs_create_group+0x1f/0x30 [ 267.581186] lo_ioctl+0x1307/0x1d60 [ 267.584834] ? lo_rw_aio+0x1ef0/0x1ef0 [ 267.588739] blkdev_ioctl+0x9ac/0x2010 [ 267.592647] ? blkpg_ioctl+0xc10/0xc10 [ 267.596559] ? lock_downgrade+0x900/0x900 [ 267.600717] ? check_preemption_disabled+0x48/0x280 [ 267.605760] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 267.610702] ? kasan_check_read+0x11/0x20 [ 267.614865] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 267.620158] ? rcu_softirq_qs+0x20/0x20 [ 267.620187] ? __fget+0x4d1/0x740 [ 267.620208] ? ksys_dup3+0x680/0x680 [ 267.631366] block_ioctl+0xee/0x130 [ 267.631384] ? blkdev_fallocate+0x400/0x400 [ 267.631401] do_vfs_ioctl+0x1de/0x1720 [ 267.631421] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 267.631440] ? ioctl_preallocate+0x300/0x300 [ 267.653209] ? __fget_light+0x2e9/0x430 [ 267.657197] ? fget_raw+0x20/0x20 [ 267.660760] ? rcu_read_lock_sched_held+0x14f/0x180 [ 267.665796] ? kmem_cache_free+0x24f/0x290 [ 267.670046] ? putname+0xf7/0x130 [ 267.673514] ? do_syscall_64+0x9a/0x820 [ 267.677504] ? do_syscall_64+0x9a/0x820 [ 267.681495] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 267.686094] ? security_file_ioctl+0x94/0xc0 [ 267.690527] ksys_ioctl+0xa9/0xd0 [ 267.694004] __x64_sys_ioctl+0x73/0xb0 [ 267.697910] do_syscall_64+0x1b9/0x820 [ 267.701868] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.707250] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.712190] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.717049] ? trace_hardirqs_on_caller+0x310/0x310 [ 267.722078] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 267.727111] ? prepare_exit_to_usermode+0x291/0x3b0 [ 267.732149] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.737037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.742239] RIP: 0033:0x4573d7 [ 267.745443] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.764353] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 267.772073] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004573d7 [ 267.779358] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 267.786638] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 267.793928] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 267.801205] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 267.823159] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:50 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2a3, &(0x7f0000001180)=[{&(0x7f00000000c0)="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", 0x1fa, 0x6}], 0x0, &(0x7f0000001200)) 01:32:50 executing program 1: msgctl$MSG_INFO(0xffffffffffffffff, 0xc, &(0x7f0000000180)=""/239) r0 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x60) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x2000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000280)={0x401, 0x1, 0x2, 0x7f, 0x7}, 0x14) bind(r0, &(0x7f00000000c0)=@ax25={0x3, {"3756ac5d541fe0"}, 0x7f}, 0x80) 01:32:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40100000003, 0x87) sendto$inet6(r0, &(0x7f0000000080), 0xfc00, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) socketpair$inet(0x2, 0x2, 0x7f, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000140)=0x5, 0x4) r2 = getpgid(0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2, 0x4, 0x81, 0x862b, 0x0, 0xfffffffffffffff7, 0x4000, 0x2, 0x1, 0x2, 0x6, 0x8, 0x1000, 0x8000, 0x8, 0x7fffffff, 0xd069, 0x7, 0x8, 0x101, 0x9, 0x9, 0x8001, 0x2, 0x7fffffff, 0x0, 0x6, 0xffff, 0x6, 0xe6, 0x1, 0x7c0cb36, 0x8, 0xfffffffffffffff7, 0x3f, 0x2, 0x0, 0x5e69, 0x4, @perf_config_ext={0x7}, 0x20000, 0x9, 0x0, 0x7, 0x0, 0xd5, 0x7fff}, r2, 0xb, r1, 0x0) 01:32:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) 01:32:50 executing program 3 (fault-call:2 fault-nth:15): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:50 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x106010000000001, 0x0) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f0000000400), 0x4) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80100, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)=0x0) r3 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000003c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002440)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@rand_addr}}, &(0x7f0000002540)=0xe8) r7 = getgid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000002580)=0x0) fstat(r0, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002640)='/dev/ppp\x00', 0x8000, 0x0) r12 = getpgid(0x0) lstat(&(0x7f0000003380)='./file0\x00', &(0x7f00000033c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003440)={0x0, 0x0, 0x0}, &(0x7f0000003480)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000034c0)=0x0) fstat(r0, &(0x7f0000003500)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000003580)=0x0, &(0x7f00000035c0), &(0x7f0000003600)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003640)={0x0}, &(0x7f0000003680)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000036c0)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000037c0)=0xe8) getgroups(0x1, &(0x7f0000003800)=[0x0]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003840)={0x0}, &(0x7f0000003880)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000038c0)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000039c0)=0xe8) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003e00)=0x0) r25 = geteuid() fstat(r0, &(0x7f0000003e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r27 = getpid() stat(&(0x7f0000003ec0)='./file0\x00', &(0x7f0000003f00)={0x0, 0x0, 0x0, 0x0, 0x0}) r29 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003fc0)={0x0, 0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003f80)='{&ppp0&\x00'}, 0x30) lstat(&(0x7f0000004000)='./file0\x00', &(0x7f0000004040)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000040c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000004280)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f00000000c0)="1e745f780617b814e163036ea38f049f26273fa400a934f0aa0fb9ba1fa7", 0x1e}, {&(0x7f0000001440)="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", 0x1000}, {&(0x7f0000000100)="75e9ff4c0f36c6d34d11800fe6235283adaf41535367e939362776b798ed57cec512758c48c1d1765e5128974b4927b06c4f2ab5d4a3344f8a3125e42d7a18ccf7277630b2d7c91eb0e36c624f29a1e4fdc9088b7d079b0d760a", 0x5a}, {&(0x7f0000000180)="00ae337f16ddffc1c5a534729104e68edee92c74943f6fceca78686f23ba9174fd85a0cf390a0202a877b110aaf27a9a671c90e965cab2cbf3b087de21abadf4770d917f1725c3de7e43442d9b0589f552b610729372ff8b02861b9411fad1", 0x5f}, {&(0x7f0000000200)="a010b2f7c6a6f02bdf60d18389a3c0327301a959cda7ea8207f12a1f59cdbb6feeded33d1a82a2a80fbeb54f7cb7fe2998f73400260a7ab42c418db3f60eae9cc70ab6", 0x43}], 0x6, &(0x7f0000002680)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r11]}], 0x90, 0x4000000}, {&(0x7f0000002740)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000002a40)=[{&(0x7f00000027c0)="d2735232e06bc2f55d66de7203ffc409d5db0df147d8ddb8962743f1653428c5bf85b04f2c8037c4df4b42616b6eca6cbbefe7d5b2a0e276d8ea69b8e082a65f4e85dc58ed", 0x45}, {&(0x7f0000002840)="53681be541e4b1813803ace12de8c121001f3391b6679002b63a76d9fbc8bc534513b45bc37732814f6d81b390a416e552b3df00106ba9700187ef96c3aae5f0c58f7beca166a08a83e730bfc6da8eeaf379da3271061baadc88647cfbfe829f44fc3a9987bfa12c6f7890361df607915a76293777110733133c2afa8681e18b1a741dc2170093a2490e500e32e321c481a844eaad95fc9cddc01ec6a1853a892a063f184758c6c17e2139c48c9f1f", 0xaf}, {&(0x7f0000002900)="273fab6db65cf6fc753bb24ec793f29a9aaa0a7ee458e807c2dc63054fef6f7532d59a792f77e19ff9bdd4b43a2ce1380c41ba6dc0a6cd5a92275add3496c58e7ec278486d8b3160245967b7877155c117de4c20f1742ac7ed4c7ba88a64add808ea1f4be7b429b0b4bc8b1f625b881db01cf7801a5bf567c255faa776b0cb53a53372e93a100092b1af4e962e0c3808c35193826b347287a384a8be7bc17908308b9e992c467aaec791914a6431ab25ecdcdbcad4c395", 0xb7}, {&(0x7f00000029c0)="a71a584f5ab4eb196dc4da23cf17874eeb6d72be90830e216c783712adc7696c873a78ef39b63b2778d84e16c5a4e590ac938d83b8fedd1ce0e844a884011e1d13d9fb4757648e81e3bf6f7656618a982517dce53222", 0x56}], 0x4, &(0x7f0000002a80)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}], 0x28, 0x4000000}, {&(0x7f0000002ac0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000002c00)=[{&(0x7f0000002b40)="2fffe877bbeee84bd023b42985f8a65cbfbb90372c94f03f2676ec8c7d98890ec14989af60fa5a937c6b0dd065c4e77cf9ceb73e9de8ca8c4a0beae454bd8f37a1fc9468d8f983cc0e16511f46d9e0a6b6eed6316c56fc0db5", 0x59}, {&(0x7f0000002bc0)="55f500e768634f310c06f7a1c0a4d339e2b9b94ee0917d986dce2994ee7170501a65492690f479526b6451deb7a3436ccc8bfd0c388a1e646e9d630e", 0x3c}], 0x2, 0x0, 0x0, 0x4238a3466f946419}, {&(0x7f0000002c40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000032c0)=[{&(0x7f0000002cc0)="9a9d5e2c166c2b3d7eb5a2dd8d1962d1fdf664ab6a3a7e80fd93304e23fb922131e87e191b95783f4491fe164185ecdeeee798a78e2da8375b", 0x39}, {&(0x7f0000002d00)="0e653f6aa8c57f22c7dc9eedc64babdcf5a1c820331b391b99823af72e1dcfe65e81c4feeae020d1852301e5f42863177b7aea031ae0214b5ab0ae674b187ed2e4a2e97495ff4a739850435294f53e87e9f2284ecbaa585dd3062e0d5dfd61e4841a5c355c89f576b0cf94b9318f0dc88311c6143373ce10cc0ac831e47bcf2d590fc887562441cf1ad6a262c80e7f0dc4c5ae0c81a69b5b3907fd1ba6327f0ebd57044416fee31b14dcaef48201fbae245dc7c2f2bf613232941439f108428197cab046bc420019ae210f8bcd35c017a1f8495bc13d2106eb912ea446af414177ba60dc80c587f5f5ce6c29a6ea6f0c19f7be2880c03e", 0xf7}, {&(0x7f0000002e00)="e5d2f32fab6bda1ba9bbf67536841500ec38bb697ec66f4678ed311132075c3fcbd8a3027324b443b88ec518abe5ae2706f3f60b39afcea32a480009fd33ab806b584a83aa47d7ebf14165a47846623695e18aca15dcde3b0e84f9314445866ba3713b59e94cadbf17f478b560b9d2498c07f1", 0x73}, {&(0x7f0000002e80)="0ca5441e8f8c88deee6bbe7d0502b3c2f209096c70f22e5e48f89eb8710bf2bcb9d7a85296186ecb7f7bd1fdf544798ddd2a8996887a755299d7efc8a7f13d6af31114947cb8fa7884ecd632c190174cce6b36a869a9ae38649eeb1147a619e4beedc0b12e24a6504aba27062c8dda945183b203aaa1ce9f9f596058393520b192921faa0310b901486133be085d8db378e682bc34b84b5d89a21148e102dd3b0b21453a0cc08d298668c55ea73f880bdb577f128a8f3e4873877d4a8d46df003d1615b68529c416202da70386275a5caa61c45b317e2219c923bfafea4899ecccc3c9df29fd", 0xe6}, {&(0x7f0000002f80)="0b6ef03ee4c123411ea5b64a79530c2125586abde636dfee76e04b0fb2d0fa3b0d41ba24c07c2468d0a32ffeaf5e0d02ef51b2a669192f3cdc0c234c923e890ef760e9d1f0ddd75ea34c3d51e08b061bc2cd65f233cc638006785541e1d84959c8e44dc609d6c2844f47711d712eab4719a608", 0x73}, {&(0x7f0000003000)="9b5e947f6a1c37ba7a432cd0cf8c17d473f3867517d570f3c126ec1def15ac9a9e59009033aa45fc08a79d74078ab843dd0897d636a8e62ccedef755b5c0030cb21140a8747b96ea7df29edb035124847506bc68017d0dd93b", 0x59}, {&(0x7f0000003080)="92946857290325b34050ac9629d9a22bc3f9cf8857ba9df3957b0d1fb9e48d564eeef63373546989451c70a4568daef6b3de95b37407757ebf555f8161075f43295abcaa3069b90bd7c87c80af4cecfdfc6c300aea22a705a564bb977f21410037c65e704bc89319a338fce3098e6d489b3650b0f01a2d1e72c8c5d8a1c0a4d9eab4e6ccbb126d27466e96261271bf3409bfdc80792398fbf00aa29aaa92e5cfd5e48cf0e368c96dd7fea54f1c170596ac0a75914ba46701f05d4b950372e1e541da7ed38e4b9bd80b2f443b723cf8ea12348f3a78c8e39618ae1f9796df96651cf8c82337ef1d2b52eea35fb0bab4291646d8", 0xf3}, {&(0x7f0000003180)="47e9111e29ce4f1bddaf22aa6a084362c66d9625235d24f6729d201f6e", 0x1d}, {&(0x7f00000031c0)="b5285de11f4b36823afa65f819801ae9da47f7a6350f681b184b5fab7caaac5ad625befd67cd2df89ef6d8b6bcd1be964daf8b80e28808c9ccbeeb68e3c78588e9cc966706c4f336c9368b434c314801385d8bcf28d1b8acc945875e21bb1aac8dee4a225b16ac2d4e1d32e3d03d7db3e40d476f15cc4cac2e9517ce750a0ed9b82472bfc1a34738ca29f1eff5bb6ff003e30ba2db9cd5b8d3a0f49661b158b30bf86c865db3520c68b83d1523", 0xad}, {&(0x7f0000003280)="b18b4e829cd4a4fad2cbb631b855323197d82aecbb4a57350a5ddc4600f2ba7f4139d7f98668f05e", 0x28}], 0xa, &(0x7f0000003ac0)=[@cred={0x20, 0x1, 0x2, r12, r13, r14}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r21, r22, r23}], 0xa8, 0x1}, {&(0x7f0000003b80)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003dc0)=[{&(0x7f0000003c00)="62a7f077d4acf057efd378a574c8e590ecef3f71ef3436c69522fadfde16f5a848c63a5abe17b80b675206ac79eccdaf31696a6741c05403ef8ec614bffb472354135b3d9449d3bd7f9cfe73689f59de47c012cebc1669131cb8c67a15527a3144799431fbd62e99c8b715b2f370f50e8dee143965ac600dc66077eb1816708d0f51dfdb17f3602d88ba0d0c2996a2e30d87428c227cfb2597420733d63a405698f23a75", 0xa4}, {&(0x7f0000003cc0)="133a4c4174e7a6dc12ff943c83bea1888713e3b2924c03d51569cb2237019e7cf74cb2047e949ee8947551f67e14463bdd7ec15069ba80d3", 0x38}, {&(0x7f0000003d00)="8f34b3d990c78649dbe58cc62dec740ea856fdce9162c3af283defe6a9f3d07289f4ab4151fcb8b89956db92a2be244530f841a16adbc0d39bfe2e", 0x3b}, {&(0x7f0000003d40)="f7f3b333a8b96ac20ae15342e1167380777198f306875c3f69880e215806db18d28d7f16948fdd86e7bfcb43c8a3088f9369e0a7eac3deeb8bf5a60c4d21c3cc9d09635a06863f5b031274356b193685d41f1669e9cf7622302a696e66ff696195eaa26645ce649d23ea054513caa1be10ab2684d6eabf175f4010", 0x7b}], 0x4, &(0x7f0000004140)=[@cred={0x20, 0x1, 0x2, r24, r25, r26}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r27, r28, r29}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r30, r31, r32}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}], 0x138, 0x1}], 0x5, 0x1) [ 268.707504] FAULT_INJECTION: forcing a failure. [ 268.707504] name failslab, interval 1, probability 0, space 0, times 0 [ 268.746265] CPU: 0 PID: 8264 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 268.754737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.764109] Call Trace: [ 268.766726] dump_stack+0x244/0x39d [ 268.770391] ? dump_stack_print_info.cold.1+0x20/0x20 [ 268.775615] should_fail.cold.4+0xa/0x17 [ 268.779710] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.784831] ? lock_release+0xa10/0xa10 [ 268.788816] ? perf_trace_sched_process_exec+0x860/0x860 [ 268.794289] ? zap_class+0x640/0x640 [ 268.798030] ? find_held_lock+0x36/0x1c0 [ 268.802108] ? __lock_is_held+0xb5/0x140 [ 268.806197] ? perf_trace_sched_process_exec+0x860/0x860 [ 268.811667] ? kernfs_activate+0x21a/0x2c0 [ 268.815924] __should_failslab+0x124/0x180 [ 268.820175] should_failslab+0x9/0x14 [ 268.823993] kmem_cache_alloc+0x2be/0x730 [ 268.828153] ? lock_downgrade+0x900/0x900 [ 268.832317] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 268.837354] __kernfs_new_node+0x127/0x8d0 [ 268.841611] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 268.846388] ? zap_class+0x640/0x640 [ 268.850124] ? __lock_is_held+0xb5/0x140 [ 268.854201] ? wait_for_completion+0x8a0/0x8a0 [ 268.858808] ? mutex_unlock+0xd/0x10 [ 268.862533] ? kernfs_activate+0x21a/0x2c0 [ 268.866789] ? kernfs_walk_and_get_ns+0x340/0x340 [ 268.871658] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 268.877208] ? kernfs_link_sibling+0x1d2/0x3b0 [ 268.881821] kernfs_new_node+0x95/0x120 [ 268.885817] __kernfs_create_file+0x5a/0x340 [ 268.890244] sysfs_add_file_mode_ns+0x222/0x530 [ 268.894937] internal_create_group+0x3df/0xd80 [ 268.899545] ? remove_files.isra.1+0x190/0x190 [ 268.904139] ? up_write+0x7b/0x220 [ 268.907698] ? down_write_nested+0x130/0x130 [ 268.912118] ? down_read+0x120/0x120 [ 268.915859] sysfs_create_group+0x1f/0x30 [ 268.920023] lo_ioctl+0x1307/0x1d60 [ 268.923681] ? lo_rw_aio+0x1ef0/0x1ef0 [ 268.927590] blkdev_ioctl+0x9ac/0x2010 [ 268.931497] ? blkpg_ioctl+0xc10/0xc10 [ 268.935398] ? lock_downgrade+0x900/0x900 [ 268.939557] ? check_preemption_disabled+0x48/0x280 [ 268.944596] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 268.949538] ? kasan_check_read+0x11/0x20 [ 268.953751] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 268.959050] ? rcu_softirq_qs+0x20/0x20 [ 268.963048] ? __fget+0x4d1/0x740 [ 268.966522] ? ksys_dup3+0x680/0x680 [ 268.970259] block_ioctl+0xee/0x130 [ 268.973900] ? blkdev_fallocate+0x400/0x400 [ 268.978412] do_vfs_ioctl+0x1de/0x1720 [ 268.982317] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 268.987869] ? ioctl_preallocate+0x300/0x300 [ 268.987889] ? __fget_light+0x2e9/0x430 [ 268.987906] ? fget_raw+0x20/0x20 [ 268.987924] ? rcu_read_lock_sched_held+0x14f/0x180 [ 268.987944] ? kmem_cache_free+0x24f/0x290 [ 268.996327] ? putname+0xf7/0x130 [ 269.012465] ? do_syscall_64+0x9a/0x820 [ 269.016455] ? do_syscall_64+0x9a/0x820 [ 269.020445] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 269.025045] ? security_file_ioctl+0x94/0xc0 [ 269.029732] ksys_ioctl+0xa9/0xd0 [ 269.033209] __x64_sys_ioctl+0x73/0xb0 [ 269.037110] do_syscall_64+0x1b9/0x820 [ 269.041006] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 269.046389] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.051332] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.056195] ? trace_hardirqs_on_caller+0x310/0x310 [ 269.061226] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 269.066255] ? prepare_exit_to_usermode+0x291/0x3b0 [ 269.071293] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.076159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.081357] RIP: 0033:0x4573d7 [ 269.084559] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:32:50 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x200043, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xfffffffffffffff9) poll(&(0x7f00000000c0)=[{r1, 0x200}, {r1, 0x200}, {r1, 0x2}, {r1}], 0x4, 0x5) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x2) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, 0xffffffffffffffff) 01:32:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) 01:32:50 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) tee(r0, r0, 0x7, 0x1) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x101000, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) ioctl$FIONREAD(r1, 0x541b, &(0x7f00000001c0)) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000000f, 0x0) [ 269.103474] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 269.111281] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004573d7 [ 269.118560] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 269.125839] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 269.133122] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 269.140403] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 01:32:51 executing program 1: r0 = socket$inet6(0xa, 0x1080005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d196070") r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x84000, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) getsockopt$nfc_llcp(r2, 0x118, 0x2, &(0x7f0000000140)=""/233, 0xe9) getsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000651000)=""/240, &(0x7f0000ca5ffc)=0xf0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400040, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r3, 0x5386, &(0x7f0000000080)) [ 269.182560] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) [ 269.276880] XFS (loop5): Invalid superblock magic number 01:32:51 executing program 3 (fault-call:2 fault-nth:16): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) [ 269.417512] FAULT_INJECTION: forcing a failure. [ 269.417512] name failslab, interval 1, probability 0, space 0, times 0 [ 269.432181] CPU: 1 PID: 8321 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 269.440835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.450477] Call Trace: [ 269.453087] dump_stack+0x244/0x39d [ 269.456988] ? dump_stack_print_info.cold.1+0x20/0x20 [ 269.462807] should_fail.cold.4+0xa/0x17 [ 269.466890] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.472010] ? lock_release+0xa10/0xa10 [ 269.476205] ? perf_trace_sched_process_exec+0x860/0x860 [ 269.481688] ? zap_class+0x640/0x640 [ 269.485428] ? find_held_lock+0x36/0x1c0 [ 269.489507] ? __lock_is_held+0xb5/0x140 [ 269.489539] ? perf_trace_sched_process_exec+0x860/0x860 [ 269.489559] ? kernfs_activate+0x21a/0x2c0 [ 269.499246] __should_failslab+0x124/0x180 [ 269.499276] should_failslab+0x9/0x14 [ 269.499296] kmem_cache_alloc+0x2be/0x730 [ 269.511544] ? lock_downgrade+0x900/0x900 [ 269.511566] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 269.511592] __kernfs_new_node+0x127/0x8d0 [ 269.519889] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 269.533870] ? zap_class+0x640/0x640 [ 269.537617] ? __lock_is_held+0xb5/0x140 [ 269.541704] ? wait_for_completion+0x8a0/0x8a0 [ 269.546312] ? mutex_unlock+0xd/0x10 [ 269.550045] ? kernfs_activate+0x21a/0x2c0 [ 269.554304] ? kernfs_walk_and_get_ns+0x340/0x340 [ 269.559167] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 269.564720] ? kernfs_link_sibling+0x1d2/0x3b0 [ 269.569328] kernfs_new_node+0x95/0x120 [ 269.573318] __kernfs_create_file+0x5a/0x340 [ 269.578245] sysfs_add_file_mode_ns+0x222/0x530 [ 269.582933] internal_create_group+0x3df/0xd80 [ 269.587532] ? remove_files.isra.1+0x190/0x190 [ 269.592115] ? up_write+0x7b/0x220 [ 269.595669] ? down_write_nested+0x130/0x130 [ 269.600082] ? down_read+0x120/0x120 [ 269.603841] sysfs_create_group+0x1f/0x30 [ 269.608002] lo_ioctl+0x1307/0x1d60 [ 269.611668] ? lo_rw_aio+0x1ef0/0x1ef0 [ 269.615565] blkdev_ioctl+0x9ac/0x2010 [ 269.619458] ? blkpg_ioctl+0xc10/0xc10 [ 269.623352] ? lock_downgrade+0x900/0x900 [ 269.627502] ? check_preemption_disabled+0x48/0x280 [ 269.632529] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 269.637462] ? kasan_check_read+0x11/0x20 [ 269.641614] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 269.646899] ? rcu_softirq_qs+0x20/0x20 [ 269.650892] ? __fget+0x4d1/0x740 [ 269.654357] ? ksys_dup3+0x680/0x680 [ 269.658088] block_ioctl+0xee/0x130 [ 269.661721] ? blkdev_fallocate+0x400/0x400 [ 269.666048] do_vfs_ioctl+0x1de/0x1720 [ 269.669951] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 269.675502] ? ioctl_preallocate+0x300/0x300 [ 269.679913] ? __fget_light+0x2e9/0x430 [ 269.683913] ? fget_raw+0x20/0x20 [ 269.687386] ? rcu_read_lock_sched_held+0x14f/0x180 [ 269.692406] ? kmem_cache_free+0x24f/0x290 [ 269.696647] ? putname+0xf7/0x130 [ 269.700724] ? do_syscall_64+0x9a/0x820 [ 269.704703] ? do_syscall_64+0x9a/0x820 [ 269.708691] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 269.713287] ? security_file_ioctl+0x94/0xc0 [ 269.717710] ksys_ioctl+0xa9/0xd0 [ 269.721175] __x64_sys_ioctl+0x73/0xb0 [ 269.725072] do_syscall_64+0x1b9/0x820 [ 269.728960] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 269.734329] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.739275] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.744125] ? trace_hardirqs_on_caller+0x310/0x310 [ 269.749168] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 269.754207] ? prepare_exit_to_usermode+0x291/0x3b0 [ 269.759231] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.764092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.769287] RIP: 0033:0x4573d7 [ 269.772489] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.791483] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 269.799195] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004573d7 [ 269.806467] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 01:32:51 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000040)={0x5, 0x3, 0xfff, {}, 0x5, 0x4}) ioctl$TCXONC(r0, 0x540a, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000100)=""/110, 0x6e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f00007a8000)={&(0x7f0000000000)={0x14, 0x3, 0x1, 0xffffffffffffffff, 0x0, 0x40030000000000, {0xf0ffffffffffff}}, 0x14}, 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f00000000c0)={0x1, 0xd16, 0x34}) 01:32:51 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) tee(r0, r0, 0x7, 0x1) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x101000, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) ioctl$FIONREAD(r1, 0x541b, &(0x7f00000001c0)) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000000f, 0x0) 01:32:51 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x800, 0x0) pread64(r0, &(0x7f0000000280)=""/215, 0xd7, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000100)={0x6, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f0000000940)=""/4096, &(0x7f0000000140)=0x1000) socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0xa, 0x522000000004, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0) io_setup(0x0, &(0x7f0000000000)=0x0) io_destroy(r2) 01:32:51 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x4, 0xa4002) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000001c0)=0x1000020, 0x4) r1 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) pread64(r1, &(0x7f0000000080)=""/138, 0x8a, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$int_in(r2, 0xab07, &(0x7f0000000140)) pread64(r1, &(0x7f0000000200)=""/4096, 0x1000, 0x0) close(r2) 01:32:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) [ 269.813742] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 269.821015] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 269.828286] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 269.839046] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:51 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000080)={0x66, &(0x7f0000000100)="5ac2aa173af4e2bfb4e443d4cfa953f783af4fec8cd9edc77bc917aa0df9c365380e2808603e82ea68e4ab2be9789011f599c926a1c101879cad4c838dc981a2e70572c4a482012b10b6bd688bc3b59688dd910bd599a1d058c58c88de48730f14a6fd28738d"}) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x5) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40001, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) ioctl$KIOCSOUND(r2, 0x4b2f, 0xffffffff) 01:32:51 executing program 3 (fault-call:2 fault-nth:17): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:51 executing program 0: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000005c0)=0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000600)) getgroups(0x2, &(0x7f0000000140)=[0x0, 0xffffffffffffffff]) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:ptchown_exec_t:s0\x00', 0x24, 0x0) keyctl$chown(0x4, r0, 0x0, r2) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f00000001c0)) 01:32:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) 01:32:51 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x201, 0xc000000100079) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) ioctl$KVM_CREATE_VCPU(r0, 0x4008550d, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x4002, 0x0) 01:32:52 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xea54, 0x400) sendto(r0, &(0x7f00000003c0)="f7417cceab77e81f9eda9bda29d3e97172ec50815be10aa67ef0b9ab0b9a4e3145258bb9aaae40800ca2042fd91e8d7190cb28c8957a2631479c92329ad45a320e02351c341d", 0x265, 0x4, 0x0, 0x92) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000548000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40102, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000100)='./file0\x00', r4}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) dup2(r2, 0xffffffffffffffff) splice(0xffffffffffffffff, &(0x7f0000000340), 0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x80000, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r1) fcntl$setpipe(r5, 0x407, 0x9) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x40010, r2, 0x0) inotify_init() r7 = syz_open_procfs(r3, &(0x7f0000000040)='status\x00') preadv(r7, &(0x7f0000000480), 0x100000000000019e, 0x0) 01:32:52 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x15, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x1a7) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000340)=0x100000000) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f00000003c0)=""/85, &(0x7f0000000140)=0x55) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/qat_adf_ctl\x00', 0x600001, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000740)={@local}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000005c0)) write$P9_RSTAT(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="580000007d010000009480e2d3294190955cb04d635c92715100c40006000000000200000006000000000000"], 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) sendto$inet6(r0, &(0x7f0000000840)="9a5010f43aa5cb0de41b127765ed273384eebc9a2060447d7da6edb22d7ac92fe75c1596e580354dd56f5a12ae3b0f8d8486b8bf4f04110250c6d27a274583c183670c1f767600b8f98548506755bdc43f5d4cd52904c4fb41652b542927074d4c63aa7bb6ab036572bf872e497eefa93f4012aa3b43d378347ca6d7504ba39098d13e665643f4bc1dcbd59acffdc169070ae9454668fe9d60489796fd2994079dd6fd1037a8b2b98e8900163b7f5774f7fb2c9ac8", 0xb5, 0x40, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x40}, 0x8) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() readahead(r1, 0x3f, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) [ 270.500487] FAULT_INJECTION: forcing a failure. [ 270.500487] name failslab, interval 1, probability 0, space 0, times 0 [ 270.579687] CPU: 1 PID: 8373 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 270.588163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.597524] Call Trace: [ 270.600141] dump_stack+0x244/0x39d [ 270.603795] ? dump_stack_print_info.cold.1+0x20/0x20 [ 270.609028] should_fail.cold.4+0xa/0x17 [ 270.613112] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.618232] ? lock_release+0xa10/0xa10 [ 270.622231] ? perf_trace_sched_process_exec+0x860/0x860 [ 270.627712] ? zap_class+0x640/0x640 [ 270.631447] ? find_held_lock+0x36/0x1c0 [ 270.635530] ? __lock_is_held+0xb5/0x140 [ 270.639615] ? perf_trace_sched_process_exec+0x860/0x860 [ 270.645085] ? kernfs_activate+0x21a/0x2c0 [ 270.649344] __should_failslab+0x124/0x180 [ 270.653599] should_failslab+0x9/0x14 [ 270.657418] kmem_cache_alloc+0x2be/0x730 [ 270.661578] ? lock_downgrade+0x900/0x900 [ 270.661599] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 270.661619] __kernfs_new_node+0x127/0x8d0 [ 270.675021] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 270.679790] ? zap_class+0x640/0x640 [ 270.683530] ? __lock_is_held+0xb5/0x140 [ 270.687608] ? wait_for_completion+0x8a0/0x8a0 [ 270.692220] ? mutex_unlock+0xd/0x10 [ 270.695957] ? kernfs_activate+0x21a/0x2c0 [ 270.700210] ? kernfs_walk_and_get_ns+0x340/0x340 [ 270.705072] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 270.710626] ? kernfs_link_sibling+0x1d2/0x3b0 [ 270.715240] kernfs_new_node+0x95/0x120 [ 270.719245] __kernfs_create_file+0x5a/0x340 [ 270.723687] sysfs_add_file_mode_ns+0x222/0x530 [ 270.728384] internal_create_group+0x3df/0xd80 [ 270.733003] ? remove_files.isra.1+0x190/0x190 [ 270.737601] ? up_write+0x7b/0x220 [ 270.741154] ? down_write_nested+0x130/0x130 [ 270.745573] ? down_read+0x120/0x120 [ 270.749321] sysfs_create_group+0x1f/0x30 [ 270.753490] lo_ioctl+0x1307/0x1d60 [ 270.757140] ? lo_rw_aio+0x1ef0/0x1ef0 [ 270.761046] blkdev_ioctl+0x9ac/0x2010 [ 270.764950] ? blkpg_ioctl+0xc10/0xc10 [ 270.768851] ? lock_downgrade+0x900/0x900 [ 270.773013] ? check_preemption_disabled+0x48/0x280 [ 270.778049] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 270.782992] ? kasan_check_read+0x11/0x20 [ 270.787153] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 270.792443] ? rcu_softirq_qs+0x20/0x20 [ 270.796449] ? __fget+0x4d1/0x740 [ 270.799933] ? ksys_dup3+0x680/0x680 [ 270.803689] block_ioctl+0xee/0x130 [ 270.807331] ? blkdev_fallocate+0x400/0x400 [ 270.811678] do_vfs_ioctl+0x1de/0x1720 [ 270.815586] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 270.821143] ? ioctl_preallocate+0x300/0x300 [ 270.825563] ? __fget_light+0x2e9/0x430 [ 270.829548] ? fget_raw+0x20/0x20 [ 270.833018] ? rcu_read_lock_sched_held+0x14f/0x180 [ 270.838045] ? kmem_cache_free+0x24f/0x290 [ 270.842297] ? putname+0xf7/0x130 [ 270.845767] ? do_syscall_64+0x9a/0x820 [ 270.849754] ? do_syscall_64+0x9a/0x820 [ 270.853742] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 270.858342] ? security_file_ioctl+0x94/0xc0 [ 270.862773] ksys_ioctl+0xa9/0xd0 [ 270.866247] __x64_sys_ioctl+0x73/0xb0 [ 270.870157] do_syscall_64+0x1b9/0x820 [ 270.874058] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 270.879435] ? syscall_return_slowpath+0x5e0/0x5e0 [ 270.884384] ? trace_hardirqs_on_caller+0x310/0x310 [ 270.889415] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 270.894505] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 270.901212] ? __switch_to_asm+0x40/0x70 [ 270.905287] ? __switch_to_asm+0x34/0x70 [ 270.909374] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.914241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.919445] RIP: 0033:0x4573d7 [ 270.922663] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.941579] RSP: 002b:00007f1f25953a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 270.949300] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004573d7 [ 270.956581] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 270.963860] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 270.971138] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 270.978417] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 01:32:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="c744240006000000c744240200000080c7442406000000000f01142466b8c2008ec80f070f0f369a0f2002674669f9c12c000026660f38157e0f660f0dbead00000066baf80cb8bcecb281ef66bafc0cb80b000000ef0f20d835080000000f22d8", 0x61}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x0, "184432a6eeb0a0dc"}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x10003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000240)='ppp0(.-,eth0:/security\x00', 0xfffffffffffffff8) keyctl$invalidate(0x15, r3) 01:32:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) 01:32:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000080)={0x8, 0x4, 0x2, @broadcast, 'veth1_to_team\x00'}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000000c0)={0xf000, 0x1000}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000200)=""/185, &(0x7f0000000100)=0xb9) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'veth1\x00', &(0x7f0000000140)=@ethtool_gstrings={0x1b, 0x1}}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 01:32:52 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000900)=ANY=[], 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)="6e65742f6970365f7461626c65735f6d5ad400") sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) recvfrom$inet6(r1, &(0x7f0000000100)=""/200, 0xc8, 0x40000000, &(0x7f0000000200)={0xa, 0x4e23, 0x7, @mcast2, 0x2}, 0x1c) preadv(r0, &(0x7f0000000a80)=[{&(0x7f0000000300)=""/27}, {&(0x7f0000000340)=""/173}, {&(0x7f0000000400)=""/235}, {&(0x7f0000000500)=""/249}, {&(0x7f0000000600)=""/233}, {&(0x7f0000000700)=""/141}, {&(0x7f0000000b40)=""/204}, {&(0x7f00000008c0)}, {&(0x7f0000000900)=""/123}, {&(0x7f0000000980)=""/240}], 0x562, 0x0) [ 271.038077] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) 01:32:53 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r0, 0x0) r3 = accept4(r2, &(0x7f0000000100)=@ipx, &(0x7f0000000180)=0x80, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000200)=0x4) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x2}}, 0x0, 0x0, r0, 0xb) 01:32:53 executing program 3 (fault-call:2 fault-nth:18): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:53 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x3, 0x200000000100) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x4, r0}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000061182c000000000000000000000000009500000000000000c76949ea825fb213d37eac9433345a6a019aa3633cc1f23d9e14ee86430904687e644bb21ed7a84e3a257826956185be22cac352c4adb6529b16f44a510eda29b23b1830877153c1f370e62b7a14847e157c06b820538477dd85d162bad866731fbc566b9e20f4a334357aa5f75e39103349409937f394ea16f194b16363d8d8"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) r2 = socket(0x1f, 0x2, 0x10001) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000040)=0xc00000000) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000380)={'filter\x00'}, &(0x7f0000000400)=0x15f771115eed9f04) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)=0x0) syz_open_procfs$namespace(r3, &(0x7f0000000240)='ns/cgroup\x00') 01:32:53 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/audio\x00', 0x2000, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0xe6, 0x0, 0x88, 0x1, r0, 0x9}, 0x2c) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='@\x00', r1}, 0x10) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{}, {}]}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000300)) 01:32:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x84, @local, 0x0, 0x1, 'lblcr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000080)={0x84, @broadcast, 0x0, 0x1, 'ovf\x00'}, 0x2c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x10001}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x400, 0x8006, 0x0, 0x3, 0x7fffffff, 0x3, 0x100000000, r3}, 0x20) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xc0, r4, 0x4, 0x70bd2a, 0x4, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_team\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x62}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x11}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2644}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffe}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1ff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x800}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x84}, 0x80) 01:32:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000440)=""/90) 01:32:53 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x81) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/43, 0x2b}], 0x1) ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000180)=0x5) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x5, 0x5, 0x20d, 0x9, 0xfffffffffffeffff, 0x509f, 0x7fffffff, 0x4, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x4e23, @local}}}, 0x84) ioctl$int_in(r0, 0x80000040045010, &(0x7f00000000c0)) getsockopt$inet_mreq(r0, 0x0, 0x0, &(0x7f0000000300)={@empty, @multicast1}, &(0x7f0000000340)=0x8) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x10000, 0x0) getsockopt$inet_int(r0, 0x0, 0x16, &(0x7f0000000140), &(0x7f00000001c0)=0xfffffffffffffdb9) [ 271.425847] FAULT_INJECTION: forcing a failure. [ 271.425847] name failslab, interval 1, probability 0, space 0, times 0 [ 271.454031] CPU: 1 PID: 8423 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 271.462489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.471857] Call Trace: [ 271.474462] dump_stack+0x244/0x39d [ 271.478105] ? dump_stack_print_info.cold.1+0x20/0x20 [ 271.483323] should_fail.cold.4+0xa/0x17 [ 271.487403] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.492517] ? lock_release+0xa10/0xa10 [ 271.496512] ? perf_trace_sched_process_exec+0x860/0x860 [ 271.501982] ? zap_class+0x640/0x640 [ 271.505729] ? find_held_lock+0x36/0x1c0 [ 271.509800] ? __lock_is_held+0xb5/0x140 [ 271.513885] ? perf_trace_sched_process_exec+0x860/0x860 [ 271.519339] ? kernfs_activate+0x21a/0x2c0 [ 271.523592] __should_failslab+0x124/0x180 [ 271.527838] should_failslab+0x9/0x14 [ 271.531645] kmem_cache_alloc+0x2be/0x730 [ 271.535813] ? lock_downgrade+0x900/0x900 [ 271.539971] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 271.544999] __kernfs_new_node+0x127/0x8d0 [ 271.549244] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 271.554020] ? zap_class+0x640/0x640 [ 271.557751] ? __lock_is_held+0xb5/0x140 [ 271.561820] ? wait_for_completion+0x8a0/0x8a0 [ 271.566426] ? mutex_unlock+0xd/0x10 [ 271.570150] ? kernfs_activate+0x21a/0x2c0 [ 271.574860] ? kernfs_walk_and_get_ns+0x340/0x340 [ 271.579721] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 271.585269] ? kernfs_link_sibling+0x1d2/0x3b0 [ 271.589865] kernfs_new_node+0x95/0x120 [ 271.593857] __kernfs_create_file+0x5a/0x340 [ 271.598286] sysfs_add_file_mode_ns+0x222/0x530 [ 271.602976] internal_create_group+0x3df/0xd80 [ 271.607580] ? remove_files.isra.1+0x190/0x190 [ 271.612169] ? up_write+0x7b/0x220 [ 271.615716] ? down_write_nested+0x130/0x130 [ 271.620131] ? down_read+0x120/0x120 [ 271.623871] sysfs_create_group+0x1f/0x30 [ 271.628031] lo_ioctl+0x1307/0x1d60 [ 271.631682] ? lo_rw_aio+0x1ef0/0x1ef0 [ 271.635603] blkdev_ioctl+0x9ac/0x2010 [ 271.639502] ? blkpg_ioctl+0xc10/0xc10 [ 271.643397] ? lock_downgrade+0x900/0x900 [ 271.647548] ? check_preemption_disabled+0x48/0x280 [ 271.652582] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 271.657521] ? kasan_check_read+0x11/0x20 [ 271.661686] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 271.666972] ? rcu_softirq_qs+0x20/0x20 [ 271.670969] ? __fget+0x4d1/0x740 [ 271.674434] ? ksys_dup3+0x680/0x680 [ 271.678171] block_ioctl+0xee/0x130 [ 271.681804] ? blkdev_fallocate+0x400/0x400 [ 271.686132] do_vfs_ioctl+0x1de/0x1720 [ 271.690029] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 271.695576] ? ioctl_preallocate+0x300/0x300 [ 271.699994] ? __fget_light+0x2e9/0x430 [ 271.703979] ? fget_raw+0x20/0x20 [ 271.707439] ? rcu_read_lock_sched_held+0x14f/0x180 [ 271.712464] ? kmem_cache_free+0x24f/0x290 [ 271.716705] ? putname+0xf7/0x130 [ 271.720170] ? do_syscall_64+0x9a/0x820 [ 271.724149] ? do_syscall_64+0x9a/0x820 [ 271.728132] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 271.732723] ? security_file_ioctl+0x94/0xc0 [ 271.737140] ksys_ioctl+0xa9/0xd0 [ 271.740604] __x64_sys_ioctl+0x73/0xb0 [ 271.744503] do_syscall_64+0x1b9/0x820 [ 271.748396] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 271.753771] ? syscall_return_slowpath+0x5e0/0x5e0 [ 271.758709] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.763559] ? trace_hardirqs_on_caller+0x310/0x310 [ 271.768583] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 271.773636] ? prepare_exit_to_usermode+0x291/0x3b0 [ 271.778686] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.783547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.788741] RIP: 0033:0x4573d7 [ 271.791944] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.810849] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 271.818563] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004573d7 01:32:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e20, @local}, 0x10) r1 = socket(0x9, 0x5, 0x5) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000980)={'nr0\x00', {0x2, 0x4e21}}) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f00000000c0)=0x3, 0x4) r2 = socket(0x840000000002, 0x3, 0xff) recvmsg(r2, &(0x7f0000000880)={&(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000b80)=""/24, 0xffffffffffffffbe}, {&(0x7f00000003c0)=""/93, 0x5d}, {&(0x7f0000000600)=""/70, 0x46}, {&(0x7f0000000300)=""/61, 0x3d}, {&(0x7f0000000680)=""/115, 0x73}, {&(0x7f0000000700)=""/132, 0x84}], 0x6, &(0x7f0000000a80)=""/17, 0x11, 0xffffffff80000001}, 0x10000) getsockname$inet6(r2, &(0x7f0000000a00), &(0x7f0000000a40)=0x1c) r4 = socket$inet6(0xa, 0x80003, 0x800020000000007) ioctl(r4, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") getsockopt$inet_pktinfo(r2, 0x0, 0xb, &(0x7f0000000140)={0x0, @rand_addr, @rand_addr}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000500)=""/211, &(0x7f0000000180)=0xd3) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000940)={@mcast2, 0x12, r5}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mtu(r6, 0x29, 0x17, &(0x7f00000008c0), &(0x7f0000000900)=0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000300000000000000000000009500020000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r8 = socket$kcm(0x29, 0x7, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000007c0), &(0x7f0000000bc0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000009c0), 0x8dafb8509941231e) write$binfmt_aout(r0, &(0x7f0000000ac0)=ANY=[@ANYRESDEC=r7], 0x432) ioctl$sock_kcm_SIOCKCMATTACH(r8, 0x89e0, &(0x7f0000000000)={r0, r7}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000800)={'veth0_to_bridge\x00', @local}) recvmmsg(r8, &(0x7f0000006400)=[{{&(0x7f0000001f00)=@can, 0x80, &(0x7f0000002140)=[{&(0x7f0000001f80)=""/58, 0x3a}], 0x1, &(0x7f0000002180)=""/88, 0x58}}], 0x500, 0x0, &(0x7f00000065c0)={0x0, r9+30000000}) 01:32:53 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) socketpair(0xa, 0x800, 0x8, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000040)=0x64f, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_proto_private(r0, 0x89e0, &(0x7f0000000200)) [ 271.825834] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 271.833116] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 271.840387] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 271.847681] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 01:32:53 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3ad) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000000)) setresuid(0x0, r3, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000) 01:32:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000440)=""/90) [ 271.928301] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:53 executing program 4: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000200), &(0x7f00000002c0)=0xc) r0 = socket$inet(0x2b, 0x1, 0x0) r1 = request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='vmnet1vmnet0cpusettrustedvboxnet0#keyringselinuxvboxnet1mime_type\x00', 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='*wlan1usermime_type\x00', 0xfffffffffffffffa) keyctl$reject(0x13, r1, 0x100000000, 0xfff, r2) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr}, 0xfffffffffffffeed) recvmmsg(r0, &(0x7f0000000b00)=[{{&(0x7f00000009c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x0, &(0x7f0000000ac0), 0x0, 0x0, 0x0, 0x81}}], 0x2f0, 0x0, &(0x7f0000001000)) [ 272.007282] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:32:53 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x2) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") dup(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000440), 0x2, 0xb}}, 0x20) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x20000c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000540)=0x65, 0x3) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @broadcast}, 0x10) get_thread_area(&(0x7f0000000180)={0xfffffffffffffffc, 0x0, 0x1000, 0x0, 0x0, 0x800005, 0x2, 0x8, 0x1f, 0xd41}) setsockopt$inet_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x3f8, 0x4) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0xfffffffffffffff9, 0x400000) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000280)) bind$alg(r4, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0xd470041877f0fcc9) sendto$inet(r2, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r2, 0x1) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") memfd_create(&(0x7f0000033ff3)='\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) pwritev(r0, &(0x7f00000003c0)=[{&(0x7f0000000000)="679d8be014628f352763e41eb70b51a8d2ea9bcccc97bb75cb76864ee71b01871899528b795b3dc907d4d9deee59e8a9b6351dda39ec739a9fd5", 0x3a}, {&(0x7f0000000040)="d8c81c02ff2c2c26d19cfaa405d12de0a0f0becc1a68991e655facfd835ed9fd7fd56c0d6165bd96f65d8cb47e4eb315500b8950ce44cdfd2b1571fe93d282951bf2519b6cdf147c47a3a58443ea2854ee03c2a1bd5cf33733e27e26b5f55b562e15c1ac2a10a63b5adcbaac31cd2727d70aea70ca1b7b082efe5a0e2143d6cc01066ca649442463a5cf90afd168619f074a903ce88b95dcf5a8d2bf5ddb0d2d2565", 0xa2}, {&(0x7f0000000100)="3ad86e854d28dc91e3eb5b9218a3624d9d3d4b3ffbbdd861a25e6e94283c48924c0dfd493ff9b8d42f25ee006b2beffe2668721f3729d7f7bba9ab3fea991ce1ff42caf50a49b579cc0dba8a1af04e9cd80602e0b5c1779e57fc41231e1afed7d3161d7f3b6623fca480", 0x6a}, {&(0x7f0000000180)="eac230", 0x3}, {&(0x7f00000001c0)="ec8a1c110da51e1911737ef4d76afe64f2374cedf43aa607fa7e24e0b799f6293025b690c6de37cd2599d5e69bc17caab39c6be73d6234876dc469e8bb4deba8340f7be6722fa12b9298ee02b65227e6801826c5b51109a60509ac5efa4b2a7a69a2a4500e518e2850492bd53d47fe954c945444927c9a580bf69acbfb3a14fa28f3bc036ceed55a1a7b0e04290eaa82182ced1ecc5e8bd20282e248c09ae700de3ed3907a690d33a877ca4c193dc958c102a8a7bd4c776267760b", 0xbb}, {&(0x7f00000002c0)="daa2991651ac353062a1d5e85c33d58b2f846bf1ce891c0d3600f9d6ef9be6277c2fb44eb1c4bc29343de55c5598f11ef160fdb68fc728c06897b3e90d80066257b19436e485932d3c61", 0x4a}, {&(0x7f0000000340)="874d1182f74b22b17ff52c5c2a6aba45698fa43796206702c2744221c1098197be3343125267fa2d8a69a5cd91b5cf500b0475fb691d4e3b40f649040c5089c66815e873bd452fb481b7a010411b5065086b50708d462c15aa248f0f887c72160ec3b8e120d7f557229ec2", 0x6b}], 0x7, 0x0) setsockopt$sock_void(r0, 0x29, 0x3f, 0x70e000, 0x300) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000004c0)={0x0, 0x6, 0x8, 0x6}, &(0x7f0000000500)=0x10) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f0000000680)={0x0, @aes128, 0x3, "1a09e5ca970906a1"}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000600)={r6, 0x70, &(0x7f0000000580)=[@in6={0xa, 0x4e20, 0x1f, @empty, 0xf09}, @in6={0xa, 0x4e20, 0x75, @mcast2, 0x8}, @in6={0xa, 0x4e23, 0x101, @empty, 0x40}, @in6={0xa, 0x4e24, 0x4, @empty, 0x9}]}, &(0x7f0000000640)=0x10) 01:32:53 executing program 3 (fault-call:2 fault-nth:19): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000000)=0x7ff) 01:32:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000440)=""/90) 01:32:54 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40006, 0x0) write(r0, &(0x7f0000000180)="e5f46e0d71c76070b48467b213d35d64ed7cace3db1bec65e7149a5d59681d5fdd369078a70a59aa45af62ba8073b25a11f1561737f80bf0fc99a85ff5a9bb7d7e31236319cebf80fa5c4e416eae36d4f551c180897285a96be1f44531be2027742aa6a6818f498e40aff84d760f578cfb1e34a1bbb2", 0x76) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00'], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000140)=0x8800, 0x8800000) [ 272.249449] FAULT_INJECTION: forcing a failure. [ 272.249449] name failslab, interval 1, probability 0, space 0, times 0 [ 272.313478] CPU: 1 PID: 8468 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 272.321938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.331303] Call Trace: [ 272.333917] dump_stack+0x244/0x39d [ 272.337572] ? dump_stack_print_info.cold.1+0x20/0x20 [ 272.342807] should_fail.cold.4+0xa/0x17 [ 272.346897] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.352015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.357564] ? wake_up_klogd+0x11a/0x180 [ 272.361638] ? console_device+0xc0/0xc0 [ 272.365648] ? __down_trylock_console_sem+0x151/0x1f0 [ 272.370868] ? zap_class+0x640/0x640 [ 272.374594] ? vprintk_emit+0x293/0x990 [ 272.378593] ? find_held_lock+0x36/0x1c0 [ 272.382684] ? __lock_is_held+0xb5/0x140 [ 272.386777] ? perf_trace_sched_process_exec+0x860/0x860 [ 272.392249] ? vprintk_default+0x28/0x30 [ 272.396334] __should_failslab+0x124/0x180 [ 272.400589] should_failslab+0x9/0x14 [ 272.404408] kmem_cache_alloc_trace+0x2d7/0x750 [ 272.409107] kobject_uevent_env+0x2f3/0x101e [ 272.413543] kobject_uevent+0x1f/0x24 [ 272.417360] lo_ioctl+0x1385/0x1d60 [ 272.421008] ? lo_rw_aio+0x1ef0/0x1ef0 [ 272.424912] blkdev_ioctl+0x9ac/0x2010 [ 272.428817] ? blkpg_ioctl+0xc10/0xc10 [ 272.432719] ? lock_downgrade+0x900/0x900 [ 272.436883] ? check_preemption_disabled+0x48/0x280 [ 272.441925] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 272.447030] ? kasan_check_read+0x11/0x20 [ 272.451193] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 272.456484] ? rcu_softirq_qs+0x20/0x20 [ 272.460489] ? __fget+0x4d1/0x740 [ 272.463962] ? ksys_dup3+0x680/0x680 [ 272.467715] block_ioctl+0xee/0x130 [ 272.471357] ? blkdev_fallocate+0x400/0x400 [ 272.475727] do_vfs_ioctl+0x1de/0x1720 [ 272.479643] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 272.485210] ? ioctl_preallocate+0x300/0x300 [ 272.489633] ? __fget_light+0x2e9/0x430 [ 272.493630] ? fget_raw+0x20/0x20 [ 272.497110] ? rcu_read_lock_sched_held+0x14f/0x180 [ 272.502150] ? kmem_cache_free+0x24f/0x290 [ 272.506399] ? putname+0xf7/0x130 [ 272.509874] ? do_syscall_64+0x9a/0x820 [ 272.513866] ? do_syscall_64+0x9a/0x820 [ 272.517853] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 272.522452] ? security_file_ioctl+0x94/0xc0 [ 272.526877] ksys_ioctl+0xa9/0xd0 [ 272.530347] __x64_sys_ioctl+0x73/0xb0 [ 272.534253] do_syscall_64+0x1b9/0x820 [ 272.538162] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.543544] ? syscall_return_slowpath+0x5e0/0x5e0 [ 272.548751] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.553612] ? trace_hardirqs_on_caller+0x310/0x310 [ 272.558660] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 272.563695] ? prepare_exit_to_usermode+0x291/0x3b0 [ 272.568730] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.573596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.579272] RIP: 0033:0x4573d7 [ 272.582480] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.601396] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 01:32:54 executing program 5: pipe2$9p(&(0x7f0000000180), 0x83fff) getrandom(&(0x7f0000000280)=""/105, 0x69, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) pipe2(&(0x7f00000000c0), 0x800) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000080)={0x1, 0x20, 0x101, 0x2}) 01:32:54 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my}, 0x10) listen(r0, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000100)={'vlan0\x00', 0x7}) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xbd2, 0x40000) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f00000000c0)=0x1) connect$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0xfffffffffffffffe}, 0x10) 01:32:54 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) [ 272.609117] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004573d7 [ 272.616400] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 272.623683] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 272.630961] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 272.630971] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 01:32:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x1d}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xfffffdb0, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) r2 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f0000000040)=0x80, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000440)) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000240), 0x0) 01:32:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = creat(&(0x7f0000000540)='./file0\x00', 0x60) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000005c0)='nbd\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x44003, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x20, r2, 0x220, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r3}]}]}, 0x20}, 0x1, 0x0, 0x0, 0xc0}, 0x4040054) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x60, &(0x7f0000000140), 0x18) 01:32:54 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000001000)="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", 0x1f8, 0x8}]) [ 272.800512] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000440)=""/90) 01:32:54 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000280)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0xa, 0x8}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000002c0)={0xb0a9, 0x1c, 0x5, 0x5c28, "2dd9a3e5e13aa4b9343ca388bbbfccfebbc963822f2191d5501f9378b9593b36"}) r2 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_buf(r1, 0x0, 0x20, &(0x7f0000000380), 0x0) 01:32:54 executing program 3 (fault-call:2 fault-nth:20): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) [ 273.022583] Dev loop5: unable to read RDB block 1 01:32:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x40049409, &(0x7f0000000440)=""/90) [ 273.043731] QAT: Invalid ioctl [ 273.047273] loop5: unable to read partition table [ 273.053186] QAT: Invalid ioctl [ 273.059163] QAT: Invalid ioctl [ 273.062626] loop5: partition table beyond EOD, truncated [ 273.068968] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 273.071467] QAT: Invalid ioctl [ 273.129615] FAULT_INJECTION: forcing a failure. [ 273.129615] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 273.141489] CPU: 0 PID: 8522 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 273.149899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.159262] Call Trace: [ 273.161875] dump_stack+0x244/0x39d [ 273.165530] ? dump_stack_print_info.cold.1+0x20/0x20 [ 273.170741] ? up+0xea/0x1c0 [ 273.173802] should_fail.cold.4+0xa/0x17 [ 273.177884] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 273.183006] ? mark_held_locks+0xc7/0x130 [ 273.187170] ? lock_downgrade+0x900/0x900 [ 273.191346] ? mark_held_locks+0x130/0x130 [ 273.195594] ? vprintk_emit+0x391/0x990 [ 273.199590] ? trace_hardirqs_off_caller+0x300/0x300 [ 273.204720] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 273.210021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.215574] ? check_preemption_disabled+0x48/0x280 [ 273.220608] ? debug_smp_processor_id+0x1c/0x20 [ 273.225296] ? perf_trace_lock_acquire+0x15b/0x800 [ 273.230246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.235806] ? should_fail+0x22d/0xd01 [ 273.239717] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 273.244837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.244854] ? wake_up_klogd+0x11a/0x180 [ 273.244880] __alloc_pages_nodemask+0x34b/0xdd0 [ 273.244899] ? __down_trylock_console_sem+0x151/0x1f0 [ 273.244922] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 273.244941] ? vprintk_emit+0x293/0x990 [ 273.254548] ? find_held_lock+0x36/0x1c0 [ 273.254647] ? nvme_remap_bar+0x1c8/0x330 [ 273.254693] ? trace_hardirqs_off+0xb8/0x310 [ 273.286094] cache_grow_begin+0xa5/0x8c0 [ 273.290149] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 273.295686] ? check_preemption_disabled+0x48/0x280 [ 273.300716] kmem_cache_alloc_trace+0x684/0x750 [ 273.305400] kobject_uevent_env+0x2f3/0x101e [ 273.309811] kobject_uevent+0x1f/0x24 [ 273.313617] lo_ioctl+0x1385/0x1d60 [ 273.317263] ? lo_rw_aio+0x1ef0/0x1ef0 [ 273.321154] blkdev_ioctl+0x9ac/0x2010 [ 273.325059] ? blkpg_ioctl+0xc10/0xc10 [ 273.328957] ? lock_downgrade+0x900/0x900 [ 273.333127] ? check_preemption_disabled+0x48/0x280 [ 273.338141] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 273.343075] ? kasan_check_read+0x11/0x20 [ 273.347247] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 273.352533] ? rcu_softirq_qs+0x20/0x20 [ 273.356510] ? __fget+0x4d1/0x740 [ 273.359957] ? ksys_dup3+0x680/0x680 [ 273.363680] block_ioctl+0xee/0x130 [ 273.367310] ? blkdev_fallocate+0x400/0x400 [ 273.371645] do_vfs_ioctl+0x1de/0x1720 [ 273.375553] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 273.381097] ? ioctl_preallocate+0x300/0x300 [ 273.385507] ? __fget_light+0x2e9/0x430 [ 273.389483] ? fget_raw+0x20/0x20 [ 273.392956] ? rcu_read_lock_sched_held+0x14f/0x180 [ 273.397987] ? kmem_cache_free+0x24f/0x290 [ 273.402214] ? putname+0xf7/0x130 [ 273.405666] ? do_syscall_64+0x9a/0x820 [ 273.409640] ? do_syscall_64+0x9a/0x820 [ 273.413624] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 273.418200] ? security_file_ioctl+0x94/0xc0 [ 273.422602] ksys_ioctl+0xa9/0xd0 [ 273.426054] __x64_sys_ioctl+0x73/0xb0 [ 273.429960] do_syscall_64+0x1b9/0x820 [ 273.433850] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 273.439218] ? syscall_return_slowpath+0x5e0/0x5e0 [ 273.444283] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.449133] ? trace_hardirqs_on_caller+0x310/0x310 [ 273.454155] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 273.459162] ? prepare_exit_to_usermode+0x291/0x3b0 [ 273.464180] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.469023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.474218] RIP: 0033:0x4573d7 [ 273.477416] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.496314] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 273.504043] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004573d7 [ 273.511334] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 273.518606] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 01:32:55 executing program 1: r0 = socket$inet6(0xa, 0x21000000000002, 0x0) ioctl(r0, 0x800008912, &(0x7f00000002c0)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, &(0x7f0000000000), 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x2) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000080)) 01:32:55 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x3) r1 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x20140}, 0xb) write$UHID_CREATE(r0, &(0x7f0000000080)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000040)=""/28, 0x1c, 0x1, 0x1, 0x40, 0x10001, 0x5}, 0x120) [ 273.525883] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 273.533159] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 273.564086] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, [ 273.574871] Dev loop5: unable to read RDB block 1 [ 273.582299] loop5: unable to read partition table [ 273.600200] loop5: partition table beyond EOD, truncated 01:32:55 executing program 4: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8080020}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)=@del={0x130, 0x11, 0x10, 0x70bd2b, 0x25dfdbfb, {{'drbg_nopr_hmac_sha256\x00'}, [], [], 0x400, 0x400}, [{0x8, 0x1, 0x7}, {0x8, 0x1, 0xffff}, {0x8, 0x1, 0x49d}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0xffffffffffffff81}, {0x8}]}, 0x130}, 0x1, 0x0, 0x0, 0x4050}, 0x8084) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hfsplus\x00', 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x59, &(0x7f0000000140)=""/89, 0x41f00}, 0x48) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 01:32:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1c53fd52572823a7d2000000000000000400000008000c00748ecd4ab1c04e07881a88e4d6f08a17b5787377afd87a8896fdbd418764cfbc75efbbf2dfe195f876df8ec173d98fc41089c1b4384199ef33c1f74ff69c4699c8d23dd6a72e63b63f033ac84ae5a4440079842f513daca5d4930cbd8200a6e111dd9afb76ea13c347b063af4ae3d0ec5dbbb6caaf15ff9fad2f085f8aa9f53fc920643e42fbedeec2c4cc91442509b331e0749c1a08e3af74bfec4ccaa73c4a44cff242e113807d86b27499d806557b51e36463a394d15ef6a50e3e0827500b0a", @ANYRES32=0x0], 0x1c}}, 0x0) socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="0a5cc8070031") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x2) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$sndseq(r1, &(0x7f00000003c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @control={0x0, 0x5}}], 0x30) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x31, &(0x7f00000000c0)=0x2, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 01:32:55 executing program 3 (fault-call:2 fault-nth:21): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) [ 273.626482] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 01:32:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x4020940d, &(0x7f0000000440)=""/90) 01:32:55 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000300)=0x60, 0x80000) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f0000000380)) read(0xffffffffffffffff, &(0x7f0000000240)=""/28, 0x37e) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000100)={0xc1, @tick, 0x0, {}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e00]}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7fff, 0x4000) ioctl$TIOCSWINSZ(r3, 0x5414, &(0x7f00000001c0)={0x20000000000000, 0xfffffffffffffffa, 0x7fffffff, 0xffffffff}) r4 = dup(r2) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) connect$l2tp(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0xffffffffffffffc2) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xc21e0100]}, @empty, @loopback}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x3, &(0x7f0000000000)) r5 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r5, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x2b}, 0x60) listen(r5, 0x0) mkdirat(r4, &(0x7f0000000340)='./file0\x00', 0x41) r6 = semget$private(0x0, 0x1, 0x10) semctl$GETNCNT(r6, 0x5, 0xe, &(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x40a85321, &(0x7f0000000080)={0x0, 0x2}) 01:32:55 executing program 1: io_setup(0x3, &(0x7f0000000040)=0x0) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000140)={'icmp\x00'}, &(0x7f0000000180)=0x1e) io_setup(0xb, &(0x7f0000000240)=0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x2, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000, 0x407000}]) open(&(0x7f0000000080)='./bus\x00', 0x228000, 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) bind(0xffffffffffffffff, &(0x7f00005a2000)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) close(r4) socket$inet_dccp(0x2, 0x6, 0x0) io_submit(r0, 0x1, &(0x7f0000000080)) [ 273.778535] FAULT_INJECTION: forcing a failure. [ 273.778535] name failslab, interval 1, probability 0, space 0, times 0 [ 273.798192] block nbd4: Attempted send on invalid socket [ 273.804068] print_req_error: I/O error, dev nbd4, sector 2 [ 273.812377] hfsplus: unable to find HFS+ superblock [ 273.817800] CPU: 1 PID: 8552 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 273.826217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.835581] Call Trace: [ 273.838244] dump_stack+0x244/0x39d [ 273.841906] ? dump_stack_print_info.cold.1+0x20/0x20 [ 273.847131] should_fail.cold.4+0xa/0x17 [ 273.851224] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 273.856357] ? lock_release+0xa10/0xa10 [ 273.856374] ? perf_trace_sched_process_exec+0x860/0x860 [ 273.856394] ? zap_class+0x640/0x640 [ 273.869521] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 273.874564] ? find_held_lock+0x36/0x1c0 [ 273.874588] ? __lock_is_held+0xb5/0x140 [ 273.874623] ? perf_trace_sched_process_exec+0x860/0x860 [ 273.874640] ? zap_class+0x640/0x640 [ 273.874679] __should_failslab+0x124/0x180 [ 273.896300] should_failslab+0x9/0x14 [ 273.900120] kmem_cache_alloc_node+0x26e/0x730 [ 273.904722] ? find_held_lock+0x36/0x1c0 [ 273.908856] __alloc_skb+0x114/0x770 [ 273.912585] ? netdev_alloc_frag+0x1f0/0x1f0 [ 273.917001] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 273.921935] ? kasan_check_read+0x11/0x20 [ 273.926088] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 273.931371] ? rcu_softirq_qs+0x20/0x20 [ 273.935396] ? netlink_has_listeners+0x2cb/0x4a0 [ 273.940170] ? netlink_tap_init_net+0x3d0/0x3d0 [ 273.944851] alloc_uevent_skb+0x84/0x1da [ 273.948923] kobject_uevent_env+0xa52/0x101e [ 273.953353] kobject_uevent+0x1f/0x24 [ 273.957162] lo_ioctl+0x1385/0x1d60 [ 273.960846] ? lo_rw_aio+0x1ef0/0x1ef0 [ 273.964743] blkdev_ioctl+0x9ac/0x2010 [ 273.968639] ? blkpg_ioctl+0xc10/0xc10 [ 273.972542] ? lock_downgrade+0x900/0x900 [ 273.976692] ? check_preemption_disabled+0x48/0x280 [ 273.981718] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 273.986660] ? kasan_check_read+0x11/0x20 [ 273.990819] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 273.996101] ? rcu_softirq_qs+0x20/0x20 [ 274.000092] ? __fget+0x4d1/0x740 [ 274.003558] ? ksys_dup3+0x680/0x680 [ 274.007278] ? __sched_text_start+0x8/0x8 [ 274.011443] block_ioctl+0xee/0x130 [ 274.015075] ? blkdev_fallocate+0x400/0x400 [ 274.019400] do_vfs_ioctl+0x1de/0x1720 [ 274.023295] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 274.028744] ? retint_kernel+0x1b/0x2d [ 274.032638] ? ioctl_preallocate+0x300/0x300 [ 274.037061] ? __fget_light+0x2e9/0x430 [ 274.041040] ? fget_raw+0x20/0x20 [ 274.044507] ? retint_kernel+0x2d/0x2d [ 274.048427] ? security_file_ioctl+0x94/0xc0 [ 274.052844] ksys_ioctl+0xa9/0xd0 [ 274.056307] __x64_sys_ioctl+0x73/0xb0 [ 274.060202] do_syscall_64+0x1b9/0x820 [ 274.064092] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 274.069463] ? syscall_return_slowpath+0x5e0/0x5e0 [ 274.074395] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.079241] ? trace_hardirqs_on_caller+0x310/0x310 [ 274.084272] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 274.089311] ? prepare_exit_to_usermode+0x291/0x3b0 [ 274.094338] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.099192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.104383] RIP: 0033:0x4573d7 [ 274.107581] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:32:56 executing program 4: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8080020}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)=@del={0x130, 0x11, 0x10, 0x70bd2b, 0x25dfdbfb, {{'drbg_nopr_hmac_sha256\x00'}, [], [], 0x400, 0x400}, [{0x8, 0x1, 0x7}, {0x8, 0x1, 0xffff}, {0x8, 0x1, 0x49d}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0xffffffffffffff81}, {0x8}]}, 0x130}, 0x1, 0x0, 0x0, 0x4050}, 0x8084) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hfsplus\x00', 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x59, &(0x7f0000000140)=""/89, 0x41f00}, 0x48) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) [ 274.126494] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 274.134204] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004573d7 [ 274.141474] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 274.148742] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 274.156013] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 274.163282] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 01:32:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x40044591, &(0x7f0000000440)=""/90) [ 274.218694] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:56 executing program 3 (fault-call:2 fault-nth:22): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:56 executing program 4: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8080020}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)=@del={0x130, 0x11, 0x10, 0x70bd2b, 0x25dfdbfb, {{'drbg_nopr_hmac_sha256\x00'}, [], [], 0x400, 0x400}, [{0x8, 0x1, 0x7}, {0x8, 0x1, 0xffff}, {0x8, 0x1, 0x49d}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0xffffffffffffff81}, {0x8}]}, 0x130}, 0x1, 0x0, 0x0, 0x4050}, 0x8084) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hfsplus\x00', 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x59, &(0x7f0000000140)=""/89, 0x41f00}, 0x48) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) [ 274.376062] block nbd4: Attempted send on invalid socket [ 274.381725] print_req_error: I/O error, dev nbd4, sector 2 [ 274.387552] hfsplus: unable to find HFS+ superblock 01:32:56 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip_tables_matches\x00') write$P9_RLERRORu(r1, &(0x7f00000000c0)={0xd, 0x7, 0x2, {{}, 0xff}}, 0xd) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x4, &(0x7f0000000100), 0x83) getsockopt$inet6_tcp_int(r0, 0x6, 0x3b, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 274.489954] FAULT_INJECTION: forcing a failure. [ 274.489954] name failslab, interval 1, probability 0, space 0, times 0 [ 274.503983] CPU: 1 PID: 8584 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 274.512419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.521782] Call Trace: [ 274.521810] dump_stack+0x244/0x39d [ 274.521837] ? dump_stack_print_info.cold.1+0x20/0x20 [ 274.521872] should_fail.cold.4+0xa/0x17 01:32:56 executing program 0: semctl$IPC_INFO(0x0, 0x3, 0x3, &(0x7f0000000080)=""/205) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x0, 0x200000) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000400), &(0x7f0000000480)=0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x100000000000003}, 0xffffffffffffffee) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {}, 0x3, 0x4, 0x1}}, 0x26) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x0, 0x0, 'wrr\x00', 0x20, 0xfffffffffffff0b5}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000300), 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) pselect6(0x40, &(0x7f0000000100)={0x3f, 0x0, 0x0, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x0, 0x2, 0xd75c, 0x100}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x0, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(0xffffffffffffffff, 0x800000000008982, &(0x7f0000000080)) signalfd4(r5, &(0x7f00000003c0)={0x4}, 0x8, 0x80800) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socket(0x10, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c626262c8523") openat$urandom(0xffffffffffffff9c, &(0x7f0000000440)='/dev/urandom\x00', 0x8180, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r8, 0x4008ae89, &(0x7f0000000640)=ANY=[@ANYBLOB="010000f673da135dd4fba5c01dde606e094b14c34b0000000000000038855ca110100076f8f10a9ca444f6901ccc63846bffb85e077775133d64e34443"]) [ 274.537318] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.537354] ? zap_class+0x640/0x640 [ 274.537372] ? save_stack+0x43/0xd0 [ 274.537392] ? kasan_kmalloc+0xc7/0xe0 [ 274.553729] ? kmem_cache_alloc_trace+0x152/0x750 [ 274.558593] ? kobject_uevent_env+0x2f3/0x101e [ 274.563184] ? kobject_uevent+0x1f/0x24 [ 274.563208] ? find_held_lock+0x36/0x1c0 [ 274.571263] ? __lock_is_held+0xb5/0x140 [ 274.575894] ? f2fs_inode_dirtied+0x248/0x540 [ 274.580433] ? perf_trace_sched_process_exec+0x860/0x860 [ 274.585922] __should_failslab+0x124/0x180 [ 274.590175] should_failslab+0x9/0x14 [ 274.593986] __kmalloc+0x2e0/0x760 [ 274.597538] ? kobject_uevent_env+0x2f3/0x101e [ 274.602135] ? rcu_read_lock_sched_held+0x14f/0x180 [ 274.607165] ? kobject_get_path+0xc2/0x1b0 [ 274.611408] ? kmem_cache_alloc_trace+0x353/0x750 [ 274.616279] kobject_get_path+0xc2/0x1b0 [ 274.620356] kobject_uevent_env+0x314/0x101e [ 274.624790] kobject_uevent+0x1f/0x24 [ 274.628609] lo_ioctl+0x1385/0x1d60 [ 274.632265] ? lo_rw_aio+0x1ef0/0x1ef0 [ 274.636166] blkdev_ioctl+0x9ac/0x2010 [ 274.640069] ? blkpg_ioctl+0xc10/0xc10 [ 274.643973] ? lock_downgrade+0x900/0x900 [ 274.648132] ? check_preemption_disabled+0x48/0x280 [ 274.653168] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 274.658119] ? kasan_check_read+0x11/0x20 [ 274.662283] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 274.667576] ? rcu_softirq_qs+0x20/0x20 [ 274.671575] ? __fget+0x4d1/0x740 [ 274.675046] ? ksys_dup3+0x680/0x680 [ 274.678789] block_ioctl+0xee/0x130 [ 274.682430] ? blkdev_fallocate+0x400/0x400 [ 274.686767] do_vfs_ioctl+0x1de/0x1720 [ 274.690675] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 274.696225] ? ioctl_preallocate+0x300/0x300 [ 274.700650] ? __fget_light+0x2e9/0x430 [ 274.704644] ? fget_raw+0x20/0x20 [ 274.708120] ? rcu_read_lock_sched_held+0x14f/0x180 [ 274.713150] ? kmem_cache_free+0x24f/0x290 [ 274.717397] ? putname+0xf7/0x130 [ 274.720863] ? do_syscall_64+0x9a/0x820 [ 274.724845] ? do_syscall_64+0x9a/0x820 [ 274.728830] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 274.733430] ? security_file_ioctl+0x94/0xc0 [ 274.737854] ksys_ioctl+0xa9/0xd0 [ 274.741322] __x64_sys_ioctl+0x73/0xb0 [ 274.745221] do_syscall_64+0x1b9/0x820 [ 274.749122] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 274.754499] ? syscall_return_slowpath+0x5e0/0x5e0 [ 274.759436] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.764297] ? trace_hardirqs_on_caller+0x310/0x310 [ 274.769326] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 274.774358] ? prepare_exit_to_usermode+0x291/0x3b0 [ 274.779395] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.784260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.789458] RIP: 0033:0x4573d7 [ 274.792672] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.811593] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 274.819314] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 00000000004573d7 [ 274.826592] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 274.833867] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 01:32:56 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000, 0x100) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x7c23}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e24, 0x4, @ipv4={[], [], @multicast1}, 0x1}}}, &(0x7f0000000200)=0x84) socket$kcm(0x2, 0x400000, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 274.841146] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 274.848418] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 274.857526] block nbd4: Attempted send on invalid socket [ 274.863223] print_req_error: I/O error, dev nbd4, sector 2 [ 274.870416] hfsplus: unable to find HFS+ superblock [ 274.895826] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:56 executing program 3 (fault-call:2 fault-nth:23): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:56 executing program 4: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8080020}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)=@del={0x130, 0x11, 0x10, 0x70bd2b, 0x25dfdbfb, {{'drbg_nopr_hmac_sha256\x00'}, [], [], 0x400, 0x400}, [{0x8, 0x1, 0x7}, {0x8, 0x1, 0xffff}, {0x8, 0x1, 0x49d}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0xffffffffffffff81}, {0x8}]}, 0x130}, 0x1, 0x0, 0x0, 0x4050}, 0x8084) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hfsplus\x00', 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x59, &(0x7f0000000140)=""/89, 0x41f00}, 0x48) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 01:32:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0xc0189436, &(0x7f0000000440)=""/90) 01:32:56 executing program 5: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x40, &(0x7f0000000640)="153f6234488dd25d766070") r1 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000600)={0x0, r2, 0x5, 0x4000000000000, 0x7fffffff, 0x1ff}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) write$sndseq(r1, &(0x7f0000000000), 0x0) write$FUSE_STATFS(r3, &(0x7f0000000040)={0x22, 0x0, 0x0, {{0x0, 0xfdffffff}}}, 0x60) recvmmsg(r3, &(0x7f0000000240)=[{{&(0x7f00000000c0)=@ax25, 0x80, &(0x7f0000000440)=[{&(0x7f0000000000)=""/44, 0x2c}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000000140)=""/223, 0xdf}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000000340)=""/162, 0xa2}, {&(0x7f0000002740)=""/4096, 0x1000}], 0x6, &(0x7f00000004c0)=""/245, 0xf5, 0x3}, 0x8}], 0x1, 0x10000, &(0x7f00000005c0)={0x0, 0x1c9c380}) 01:32:56 executing program 1: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000200)={0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, [], [], [], 0x0, 0xffff}) r2 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x7b, &(0x7f0000000040)=ANY=[@ANYRES32=r1, @ANYBLOB="660d7f04"], &(0x7f0000000100)=0x8) close(r2) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x7a, &(0x7f00000000c0)={r3}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r2, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x2, 0x0, @rand_addr}, 0x10, &(0x7f0000000140), 0x300, &(0x7f0000000080)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x4}}], 0x30}], 0x1, 0x0) [ 275.115053] block nbd4: Attempted send on invalid socket [ 275.120774] print_req_error: I/O error, dev nbd4, sector 2 [ 275.125569] hfsplus: unable to find HFS+ superblock [ 275.128952] FAULT_INJECTION: forcing a failure. [ 275.128952] name failslab, interval 1, probability 0, space 0, times 0 [ 275.213013] CPU: 1 PID: 8612 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 275.221483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.230852] Call Trace: [ 275.233459] dump_stack+0x244/0x39d [ 275.237107] ? dump_stack_print_info.cold.1+0x20/0x20 [ 275.242333] should_fail.cold.4+0xa/0x17 [ 275.246417] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.251541] ? lock_downgrade+0x900/0x900 [ 275.255699] ? check_preemption_disabled+0x48/0x280 [ 275.260733] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 275.265688] ? kasan_check_read+0x11/0x20 [ 275.269860] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 275.275175] ? find_held_lock+0x36/0x1c0 [ 275.279344] ? scsi_cmd_ioctl+0x9e8/0xd00 [ 275.283530] ? perf_trace_sched_process_exec+0x860/0x860 [ 275.288992] ? block_ioctl+0xee/0x130 [ 275.292812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.298374] __should_failslab+0x124/0x180 [ 275.302626] should_failslab+0x9/0x14 [ 275.302644] kmem_cache_alloc+0x2be/0x730 01:32:57 executing program 0: semctl$IPC_INFO(0x0, 0x3, 0x3, &(0x7f0000000080)=""/205) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x0, 0x200000) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000400), &(0x7f0000000480)=0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x100000000000003}, 0xffffffffffffffee) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {}, 0x3, 0x4, 0x1}}, 0x26) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x0, 0x0, 'wrr\x00', 0x20, 0xfffffffffffff0b5}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000300), 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) pselect6(0x40, &(0x7f0000000100)={0x3f, 0x0, 0x0, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x0, 0x2, 0xd75c, 0x100}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x0, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(0xffffffffffffffff, 0x800000000008982, &(0x7f0000000080)) signalfd4(r5, &(0x7f00000003c0)={0x4}, 0x8, 0x80800) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socket(0x10, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c626262c8523") openat$urandom(0xffffffffffffff9c, &(0x7f0000000440)='/dev/urandom\x00', 0x8180, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r8, 0x4008ae89, &(0x7f0000000640)=ANY=[@ANYBLOB="010000f673da135dd4fba5c01dde606e094b14c34b0000000000000038855ca110100076f8f10a9ca444f6901ccc63846bffb85e077775133d64e34443"]) 01:32:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x13) sendmsg$nl_xfrm(r0, &(0x7f0000000a80)={&(0x7f0000000000), 0xc, &(0x7f0000000a40)={&(0x7f0000000040)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in6=@dev, @in6}, {@in6=@loopback, 0x0, 0x2b}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x2) 01:32:57 executing program 4: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8080020}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)=@del={0x130, 0x11, 0x10, 0x70bd2b, 0x25dfdbfb, {{'drbg_nopr_hmac_sha256\x00'}, [], [], 0x400, 0x400}, [{0x8, 0x1, 0x7}, {0x8, 0x1, 0xffff}, {0x8, 0x1, 0x49d}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0xffffffffffffff81}, {0x8}]}, 0x130}, 0x1, 0x0, 0x0, 0x4050}, 0x8084) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hfsplus\x00', 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x59, &(0x7f0000000140)=""/89, 0x41f00}, 0x48) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) [ 275.302674] ? fget_raw+0x20/0x20 [ 275.310624] getname_flags+0xd0/0x590 [ 275.310645] do_mkdirat+0xc5/0x310 [ 275.310681] ? __ia32_sys_mknod+0xb0/0xb0 [ 275.321448] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.321469] ? trace_hardirqs_off_caller+0x300/0x300 [ 275.321485] ? ksys_ioctl+0x81/0xd0 [ 275.321509] __x64_sys_mkdir+0x5c/0x80 [ 275.331026] do_syscall_64+0x1b9/0x820 [ 275.331042] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.331061] ? syscall_return_slowpath+0x5e0/0x5e0 [ 275.331082] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.362688] ? trace_hardirqs_on_caller+0x310/0x310 [ 275.367738] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 275.372772] ? prepare_exit_to_usermode+0x291/0x3b0 [ 275.377814] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.382691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.387893] RIP: 0033:0x456987 [ 275.391105] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:32:57 executing program 4: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8080020}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)=@del={0x130, 0x11, 0x10, 0x70bd2b, 0x25dfdbfb, {{'drbg_nopr_hmac_sha256\x00'}, [], [], 0x400, 0x400}, [{0x8, 0x1, 0x7}, {0x8, 0x1, 0xffff}, {0x8, 0x1, 0x49d}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0xffffffffffffff81}, {0x8}]}, 0x130}, 0x1, 0x0, 0x0, 0x4050}, 0x8084) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hfsplus\x00', 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x59, &(0x7f0000000140)=""/89, 0x41f00}, 0x48) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) [ 275.410023] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 275.417742] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 0000000000456987 [ 275.425019] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 275.432297] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 275.439575] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 275.446854] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 01:32:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) getpeername(r0, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x8000, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x437, &(0x7f0000000700)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev, @local, {[], @dccp={{0x0, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "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"}}}}}}, &(0x7f0000001780)) 01:32:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80104592, &(0x7f0000000440)=""/90) [ 275.509722] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, 01:32:57 executing program 0: semctl$IPC_INFO(0x0, 0x3, 0x3, &(0x7f0000000080)=""/205) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x0, 0x200000) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000400), &(0x7f0000000480)=0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x100000000000003}, 0xffffffffffffffee) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {}, 0x3, 0x4, 0x1}}, 0x26) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x0, 0x0, 'wrr\x00', 0x20, 0xfffffffffffff0b5}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000300), 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) pselect6(0x40, &(0x7f0000000100)={0x3f, 0x0, 0x0, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x0, 0x2, 0xd75c, 0x100}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x0, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(0xffffffffffffffff, 0x800000000008982, &(0x7f0000000080)) signalfd4(r5, &(0x7f00000003c0)={0x4}, 0x8, 0x80800) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socket(0x10, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c626262c8523") openat$urandom(0xffffffffffffff9c, &(0x7f0000000440)='/dev/urandom\x00', 0x8180, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r8, 0x4008ae89, &(0x7f0000000640)=ANY=[@ANYBLOB="010000f673da135dd4fba5c01dde606e094b14c34b0000000000000038855ca110100076f8f10a9ca444f6901ccc63846bffb85e077775133d64e34443"]) 01:32:57 executing program 3 (fault-call:2 fault-nth:24): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) [ 275.591475] block nbd4: Attempted send on invalid socket [ 275.597067] print_req_error: I/O error, dev nbd4, sector 2 [ 275.603003] hfsplus: unable to find HFS+ superblock 01:32:57 executing program 4: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8080020}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)=@del={0x130, 0x11, 0x10, 0x70bd2b, 0x25dfdbfb, {{'drbg_nopr_hmac_sha256\x00'}, [], [], 0x400, 0x400}, [{0x8, 0x1, 0x7}, {0x8, 0x1, 0xffff}, {0x8, 0x1, 0x49d}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0xffffffffffffff81}, {0x8}]}, 0x130}, 0x1, 0x0, 0x0, 0x4050}, 0x8084) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hfsplus\x00', 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x59, &(0x7f0000000140)=""/89, 0x41f00}, 0x48) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) socket$netlink(0x10, 0x3, 0x0) 01:32:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x890e, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000223fd4)=[@in={0x2, 0x0, @loopback}], 0x10) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000662000), 0x13b) getsockname$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f00000000c0)=0xc) [ 275.752163] FAULT_INJECTION: forcing a failure. [ 275.752163] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 275.764027] CPU: 0 PID: 8665 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 275.772446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.781813] Call Trace: [ 275.784430] dump_stack+0x244/0x39d [ 275.788094] ? dump_stack_print_info.cold.1+0x20/0x20 [ 275.793325] should_fail.cold.4+0xa/0x17 [ 275.797410] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.802526] ? kobject_uevent_env+0xf76/0x101e [ 275.807130] ? wait_for_completion+0x8a0/0x8a0 [ 275.811739] ? mark_held_locks+0x130/0x130 [ 275.815997] ? kobject_uevent_env+0x100d/0x101e [ 275.820710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.826257] ? check_preemption_disabled+0x48/0x280 [ 275.831292] ? debug_smp_processor_id+0x1c/0x20 [ 275.835975] ? perf_trace_lock_acquire+0x15b/0x800 [ 275.840920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.846470] ? should_fail+0x22d/0xd01 [ 275.850373] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.855490] ? lock_downgrade+0x900/0x900 [ 275.859666] __alloc_pages_nodemask+0x34b/0xdd0 [ 275.864350] ? kasan_check_read+0x11/0x20 [ 275.868512] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 275.873808] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 275.878842] ? find_held_lock+0x36/0x1c0 [ 275.882949] ? trace_hardirqs_off+0xb8/0x310 [ 275.887372] cache_grow_begin+0xa5/0x8c0 [ 275.891446] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.896995] ? check_preemption_disabled+0x48/0x280 [ 275.902030] kmem_cache_alloc+0x66b/0x730 [ 275.906190] ? fget_raw+0x20/0x20 [ 275.909671] getname_flags+0xd0/0x590 [ 275.913507] do_mkdirat+0xc5/0x310 [ 275.917065] ? __ia32_sys_mknod+0xb0/0xb0 [ 275.921227] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.926603] ? trace_hardirqs_off_caller+0x300/0x300 [ 275.931715] ? ksys_ioctl+0x81/0xd0 [ 275.935358] __x64_sys_mkdir+0x5c/0x80 [ 275.939261] do_syscall_64+0x1b9/0x820 [ 275.943332] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.948714] ? syscall_return_slowpath+0x5e0/0x5e0 [ 275.953663] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.958524] ? trace_hardirqs_on_caller+0x310/0x310 [ 275.963554] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 275.968583] ? prepare_exit_to_usermode+0x291/0x3b0 [ 275.973619] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.978490] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.983697] RIP: 0033:0x456987 [ 275.986907] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.005819] RSP: 002b:00007f1f25974a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 276.013540] RAX: ffffffffffffffda RBX: 0000000020001850 RCX: 0000000000456987 [ 276.020817] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 276.028116] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 276.035393] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 276.042675] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 01:32:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x5452, &(0x7f0000000440)=""/90) [ 276.086769] block nbd4: Attempted send on invalid socket [ 276.092321] print_req_error: I/O error, dev nbd4, sector 2 [ 276.119425] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000, [ 276.133054] hfsplus: unable to find HFS+ superblock 01:32:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U+', 0x3}, 0x28, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f00000001c0)={[{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) rt_sigaction(0x11, &(0x7f00000000c0)={&(0x7f0000000000)="c4c1e563431fc401f9178d00000000430f38c92500008020f30f2d038f0868959fad4f46a41fc4e25d9f19f2f046808c0ea8bc00006e65f02930d9c5f3a6", {0x2}, 0x80000000, &(0x7f0000000040)="c4e2f5bc5500f3aa67260f405b2bc40125e93c1d00080000c48291401745decac44169df314125000000003e0fca3ec25d00"}, &(0x7f0000000280)={&(0x7f0000000140)="8f0978808803000000f342af0fae4132be05e988a4f2d9fd2e45d0c1f36e42c0550000c441791178fb36450f01d6", {}, 0x0, &(0x7f0000000180)="26f3dce9660f6f5668d8cbc4027d8c80feee0000262636f3400f1873fac4a17bf014840fc46b0008c02699c4c1f014b503000000660f3831eb"}, 0x8, &(0x7f00000002c0)) 01:32:57 executing program 4: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8080020}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)=@del={0x130, 0x11, 0x10, 0x70bd2b, 0x25dfdbfb, {{'drbg_nopr_hmac_sha256\x00'}, [], [], 0x400, 0x400}, [{0x8, 0x1, 0x7}, {0x8, 0x1, 0xffff}, {0x8, 0x1, 0x49d}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0xffffffffffffff81}, {0x8}]}, 0x130}, 0x1, 0x0, 0x0, 0x4050}, 0x8084) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hfsplus\x00', 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x59, &(0x7f0000000140)=""/89, 0x41f00}, 0x48) socket$netlink(0x10, 0x3, 0x0) 01:32:58 executing program 3 (fault-call:2 fault-nth:25): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) [ 276.235322] block nbd4: Attempted send on invalid socket [ 276.240910] print_req_error: I/O error, dev nbd4, sector 2 [ 276.250884] hfsplus: unable to find HFS+ superblock 01:32:58 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)=""/193, &(0x7f0000000280)=""/97, &(0x7f0000000380)=""/127}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x1, 0x0, &(0x7f0000000480)=""/115, &(0x7f0000000580)=""/156, &(0x7f0000000940)=""/185}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000640)) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000140)) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000000c0)=0x1) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200000, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000140)) 01:32:58 executing program 0: semctl$IPC_INFO(0x0, 0x3, 0x3, &(0x7f0000000080)=""/205) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x0, 0x200000) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000400), &(0x7f0000000480)=0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x100000000000003}, 0xffffffffffffffee) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {}, 0x3, 0x4, 0x1}}, 0x26) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x0, 0x0, 'wrr\x00', 0x20, 0xfffffffffffff0b5}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f0000000300), 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) pselect6(0x40, &(0x7f0000000100)={0x3f, 0x0, 0x0, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x0, 0x2, 0xd75c, 0x100}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x0, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(0xffffffffffffffff, 0x800000000008982, &(0x7f0000000080)) signalfd4(r5, &(0x7f00000003c0)={0x4}, 0x8, 0x80800) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socket(0x10, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c626262c8523") openat$urandom(0xffffffffffffff9c, &(0x7f0000000440)='/dev/urandom\x00', 0x8180, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r8, 0x4008ae89, &(0x7f0000000640)=ANY=[@ANYBLOB="010000f673da135dd4fba5c01dde606e094b14c34b0000000000000038855ca110100076f8f10a9ca444f6901ccc63846bffb85e077775133d64e34443"]) [ 276.304010] pit: kvm: requested 838 ns i8254 timer period limited to 200000 ns 01:32:58 executing program 4: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8080020}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)=@del={0x130, 0x11, 0x10, 0x70bd2b, 0x25dfdbfb, {{'drbg_nopr_hmac_sha256\x00'}, [], [], 0x400, 0x400}, [{0x8, 0x1, 0x7}, {0x8, 0x1, 0xffff}, {0x8, 0x1, 0x49d}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0xffffffffffffff81}, {0x8}]}, 0x130}, 0x1, 0x0, 0x0, 0x4050}, 0x8084) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hfsplus\x00', 0x0, &(0x7f0000000240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) socket$netlink(0x10, 0x3, 0x0) 01:32:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x5460, &(0x7f0000000440)=""/90) [ 276.384631] pit: kvm: requested 838 ns i8254 timer period limited to 200000 ns 01:32:58 executing program 4: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hfsplus\x00', 0x0, &(0x7f0000000240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) socket$netlink(0x10, 0x3, 0x0) 01:32:58 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0xffffffffffffffff) syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) socketpair(0x8000000000001e, 0x0, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) bind$alg(r0, &(0x7f00000003c0)={0x26, 'hash\x00', 0x0, 0x0, 'sm4-generic\x00'}, 0x58) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x0, [], [{0x0, 0x40, 0x5, 0x3ff, 0xffff, 0x3}, {0x0, 0x8, 0x0, 0x0, 0xa4, 0xfe7}], [[]]}) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000180)={0x4, 0x8000000000000000}) write$binfmt_aout(r2, &(0x7f0000000a40)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000140), 0xd1) 01:32:58 executing program 1: r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f00000001c0)=@sco, 0x80, &(0x7f0000000300)}, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31111, 0x0, 0xf, @dev}, 0x80, &(0x7f0000000340), 0x25d, &(0x7f0000000380)}, 0x0) [ 276.483850] block nbd4: Attempted send on invalid socket [ 276.489373] print_req_error: I/O error, dev nbd4, sector 2 [ 276.495532] hfsplus: unable to find HFS+ superblock [ 276.541613] FAULT_INJECTION: forcing a failure. [ 276.541613] name failslab, interval 1, probability 0, space 0, times 0 [ 276.559036] CPU: 0 PID: 8711 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 276.567468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.576835] Call Trace: [ 276.579445] dump_stack+0x244/0x39d [ 276.583100] ? dump_stack_print_info.cold.1+0x20/0x20 [ 276.588332] should_fail.cold.4+0xa/0x17 [ 276.592419] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.597543] ? save_stack+0x43/0xd0 [ 276.601179] ? kasan_kmalloc+0xc7/0xe0 [ 276.605078] ? __kmalloc_track_caller+0x157/0x760 [ 276.609929] ? memdup_user+0x2c/0xa0 [ 276.613668] ? do_syscall_64+0x1b9/0x820 [ 276.617742] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.623124] ? zap_class+0x640/0x640 [ 276.626845] ? zap_class+0x640/0x640 [ 276.630576] ? find_held_lock+0x36/0x1c0 [ 276.634706] ? __putback_lru_fast_prepare+0x9b8/0xbc0 [ 276.639929] ? perf_trace_sched_process_exec+0x860/0x860 [ 276.645391] ? lock_release+0xa10/0xa10 [ 276.649370] ? perf_trace_sched_process_exec+0x860/0x860 [ 276.654846] __should_failslab+0x124/0x180 [ 276.659099] should_failslab+0x9/0x14 [ 276.662911] __kmalloc_track_caller+0x2d1/0x760 [ 276.667596] ? strncpy_from_user+0x5a0/0x5a0 [ 276.672014] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.677563] ? strndup_user+0x77/0xd0 [ 276.681378] memdup_user+0x2c/0xa0 [ 276.684933] strndup_user+0x77/0xd0 [ 276.688580] ksys_mount+0x73/0x140 [ 276.692136] __x64_sys_mount+0xbe/0x150 [ 276.696126] do_syscall_64+0x1b9/0x820 [ 276.700020] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 276.705398] ? syscall_return_slowpath+0x5e0/0x5e0 [ 276.710335] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.715194] ? trace_hardirqs_on_caller+0x310/0x310 [ 276.720221] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 276.725249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.730797] ? prepare_exit_to_usermode+0x291/0x3b0 [ 276.735833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.740704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.745938] RIP: 0033:0x459fda [ 276.749141] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 276.768054] RSP: 002b:00007f1f25974a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 276.775779] RAX: ffffffffffffffda RBX: 00007f1f25974b30 RCX: 0000000000459fda [ 276.783061] RDX: 00007f1f25974ad0 RSI: 0000000020000080 RDI: 00007f1f25974af0 [ 276.790337] RBP: 0000000020000080 R08: 00007f1f25974b30 R09: 00007f1f25974ad0 [ 276.797613] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000000000004 [ 276.804888] R13: 0000000000000020 R14: 00000000004d7d88 R15: 0000000000000003 01:32:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x5451, &(0x7f0000000440)=""/90) [ 276.864504] block nbd4: Attempted send on invalid socket [ 276.870030] print_req_error: I/O error, dev nbd4, sector 2 [ 276.895598] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 01:32:58 executing program 4: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hfsplus\x00', 0x0, &(0x7f0000000240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) socket$netlink(0x10, 0x3, 0x0) [ 276.911822] hfsplus: unable to find HFS+ superblock 01:32:58 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000040)) 01:32:58 executing program 3 (fault-call:2 fault-nth:26): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2001001, &(0x7f00000018c0)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000200)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x20, &(0x7f0000000400)={[{@resgid={'resgid'}}]}) 01:32:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x5421, &(0x7f0000000440)=""/90) 01:32:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socket(0x1e, 0x1000000000005, 0x0) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x77359400}) io_submit(0x0, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140), 0x5ee}]) 01:32:58 executing program 4: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hfsplus\x00', 0x0, &(0x7f0000000240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) socket$netlink(0x10, 0x3, 0x0) [ 277.032019] block nbd4: Attempted send on invalid socket [ 277.032553] ntfs: (device loop5): parse_options(): Unrecognized mount option . [ 277.037642] print_req_error: I/O error, dev nbd4, sector 2 [ 277.059951] hfsplus: unable to find HFS+ superblock 01:32:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}]}) listen(r0, 0x1) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000000)=0x400, 0x4) [ 277.119529] FAULT_INJECTION: forcing a failure. [ 277.119529] name failslab, interval 1, probability 0, space 0, times 0 [ 277.216856] CPU: 1 PID: 8748 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 277.225327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.234690] Call Trace: [ 277.237308] dump_stack+0x244/0x39d [ 277.239913] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 277.240959] ? dump_stack_print_info.cold.1+0x20/0x20 [ 277.241000] should_fail.cold.4+0xa/0x17 [ 277.241026] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.241057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.241086] ? check_preemption_disabled+0x48/0x280 [ 277.283737] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 277.289297] ? find_held_lock+0x36/0x1c0 [ 277.293401] ? perf_trace_sched_process_exec+0x860/0x860 [ 277.298877] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 277.304438] __should_failslab+0x124/0x180 [ 277.308699] should_failslab+0x9/0x14 [ 277.312603] kmem_cache_alloc_trace+0x2d7/0x750 [ 277.317298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.322931] vfs_new_fs_context+0x5e/0x77c [ 277.327215] ? ns_capable_common+0x13f/0x170 [ 277.331698] do_mount+0xb70/0x1d90 [ 277.335267] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 277.340842] ? copy_mount_string+0x40/0x40 [ 277.345101] ? copy_mount_options+0x5f/0x430 [ 277.349534] ? kmem_cache_alloc_trace+0x353/0x750 [ 277.354409] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 277.359959] ? _copy_from_user+0xdf/0x150 [ 277.364123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.369695] ? copy_mount_options+0x315/0x430 [ 277.374214] ksys_mount+0x12d/0x140 [ 277.377866] __x64_sys_mount+0xbe/0x150 [ 277.381866] do_syscall_64+0x1b9/0x820 [ 277.385772] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 277.391155] ? syscall_return_slowpath+0x5e0/0x5e0 [ 277.396098] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.400962] ? trace_hardirqs_on_caller+0x310/0x310 [ 277.405997] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 277.411029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.416580] ? prepare_exit_to_usermode+0x291/0x3b0 [ 277.421614] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.426487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.431698] RIP: 0033:0x459fda [ 277.434907] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 277.453821] RSP: 002b:00007f1f25974a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 01:32:59 executing program 0: r0 = socket$packet(0x11, 0x90, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000100)="040300000309c14609005375c52cf7c21975e697b02f5c566b2b2ff0dac8897c6b11058e2f000000000000000002257e55e8d7a5c082e33faecf323a9e4472a5a1b0d9ef", 0x44, 0x0, &(0x7f0000000000)={0xa, 0x800, 0x800000000005, @mcast2}, 0x1c) 01:32:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_delroute={0x24, 0x19, 0x903, 0x0, 0x0, {}, [@RTA_PRIORITY={0x8, 0x6, 0x401}]}, 0x24}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000f40)=[{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000080)="4ed826366954a5242b93cfeab592886870427d28e47e602a3b31e749", 0x1c}, {&(0x7f0000000240)="5e04284dcb5681725f0ba85095fa034215b640aeb436c09adb256618b0626d39b6ee989c0292a8dabbb7a1c988805ee91ceeef6a3b7b0d7f4014b1412a3b6ee0b55dd3113cc359353431e64f2237bdca9163a82b719f7867693d214b436ad3f0c43a5d5c4e82b2e17ccf277e62ba1a43b620b2a6ccfcca93ee57272ae4a1f4c1648ebce86d9eb3815175fc2c0976e98d750c27430000b50c57e53f5ff0668191a8f46351cb9df575509871126dfbe042445a063a577318609d6ba8fc50fb2b9e0ed00adc2fb317091931662b14fc16cca8a7561f5e5400ccd0269f9ddcff75057c35848e2a6479de05bcde50e107d51b9818c3c7e22948363b", 0xf9}, {&(0x7f0000000340)="5eab296c172c81cb3edd1cbff91a6ef2df99b8d73ff8cdfb8aa2fdafd5154aab8a5e44e9e659b6ba32e388fe4781fafa246ee46de098ff7537fd0893ed7eff522c37ca41ba084baa21062a237ee0c2e14a89c618d5f426f3767a06542222f4ab1bb47ce2d3449589a00eba804a18b1e0388f35", 0x73}, {&(0x7f0000000100)="7f2a4f9164c561fa56daf2fb9220", 0xe}, {&(0x7f00000003c0)="950b309f5f644c4dcd3823aa1b127099f94e69d3c49a6eb80b4388834e575331f8fe01f8b04cbcf954fb8e805dc7d5fe75fed8f4eb754bac9f84aad5ad6ba60f8883e1cffddaf27edbee8542df3dd7e4b5f04a8eee550c0666f228d299b0289daed9610307e97637b7416118c8db4aeb5d", 0x71}, {&(0x7f0000000440)="0546bcb6edd714afc289008b128bce20da3d7fb64ef8bef9307c78d2a856f831244b56179ee06f74ffb9d088d74a95241cc65869654a9f5062b8fc10a384386ebc469aa5c047", 0x46}, {&(0x7f00000004c0)}, {&(0x7f0000000500)="36de8ca22dbf804dea07bfbf33b1fc85748e9f66555eafc70ca38683241dfe41f24af8ec655fca738aa51ff6919913f34ac061a895a6b1306242a5c9ec69c4ab82bcf76b1f7d02c3de5a50e5af0e889cad1019afe074168e7809a7035f79e682d5bda79e08f681bddb43005215b2ff7fa297766861ee6d083cbecf7e449824324df8b0b970bb9cc90e5a9fee8bce1d4cdc854e74bd55011d637de247a76dfac05254a3cce063513810dddcb548a6d86c9daf8f6d5bed28d6271ec3f2c0bd", 0xbe}, {&(0x7f00000005c0)="fa2117979db7cf23e9b756f41d8f3ae386a42fbe45e67c0749235d07008655025c6e014a55b1822c9af73b1ca710f0e62b4a62f54265f64564bfa4cc983d8a3b07fe17747824ea86c71df8cf198080a15f27c2dd4a61f4ac95302cd76033c7c452ab5f606fcda2a7a65b5ec31ceafacb9548a7c27aa976fee8ea09ddeb50ce252e495fef17a1ab55d12613a984683ae37fc58b599e7d55f01625929fb85a33bdb33b3c2ec037f7d801cfc0d953a0daf94fc3fbc02bea", 0xb6}, {&(0x7f0000000680)="bfe32559478820b052f7b37aa04e41ccf44baa52174f81de5d761b6b1176bc0aedc087bc40b3570c25aed90aa3cf568727fe591706f30ebb2768674e1c5d7c98602a0c9cd7d06a9ea83fba17e67cd2b59e20b996bbb59a8eef0c8de2495654cdbe65c29b2d18bec455a209b1c4c26a8c8b039bdfe53c454deb5d56565c1874546d91ec4544bfca482f524b6c791c37", 0x8f}], 0xa, &(0x7f0000000800)=[@assoc={0x18, 0x117, 0x4, 0x3f}, @iv={0x48, 0x117, 0x2, 0x31, "2e12c29a77df81cfa5920c708001005d01b0ec6b8e60a85033db1ebd83cfaab7876b83161b5b1794a5c24561ba646d1be3"}], 0x60, 0x24004010}, {0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000880)="89bc61f3310927cf62439e186f22f24bdaeb675cb0d659449b3dcec25c1a909ade88449b5e85f3ddd8959224f13b285a8b9e74d2f886517c394c92488159e79d64ab0390e795e0b46ffe990b794a7df41e2ef0d10def9cce0f58edc370bc0523ef981bd8fe8a86774099dbb1b55a305ee90bf8a07ceb76dd0c1c7a68e1070a2e2820233ba134e2b8dec908ad4b4760c72aac58b1f3bc4933e0e7099d0d3912f70bce273f4c", 0xa5}, {&(0x7f0000000940)="959f3790e919cbc1a88e6cf5510ab637c5b1e16e59b58a3f7342a13bfa993d45c0b33995d7f5e5a1150052fb79f16bfd110a8818b09f3e47e7d908f910c896612fa535388dbfcd255c39b4057a51380228848ced90c3afa6d2112973814206e5ff6436fc5176117eca744228102ad841", 0x70}, {&(0x7f00000009c0)="fe3f32003cadce98fc8ddcaeba776302216dbc7bff67802febf6bc4810c8d260286c98fea304029d5dbc02633ccc0872c091e148fe3e0f00d4b7fa3f641da9e119d005a31b71731f07f7a08e54294316a1feacebc65be7711ca7be64da171a922b74b01b5b4815e487605f11cf25943c2bbbd9ba84ce7661ef2fedde35d02d4be70bc263cbd9a169629eb3430673933f16c2bb121c9ada25ae674b2d4a7789adf3b851811add060b05567c17520f961c80169970a225f01457d91b53d400754dc884e482c8eb6c5420badeb3062a29c94d6e52a9ef0baa449585136375476ceb8223ea16", 0xe4}, {&(0x7f0000000ac0)="ae08730c3e7d46e74fd41de20f1b20ef49d0f009c31d699a1b144a54d442acdc36dc9ff0aba8e6e2ef547e41335d3d5dbb038bee85feed5382bfa43d673287d204450651d4dcb68a18c2e2d005198613c33b9609c43d38c05bd15d9787d2bba00232dddec9a2a7bcc1513bc3507e07d8cfcfdd50", 0x74}, {&(0x7f0000000b40)="f80573bb8f47c94ea082d0a19b9c3c6faa3e84679d0ba7fabce8dd0eb1db4b1bb7ddbe84a2761e30d106488510a14d336939c43188b681faca7277523a82535f6157b0d3c8df01b5b5b32339eec36de4533a634de8af6a25d5a687f0cc59236f8afffe8721c799c2482bb68bbcd4329d08239910e4acad75441d48dc031294ee34c7d686804ab4bd32e99068b884f9147efc", 0x92}, {&(0x7f0000000c00)="acbeb2ee69ff132944032f2855a88aa821825ec12a446a2d4e83d0a330f30930f6e943fed8b0cd0bedbdb36ffaa0f4bc881a374656cccc2150b5a3238b0f7e7262c46c3bd87f973e54fd614278a8869177d82bb086447d9cefc4a26ebcac476e155147fdc8135cb61f19858cba01833bfffe4c9fd55dab8b0a5b8d9419722f378fae4a7e8b798deaab640fd0d2aa1c65400fa99719a4df72eea8538e776f9fcda1b52e31a5bd42c474bff7158209cad5a327f419d16918e08fab967502565dbe8e3ae927d25ae19ec8db87777eaf146944f8800a5d06e7029b7fb8abb5bad741a5950f24385ba36af1a460e8ef2e5b", 0xef}], 0x6, &(0x7f0000000d80)=[@iv={0xc0, 0x117, 0x2, 0xa6, "bbfc1f0a86272e4a8a92989de48fe3e150dc9603fb82c271b5261e0989c4bdf4bf7b2a7c53994ca96c42fb4b47737218045fbe024ff91e6bb5d78cf9e155981e928f811218e67cbc69f39dab93c47bdbdcdf2f9697218ea6affa9596e4381a434b8bd6bc9ae4b017968a95ad97c87481764e41b9595fbd8207011bb1c22e7dd96803085e06fc74e13942b6993d5b08a3604b318af8ae0f54beaf966916814ec392ca62c661ee"}, @iv={0xd0, 0x117, 0x2, 0xb5, "7b227fc7236dd2b0aea3b02669ae5fd407279f5c553063839c0c661c7cb866becd1a53ab00c4e8aebafc0b21a39ce8bee5a488ddda6bf774f67dda3886c6fbe54d1f103eb468e76cb8c34db736966a395d4e60d667166cbd6b45b8250e99ad21b712f4aa50c057f9f67e736ae77fde1e53729a539a42061b3e9f04e84ebd25be9dd6882f5f6b45e58cd54debdd994a308d09940e8f9e29a3c033f0a0581db87b9a83396e2572e0fb96a115014cae5343e93d5269c6"}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x9}], 0x1c0}], 0x2, 0x0) [ 277.461543] RAX: ffffffffffffffda RBX: 00007f1f25974b30 RCX: 0000000000459fda [ 277.468824] RDX: 00007f1f25974ad0 RSI: 0000000020000080 RDI: 00007f1f25974af0 [ 277.476105] RBP: 0000000020000080 R08: 00007f1f25974b30 R09: 00007f1f25974ad0 [ 277.483383] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000000000004 [ 277.490697] R13: 0000000000000020 R14: 00000000004d7d88 R15: 0000000000000003 01:32:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x7f, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x21, &(0x7f0000013e95), 0x4) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x3, 0x5}, {0x7, 0x2}]}, 0x14, 0x2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x4b, &(0x7f0000000040)={'security\x00', 0x2, [{}, {}]}, 0x48) close(r2) close(r1) 01:32:59 executing program 0: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x40000005, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000040)={{0x5c, @dev={0xac, 0x14, 0x14, 0xc}, 0x4e23, 0x2, 'none\x00', 0x0, 0x6, 0x57}, {@multicast1, 0x4e21, 0x12007, 0x8, 0x1, 0x3f}}, 0x44) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/73, 0x49}], 0x1) openat$sequencer(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/sequencer\x00', 0x6000, 0x0) [ 277.520723] hfsplus: unable to find HFS+ superblock 01:32:59 executing program 4: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hfsplus\x00', 0x0, &(0x7f0000000240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) socket$netlink(0x10, 0x3, 0x0) [ 277.571297] BUG: unable to handle kernel paging request at fffffffffffffff4 [ 277.578574] PGD 926d067 P4D 926d067 PUD 926f067 PMD 0 [ 277.583873] Oops: 0000 [#1] PREEMPT SMP KASAN [ 277.588376] CPU: 0 PID: 8748 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 [ 277.597280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.599556] kobject: 'loop4' (000000009baeb755): kobject_uevent_env [ 277.606650] RIP: 0010:do_mount+0xb98/0x1d90 01:32:59 executing program 4: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hfsplus\x00', 0x0, &(0x7f0000000240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) socket$netlink(0x10, 0x3, 0x0) [ 277.606678] Code: 06 00 48 89 c2 48 89 c3 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 8a 11 00 00 48 b8 00 00 00 00 00 fc ff df <4c> 8b 33 49 8d 7e 18 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 5e 11 [ 277.606692] RSP: 0018:ffff88018115fc28 EFLAGS: 00010246 [ 277.624039] kobject: 'loop4' (000000009baeb755): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 277.636304] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90007eb6000 [ 277.636315] RDX: 1ffffffffffffffe RSI: ffffffff81df05fc RDI: 0000000000000282 [ 277.636324] RBP: ffff88018115fdb0 R08: ffff8801b8cd0100 R09: ffffed003b5c5b4f [ 277.636334] R10: ffffed003b5c5b4f R11: ffff8801dae2da7b R12: ffff8801d88a4230 [ 277.636343] R13: ffff8801c9410b00 R14: ffff8801c9410b00 R15: ffff8801cd45a200 [ 277.636356] FS: 00007f1f25975700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 277.636372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 277.701612] CR2: fffffffffffffff4 CR3: 00000001cd1ac000 CR4: 00000000001406f0 [ 277.708934] DR0: 0000000020000040 DR1: 0000000000000000 DR2: 0000000000000000 [ 277.713033] hfsplus: unable to find HFS+ superblock 01:32:59 executing program 4: mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) mount(&(0x7f0000000180)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='hfsplus\x00', 0x0, &(0x7f0000000240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) socket$netlink(0x10, 0x3, 0x0) [ 277.716206] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 277.716212] Call Trace: [ 277.716238] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 277.716261] ? copy_mount_string+0x40/0x40 [ 277.740921] ? copy_mount_options+0x5f/0x430 [ 277.745374] ? kmem_cache_alloc_trace+0x353/0x750 [ 277.747624] kobject: 'loop4' (000000009baeb755): kobject_uevent_env [ 277.750227] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 277.750250] ? _copy_from_user+0xdf/0x150 [ 277.761137] kobject: 'loop4' (000000009baeb755): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 277.762219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.762241] ? copy_mount_options+0x315/0x430 [ 277.785869] ksys_mount+0x12d/0x140 [ 277.789515] __x64_sys_mount+0xbe/0x150 [ 277.793507] do_syscall_64+0x1b9/0x820 [ 277.797409] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 277.802793] ? syscall_return_slowpath+0x5e0/0x5e0 [ 277.807730] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.812595] ? trace_hardirqs_on_caller+0x310/0x310 [ 277.817186] kobject: 'loop4' (000000009baeb755): kobject_uevent_env [ 277.817621] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 277.817639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.817670] ? prepare_exit_to_usermode+0x291/0x3b0 [ 277.827875] kobject: 'loop4' (000000009baeb755): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 277.829087] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.829110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.859100] RIP: 0033:0x459fda [ 277.862295] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 277.881271] RSP: 002b:00007f1f25974a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 277.888964] RAX: ffffffffffffffda RBX: 00007f1f25974b30 RCX: 0000000000459fda [ 277.896220] RDX: 00007f1f25974ad0 RSI: 0000000020000080 RDI: 00007f1f25974af0 [ 277.903475] RBP: 0000000020000080 R08: 00007f1f25974b30 R09: 00007f1f25974ad0 [ 277.910735] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000000000004 [ 277.918012] R13: 0000000000000020 R14: 00000000004d7d88 R15: 0000000000000003 [ 277.925276] Modules linked in: [ 277.928455] CR2: fffffffffffffff4 [ 277.931899] ---[ end trace acb726009013fbd7 ]--- [ 277.936646] RIP: 0010:do_mount+0xb98/0x1d90 [ 277.940991] Code: 06 00 48 89 c2 48 89 c3 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 8a 11 00 00 48 b8 00 00 00 00 00 fc ff df <4c> 8b 33 49 8d 7e 18 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 5e 11 [ 277.959879] RSP: 0018:ffff88018115fc28 EFLAGS: 00010246 [ 277.965225] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90007eb6000 [ 277.972494] RDX: 1ffffffffffffffe RSI: ffffffff81df05fc RDI: 0000000000000282 [ 277.979767] RBP: ffff88018115fdb0 R08: ffff8801b8cd0100 R09: ffffed003b5c5b4f [ 277.987034] R10: ffffed003b5c5b4f R11: ffff8801dae2da7b R12: ffff8801d88a4230 [ 277.994291] R13: ffff8801c9410b00 R14: ffff8801c9410b00 R15: ffff8801cd45a200 [ 278.001547] FS: 00007f1f25975700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 278.009760] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 278.015624] CR2: fffffffffffffff4 CR3: 00000001cd1ac000 CR4: 00000000001406f0 [ 278.022880] DR0: 0000000020000040 DR1: 0000000000000000 DR2: 0000000000000000 [ 278.030136] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 278.037406] Kernel panic - not syncing: Fatal exception [ 278.043733] Kernel Offset: disabled [ 278.047386] Rebooting in 86400 seconds..